person holding a cell phone

Security Tips

Consumer Technology Topic of the Month

The 8 Latest Zelle Scams To Know in 2024

  1. Money mule scams
Work-from-home job scams- that turn distressed job seekers into unsuspecting money mules are nothing new.
These job scams usually unfold this way:
  • The candidate applies for a "lucrative work from home job online"
  • A "hiring manager" reaches out, usually via Messenger, Telegram, Skype, or text message.
  • All subsequent communications tend to be exclusively through text messages.
  • The "hiring manager" extends an offer to the candidate, but there's a catch. The candidate is asked to front money or deposit a check, usually in the guise of purchasing work equipment.
  • It always ends the same way- with candidates still out of work, and no means to get their stolen money back.
Here's what to do:
  • Be wary of any job for which the entire interview process takes place through text messages. Legitimate jobs usually require at least one phone call or in- person interview.
  • Legitimate jobs don't require you to pay for your own equipment.
  • Never give your Zelle account information- including your phone number or email- to unknown individuals.
2. Zelle transfers to "yourself"

Here's what to do:
  • If you suspect you're on the phone with a scammer, hang up.
  • Never share your bank or Zelle account authentication codes with anyone.
  • Don't send money to yourself via Zelle to "reverse unauthorized payments:"
3. Account upgrade scam

Spoofing is a type of phishing scam in which the scammer is deliberately impersonating a company and/or installing malicious software at the same time.

An individual tried to sell his camera online only to lose $4,200 in the process. The individual needed to make a $1000 upgrade on his buyer's account. A phishing email purporting to be from Zelle was requesting this payment in gift cards.

Here's what to do:
  • Know that Zelle will never solicit money via emails or phone calls.
  • Verify that the sender's email address is from an official domain.
  • Look for signs of phishing- questionable grammar and a tone of forced urgency are some tip-offs.
4. Bank impersonators

Smishing is a form of phishing in which scammers send text messages purporting to be from reputable companies, usually banks.

The tactics that scammers use in smishing scams closely resemble phishing or spoofing schemes. Most smishing text messages claim to either flag "a suspicious login" or a "suspicious purchase".

If you respond or click on a link in the text, you will most likely receive a call from a bank representative impersonator.

5. Account takeovers

Account takeover fraud (ATO) is exactly what it sounds like- a scammer gets access to you Zelle account, changes the passwords, and locks you out.
  • Account takeovers usually unfold the same way as phishing, spoofing, or smishing scams wherein the victim clicks on a phony login link.
  • This gives scammers access to your account.
  • Then, they change your password and other account details to lock you out of your account.
  • Since the locked-out account is still connected to your bank account, you'll be the one footing the bill for the scammer's spending spree.
Here's what to do:
  • Only enter your Zelle login credentials on the official Zelle app or website. 
  • Send a $1.00 transfer to confirm that you've reached the intended recipient prior to making larger transfers.
6. Zelle scammers on Facebook Marketplace
  • In this scam, the alleged buyer responds to a listing on Facebook Marketplace, asking if the item is still available. This usually happens withing a couple of hours after the listing goes up. The scammer often pretends to be a senior citizen who isn't very tech-savvy.
  • They ask for your phone or email address to send you the money on Zelle.
  • You may then receive a phishing email from a Zelle lookalike domain, "ZelleSupport@gmamil.com" is an example.
  • These emails typically prompt you to pay to upgrade to a Zelle business account. You may even be asked to pay via a link in the phishing email.
Here's what to do:
  • Ask for the recipient's Zelle email address- not a phone number. Spotting typos in email addresses is easier (and more obvious) than identifying incorrect digits in a phone number.
  • Remember that you don't need a Zelle business account to make and accept payments on Zelle.
  • Don't use Zelle for commercial transactions.
7. Refund and recovery scams

If someone bilked you, scammers know you will be desperate to get your money back. Refund and recovery scams take advantage of your already vulnerable state by charging for bogus services.
  • You may receive a call out of the blue flagging a fraudulent Zelle transaction from your bank account.
  • The caller purports to be from your bank and even offers evidence such as a seemingly legitimate caller ID.
  • They then walk you through an elaborate, fake Zelle refund process. You inadvertently end up paying the scammer to reclaim funds you never lost in the first place.
Here's what to do:
  • If you're not convinced you are speaking to a bank representative, hang up and call the official number on the bank's website.
  • Be wary if anyone demands upfront payment to "recover" your lost funds or account access.
8. Cragslist scams

