As much as technology has developed in the past century, you’d think humanity would have developed along with it.
And it’s true, we’ve made a lot of progress in the past 100 years. We’re less violent, more educated, and life expectancy has shot up while infant mortality has gone down.
But one thing that hasn’t improved is our propensity to scam each other.
Though the details of their scams have changed over time, con artists have been practicing their arts throughout all of human history.
Insurance scams, for example, were prevalent in Ancient Greece. Con artists would take advantage of bottomry, a type of maritime insurance, by hiding their ships in foreign ports and claiming they had sunk in order to collect on their policies.
And while Chatroulette blackmail schemes may have only become possible with the advent of the Internet, such schemes have been going on since long before then. In the early 20th century, a similar ruse was called “The Badger Game,” where a young woman would lure a lonely married man from a bar to her hotel room, and then threaten to out him to his wife unless he paid a hefty fee.
Even the famous Nigerian scam didn’t start with the Internet. It’s been going on at least since the 19th century, when it was known as the Spanish Prisoner scam.
Developing technology hasn’t put a stop to all our scheming and scamming - in fact, it’s made it easier.
But protecting yourself can also be made easier with technology, if you know what you’re doing.
Check out the graphic below to learn about how to watch out for the most common scams that are perpetrated online, how to protect yourself - and where to report the perpetrators so they get the justice they deserve.
Infographic Sources:
1. Users can't tell Facebook from a scam
2. Fake Antivirus: What are They and How do you Avoid Them?
3. How To Spot A Facebook Scam
4. Ransomware 101: FAQ for computer users and smartphones owners
5. Common Fraud Schemes
6. Ransomware on the Rise
7. Scams, scareware and threats: how online hackers tap into your worst fears
8. Avoiding Ratting - Remote Access Trojans
9. 10 Common Email & Internet Scams - How to Avoid Them
10. Risk Mitigation and Response Guidance for Web Site Spoofing Incidents
11. How to avoid the best malware scams
12. Why the police virus was so effective
13. RAT (remote access Trojan)
14. Ransomware Do's and Dont's: Protecting Critical Data
15. How to spot a copycat website
1. Users can't tell Facebook from a scam
2. Fake Antivirus: What are They and How do you Avoid Them?
3. How To Spot A Facebook Scam
4. Ransomware 101: FAQ for computer users and smartphones owners
5. Common Fraud Schemes
6. Ransomware on the Rise
7. Scams, scareware and threats: how online hackers tap into your worst fears
8. Avoiding Ratting - Remote Access Trojans
9. 10 Common Email & Internet Scams - How to Avoid Them
10. Risk Mitigation and Response Guidance for Web Site Spoofing Incidents
11. How to avoid the best malware scams
12. Why the police virus was so effective
13. RAT (remote access Trojan)
14. Ransomware Do's and Dont's: Protecting Critical Data
15. How to spot a copycat website
No comments:
Post a Comment
Please adhere to proper blog etiquette when posting your comments. This blog owner will exercise his absolution discretion in allowing or rejecting any comments that are deemed seditious, defamatory, libelous, racist, vulgar, insulting, and other remarks that exhibit similar characteristics. If you insist on using anonymous comments, please write your name or other IDs at the end of your message.