Be careful when granting remote access to your computer. Be sure you know who is on the other end. Be sure you know who you are talking to before letting someone access your computer.
There are many types of scams, but most follow the same patterns. They rely on urgency, secrecy, and trust.
If you are told to keep something a secret, treat it as a warning sign
Always verify with a trusted person before sending money or sharing information
If a message appears to come from someone you know, start a new conversation using a known email address or phone number
Requests for money, especially in the form of gift cards, are almost always fraudulent
For more guidance, see the Social Engineering Red Flags section on the Home page.
No legitimate business or government agency will ask for payment using gift cards.
Scammers will ask you to buy gift cards and provide the number and code
They can quickly convert gift cards into cash
You may be pressured or given a specific store to visit
If you are asked to pay with gift cards, it is a scam.
These scams create a false “refund” situation and then demand repayment.
You may receive a call, email, or invoice for something you did not purchase
The scammer convinces you to log into your bank account
They make it appear that you were refunded too much money
They then demand that you return the “extra” funds
Payment is often requested through gift cards or other hard-to-trace methods.
You are not responsible for fixing a company’s billing mistake by sending money.
Scammers use personal information from social media to impersonate someone in distress.
They may pretend to be a grandchild, friend, or someone acting on their behalf
They claim there is an emergency such as an accident or arrest
They often say, “Do not tell anyone”
Secrecy is a key warning sign. Always verify the situation with another trusted person.
Law enforcement and attorneys do not accept payment in gift cards.
These scams try to convince you that your device has a problem.
You may see a pop-up warning about a virus or security issue
The message directs you to call a phone number
The “technician” will attempt to sell unnecessary or fake services
Scammers may also appear in search results, making fake support numbers look legitimate.
Always verify support contact information from an official website.
Scammers pretend to be someone you trust or recognize.
Common examples include:
Government agencies such as the IRS, Social Security, or Medicare
Law enforcement claiming you have a warrant
A boss or colleague requesting money or urgent action
Package delivery services requesting additional information, like USPS, UPS and FedEx
Online relationships that ask for money over time
Phone numbers and email addresses can be spoofed to appear legitimate.
If the request is unusual, verify it using a known and trusted contact method.
These scams offer easy money for little effort.
High pay for simple tasks such as liking content or clicking links
Requests for payment for training, equipment, or onboarding
Requests for bank or credit card information
Fake check variation:
You are sent a check and told to deposit it
You are instructed to send some of the money back
The check later bounces, and you are responsible for the full amount
Banks may make funds available before a check fully clears. This does not mean the check is valid.
These scams attempt to scare you into paying.
You may receive a message form "yourself" claiming your password has been compromised
Some claim to have access to your computer or personal images
They demand payment to avoid releasing information
These claims are usually false. The password may come from an old data breach.
Do not respond or send money.
Use unique passwords for every account and consider using a password manager.
Scams rely on urgency, secrecy, and emotional pressure.
Pause before acting. Verify before trusting.
If something feels off, it probably is.