Overpayment and rental scams may be the two most common scams on Craigslist. 
  • If rental scams pressure you into paying advances for a listing that's too good to be true, overpayment scams operate differently.
  • An "interested" buyer may contact you about the item you're selling on Craigslist.
  • When the buyer pays you with a certified or cashier's check, you notice it exceeds the same price.
  • They then urge you to deposit the check and wire back the overpaid amount.
  • By the time the bank flags the counterfeit check, you've lost the sale item and the overpaid amount.
Here's what to do:
  • Look up the bank account, address, and phone number for the bank name displayed on any check you receive. Call the bank's official phone number- not the one listed on the check- to confirm.
  • Turn down checks made out to an amount larger than what you discussed. If the buyer insists that you return any overpayments using apps like Zelle, it's a scam.
 
Fake checks drive many types of scams- like those involving phony prize wins, fake jobs, mystery shoppers, online classified ad sales, and others. In a fake check scam, a person you don't know asks you to deposit a check-sometimes for several thousand dollars and usually for more than what you are owed- and wire some of the money back to that person. The scammers always have a good story to explain the overpayment- they're stuck out of the country, they need you to cover taxes or fees, you need to buy supplies, or something else. But by the time your bank discovers you've deposited a bad check, the scammer already has the money you sent, and you're stuck paying the rest of the check back to the bank.

The Federal Trade Commission receives tens of thousands of reports each year about fake checks. Over the last three years, the number of complaints has steadily increased, and so have the dollars lost.

The FTC's new info graphic developed with the American Bankers Association Foundation, offers some tip-offs to rip-offs and what to do if you get a check from someone you don't know.

Please share this information with others. Victims may be embarrassed to talk about their experiences, but you can help. A simple phone call, email or text, saying "Look what I just found" and sharing this information may make a difference in someone else's life.
How to Avoid Cryptocurrency Scams!
 
Scammers are always finding new ways to steal your money using cryptocurrency. To steer clear of a crypto con, here are some things to know.

  • ONLY SCAMMERS DEMAND PAYMENT IN CRYPTOCURRENCY. No legitimate business is going to demand you send cryptocurrency in advance- not to buy something, and not to protect your money. That's always a scam.
  • ONLY SCAMMERS WILL GUARANTEE PROFITS OR BIG RETURNS. Don't trust people who promise you can quickly and easily make money in the crypto markets.
  • NEVER MIX ONLINE DATING AND INVESTMENT ADVICE. If you meet someone on a dating site or app, and they want to show you how to invest in crypto, or asks you to send them crypto, that's a scam.
Spot Crypto-Related Scams
 
Here are some common investment scams, and how to spot them.

  • A so-called "investment manager" contacts you out of the blue. They promise to grow your money- but only if you buy cryptocurrency and transfer it into their online account. The investment website they steer you to looks real, but it's a fake, and so are their promises. If you log in to your "investment account", you won't be able to withdraw your money at all, or only if you pay high fees.
  • An online "love interest" wants you to send money or cryptocurrency to help you invest. That's a scam. As soon as someone you meet on a dating app asks you for money, or offers you investment advice advice, know this: that's a scammer. The advice and offers to help you invest in cryptocurrency are nothing but scams. If you send them crypto, or money of any kind, it'll be gone, and you typically won't get it back.
  • Scammers guarantee that you'll make money or promise big payouts with guaranteed returns. Nobody can make those guarantees. Much less in a short time. And there's nothing "low risk" about cryptocurrency investments. So: if a company or person promises you'll make a profit, that's a scam. Even if there's a celebrity endorsement or testimonials from happy investors. Those are easily faked.
  • Scammers promise free money. They'll promise free cash or cryptocurrency, but free money promises are always fake.
  • Scammers make big claims without details or explanations. No matter what the investment, find out how it works and ask questions about where your money is going. Honest investment managers or advisors want to share that information and will back it up with details. 
  • IF YOU SEE A TWEET ( OR A TEXT, OR OTHER MESSAGE ON SOCIAL MEDIA) THAT TELLS YOU TO PAY WITH CRYPTOCURRENCY, THAT'S A SCAM!
Recognize Common Scams
Scams 101
 
What you should know

Though there are different types of scams, the objective is the same: to steal your money or information. Scammers often use sophisticated tactics to commit fraud that can make it hard to cancel or reverse the transaction. If you send money to a scammer, you may not be able to get it back. Worse, if you knowingly take part in a scam, you could face hefty fines and criminal charges.

Wire Transfer
 
Wire transfers are an immediate form of payment that deposit money directly into another person's account and are typically irreversible, even if fraud is involved.

Digital payment apps
 
Digital payments allow you to send money to another person withouth using their bank account number. Sending money using Zelle, or third party payment apps like CashApp or Venmo is like sending cash.

Be on the lookout for bank imposters who tell you to send a wire to another account or person in order to protect your money. We'll never ask you to send money to yourself or anyone else. 

Bank imposters may ask for your access codes so they can sign on to your account and enroll you in wire services, often without your knowledge, to steal money from your account. NEVER SHARE YOUR ACCESS CODE to verify an account, receive a refund, or for any other reason.

Gift card and prepaid card

Scammers may ask you to pay them using a gift card or prepaid card because they are like cash. If you are ever asked to pay or donate in the form of a gift card or prepaid card- it's a scam.

Cryptocurrency

Cryptocurrency is digital money that is not backed by the US government or any bank, and once sent, that transaction is irreversible.

As part of a new job or romance scam, you could be asked to make a payment or send money using cryptocurrency, such as Bitcoin or Ether. Be wary of unexpected requests to send money using cryptocurrency.

Fake check or account deposit

Scammers may send you a fake check or make a deposit into your account. Once the deposit has been made, you are asked to send all or a part of it back. After you send the money, you find out that the check or deposit is fraudulent.

Be aware: You are responsible for the full amount of the check you deposited and associated check fees if it is returned plus any money you send the scammer. It may typically take up to 10 business days for a check to be discovered as fraudulent and returned to your bank.

Debit or Credit Card
 
After obtaining your debit or credit card number through a scam or data breach, scammers may use it to make unauthorized purchases. Set up alerts on your accounts to help you track your transactions and spot unusual activity so you can contact us quickly if something doesn' look right.

QR codes

QR codes can be a quick and easy way to pay for goods or services without the hassle of entering a URL into your browser or handing over your physical card.

It's convenient, but use caution when scanning QR codes to pay for items or services. If something doesn't feel right when using a QR code to pay, ask to pay a different way. Be aware that scammers may use QR codes to send you to a malicious site, or a fake website where they can steal your payment information.

Here's what you can do to help protect yourself from scams
 
  • Get rich quick schemes. If an offer seems to god to be true, it probably is.
  • Unexpected calls, text, social media posts, or emails where someone asks you to send money, provide your account information, or give them access to your device.
  • Scammers impersonating tech support companies, government agencies, and even Grandview Bank to pressure you to act right away. Don't be afraid to end communication with the person who contacted you so you can have time to do more research.
Follow these tips to avoid a payment scam:
  • When using Zelle or a wire transfer to pay someone, double check your payment details to make sure that you're sending money to the right person. If you send money as part of a scam, you may not be able to get it back.
  • Don't send money or give account information to anyone you don't know or a company that you can't verify as legitimate.
  • Don't send money back to someone who has provided a check or overpayment for goods or services. These are almost always scams.
  • Don't cash checks for others or provide your account or sign-on information. If the check is bad, you are liable.
  • Don't allow anyone else to use your desktop or mobile device and make sure you have extra layers of security added to your banking or payment apps.

 
Fraud Prevention and Cybersecurity Tips
Protect your accounts
 
Identity Protection
  • Store your Social Security card, passport, green card, financial documents, and unused credit, debit, or ATM cards in a secure location.
  • Never provide your personal or financial information to anyone unless you initiate the call or other communication.
  • Don't send personal or financial information through text or email, as this is typically not secure.
  • Shred documents that contain sensitive information before discarding.
  • Sign up for online billing and financial statements to help reduce the risk of identity theft from stolen paper documents.
  • Review your credit report at least once a year to look for unauthorized accounts that are opened in your name.
  • Monitor your credit and set up credit monitoring alerts.
  • Help protect against child identity theft by limiting the type of information shared with schools and organizations.
Account & Card Security
  • Immediately report lost or stolen ATM, debit cards, credit cards, checks, or account numbers.
  • Review your account for unauthorized withdrawals on your account. If you spot suspicious or unauthorized charges, report them right away.
  • Keep your contact information up to date so we can reach you if we detect unusual activity on your account.
  • Limit the amount of information printed on your checks to your name and address. Don't include your phone number or DL.
  • Always keep your checks, debit, ATM, and credit cards in a secure place.
  • Don't give out your account information over the phone unless you initiated the call using the phone number on the back of your card or the company's website.
  • If you receive a replacement debit or credit card, cut up or shred and discard your old card.
  • If you misplace your card, turn it off temporarily and back on when you find it.
  • Use a digital wallet to make purchases in stores, in-app and online. Digital Wallets replace your actual card number with a unique digital card number. This means businesses cannot see or store your full card number.
PIN protection for debit cards and ATM cards
  • When choosing a personal identification Number (PIN) for your debit card, don't use a number or word that appears in your wallet, such as name, birth date, or phone number. 
  • Don't share your PIN with anyone or provide it through text message, email, or phone call.
  • Cover the keypad while entering your PIN at an ATM, Grocery Store or other locations.
  • Don't write your PIN anywhere, especially on your card.
Protect yourself online
  • Create a unique username and password for your Grandview Bank accounts and don't use any part of your email address. 
  • Don't store your banking password or other sensitive data on your device.
  • Use biometric authentication so you don't have to remember your password and you can conveniently access your accounts.
  • Some browsers and smartphones allow you to save your username and password, commonly known as AutoSave or AutoFill. We recommend you disable this feature.
  • Activate 2 Step Authentication for an additional layer of security ehen you sing on to online or mobile accounts
  • Don't access your financial accounts using public Wi-Fi networks.
  • Always sign off from any website after you make a purchase with your credit or debit card. If you cannot sign off, close your browser to help prevent unauthorized access to your account information.
Email and text message
  • If you receive a suspicious email or text message, don't respond, select any links, or open attachments. Don't sign on to your account form a link in a suspicious message.
  • Create a unique password for your email account and don't share it with anyone. If scammers gain access to your email account, they may be able to reset your passwords for other websites and lock you out.
Online document storage (Cloud)
  • Before saving financial docuents to a third-party, online storage service, carefully review the provider's security and privacy settings and terms of service.
Online account aggregators
  • Before providing your username and password to third-party websites or apps to access your Grandview Bank information, carefully review the provider's security and privacy settings and terms of service.
Protect your devices
  • Protect your phone by setting up a PIN with your mobile carrier so no one other than you can make changes to your account or transfer your service to a different mobile phone.
  • When you're not using your phone, use the built-in security functions to lock it.
  • Remove all personal data and reset your phone to factor settings before discarding or selling it.
  • If you change your number, contact Grandview Bank to update your contact information so we can reach you if we detect unusual account activity.
  • If your phone is lost or stolen, contact your mobile service provider to determine if the mobile device can be shut off. 
  • Keep your devices up-to-date, including operating system, anti-virus, applications, security patches, and browser versions.
  • Secure your home router with a strong password to help protect devices on your network from unauthorized access. 
Elder financial abuse
  • Watch out for fraud and scams that attempt to trick older or vulnerable adults into sending gift cards or money, or giving up personal information or property. These scenarios may include scammers posing as technical support, IRS/Medicare representatives, grandchildren, love interest,s or lottery officials.
  • Encourage older adults to get to know their neighbors and connect frequently with family. Isolation is often a contributing factor to elder financial abuse.
  • Look out for signs of financial abuse by caregivers or relatives, such as requests for financial help or unexpected payments.
 
How to Protect Yourself from Fraud

Beware of Fraud Trends on the rise
  • Zelle Refund Imposters- Grandview Bank will never reach out to you to ask you to send money to refund yourself for a fraudulent transaction. Even if it appears the call is coming from Grandview Bank, if it doesn't make sense, hang up and call us at 817-641-3100.
  • Cybercriminals and Your Personal Information- Identity theft is on the rise as merchants you do business with fall victim to data compromises. As a result, scammers can gain access to your personal identification information, such as your Social Security number, date of birth, debit card or account number. 
Ways to Keep Your Information Safe
  • Be aware of scams that request personal information through calls, direct mail, emails or texts.
  • Do not click on links or cell phone numbers provided in a suspicious text or email. Instead, contact organizations directly at the number listed on its website.
  • Use caution with caller ID. Scammers can make calls look like they are coming from a reputable source.
  • Know that most providers you do business with, including Grandview Bank, will never reach out to you to aks for your account access credentials such as, banking account information, passwords, usernames, security questions, debit card numbers, PIN, passcodes or your Social Security Number. Do not share this information with anyone.
  • Do not click links in spam emails- even those sent by someone you know. Emails with typos and grammatical errors are a red flag.
  • Never store personal or financial information, including passwords on your device or on paper.
  • Do not use the same login ID and password accross multiple systems.
  • Secure documents that have personal information. Don't carry our Social Security card with you. If you get statements mailed to your home, bring in your mail as soon as you can.
Monitor Your Accounts
  • Carefully and regularly check your statements and reconcile your accounts daily for unexpected activity.
  • Contact us immediately if you notice any unusual activity on your account. 
  • Periodically check your credit report.
  • Sign up for customizable Debit Card Alerts, so you can quickly detect and help stop fraudulent use of your debit card.
    • Grandview Bnak may occasionally send you a fraud text and/or email alert asking you to confirm whether you recognize a particular debit card transaction. It's important that you respond to those fraud alerts.
  • Take advantage of tools that can help you stay safe
    • Sign up for Debit Card Alerts for protection against unauthorized transactions
    • Use Grandview Bank app to monitor the transactions on your accounts.
    • Sign up for E-Statement Delivery to stop receiving paper statement by mail to help limit potential for theft.
    • Sign up for account email alerts to monitor account activity
  • Protect your Debit Card
    • Keep your PIN a secret. Do not write your PIN on your card, its carrier or other papers in your wallet
    • Grandview Bank will never call, text or email you to ask for your PIN. Do not share your PIN with anyone.
    • Place travel notices on your debit card when traveling out of the U.S.
    • Only shop online at trusted websites.
  • Keep your devices secure
    • Keep your device's operating system, software and apps up to date.
    • Set up a password for your device and lock it when not in use.
    • Use strong passwords when accessing online accounts. Use Multi-factor authentication if possible.
    • Fully log out of online banking when you
    • Keep your software up to date. Software developers send out updates to enhance protection from cybercriminals.
    • Ensure that you are using the most recent version of antivirus software.
    • Do not log into online banking using Wi-Fi hotspots; these connections typically do not have adequate security to keep your information safe.
    • Secure your router by changing the name and password from the default setting.
    • Do not install or run any app or program on your device unless it's from a trusted source.
    • If you use the Frost App and lose your device, you can disable the app in Grandview Bank Online Banking.
  • Protect Yourself From Common Scams
    • Never give your online banking credentials to a third party who wants to make a deposit into your account, for an online loan or for any other reason.
    • Be cautious of communications from unsolicited sources including by phone, text, email or through social media.
    • Stay alert of "spoofed phone calls", Fraudsters are "spoofing" or falsifying their phone number to display as a rep;utable company to consumers with the goal of getting them to give out account credentials, sending money to fake organizations or infecting their mobile or desktop devices with a virus.
    • Federal government agencies, including the IRS, will never text or call you to ask for money.
What is email spoofing? A complete Guide
 
Email Spoofing definition
Email spoofing is a practice used in scams and phishing attacks to deceive people into believing the message came from a known or trusted source.
 
Have you ever opened an email from someone you know only to be unsure if it was them who wrote the message?

Whether it seems like a spam email or they asked you a personal question they already know the answer to, it's possible the sender may not be who they appear to be.

How, you ask? The answer is email spoofing. Email spoofing is a practice used in scams and phishing attacks to deceive people into believing the message came from a known or trusted source. Cyber criminals use this technique hoping that the recipient will not notice and engage with the message as if it's a legitimate email.

How does email spoofing work?

Display name spoofing is an example of spoofing email headers where only the sender's display name is falsified. With this type of spoofing, the email address itself will not match the display name attached to the email. For example, you may get an email that says its coming from your boss, but after opening the message, you notice that the sender's email address does not match your boss's.

This is possible if a cyber criminal creates a new email address under your boss's name. Because the email itself is legitimate, this type of spoofed email might bypass any spam filters, therefore easily making it into your inbox.

Legitimate domain spoofing
 
Legitimate domain spoofing is a much more believable email spoofing example. In this case, both the display name and the sender's address will be fake. Cyber criminals can do this by taking advantage of Simple Mail Transfer Protocol (SMTP), which is an email protocol used for sending messages.

During normal email communications, your email client (Gmail, Outlook, etc) will automatically enter the sender's address whenever an email is sent. In the event of email spoofing, the attacker can manipulate this information, making it seem as if the email is coming from someone else. Because SMTP does not provide a way to authenticate email addresses, the scammer can manually change the "To", "From", and "Reply To" fields when sending spoofing emails.

Look-alike domain spoofing
 
Another example of email spoofing is the use of look-alike domains. An example of a spoofed domain is "amazOn.com". In this specific scenario, the spoofer created a domain attempting to impersonate "amazon.com". At first glance, you may not notice the "o" has been replaced with a "0".

This technique can be effective if you don't pay close attention to the spoofed email header, especially if the contents of the email look legitimate. Because of this, it's important to always pay close attention to the sender's details before engaging with an email.

What's the difference between email spoofing vs phishing?
 
At first glance, email spoofing may sound a lot like phishing, and in some cases, the two do involve each other. But these two cyber security threats are different. Phishing is another type of cyber attack utilized by cyber criminals to try and lure sensitive information from you. This can take place over text, email, social media, or on the phone (an attack also known as vishing).

No matter where this attack takes place, the main goal of phishing is to access your personal information for fraudulent activities such as identity theft. Email address spoofing my play a crucial role in these attacks, allowing the cyber criminal to appear as if they are somebody else.

Why is Email Spoofing used?
  • Anonymity: Email spoofing can help conceal the sender's identity allowing them to carry out attacks without fear of the recipient knowing who they truly are.
  • Bypassing spam filters: Most email providers have built-in spam filters that can help filter out a lot of spam emails. By utilizing email spoofing, an attacker may be able to sneak into your inbox.
  • Identity Theft: Some spoofed email messages are designed to trick you into giving up login credentials or other personal identifying information, which could lead to identity theft.
  • Spreading malware: A spoof email may contain malicious links with malware, which could damage your device and put your cyber security at risk.
  • Damaging the sender's reputation: Because a spoofed message looks like it's coming from someone else, a cyber criminal could use the message to tarnish the sender's reputation by sending lies or rude messages.
  • Man-in-The-Middle attacks: In some cases, email spoofing is used to carry out MITM attacks, which also involve phishing. A common example of this is when an attacker impersonates your bank using a fake sender email address and website link.
  • Bypassing block lists: Like bypassing spam filters, email spoofing may be used to send a spoofed email to a recipient who they would otherwise be blocked from communicating with.
  • Impersonating a trusted source: Similar to catfishing, email spoofing may be used to impersonate someone you know or a trusted organization in hopes that you'll disclose personal information they wouldn't be able to access otherwise.
How to spot a spoofed email
  • Suspicious email address: Be sure to check and make sure that the email domain matches the correct domain of whomever the sender is claiming to be. Also, keep a close eye out for typos or look-alike domains.
  • Display name doesn't match address: Another hint of a spoofed email message is if the display name differs from the sender's email address. If it's someone you've spoken with before, check and see if the current sender's address matches the one used in previous communications.
  • Sense of urgency: Because spoofed emails are often used for phishing or other types of cyber attacks, the sender may use social engineering tactics to create a sense of urgency, rushing you to respond or follow their instructions.
How to protect against email spoofing
  • Watch for suspicious or unknown email addresses: One of the first indicators of many spoofed emails is the use of a suspicious email address. In some cases, the email address could contain typos or replace letters with numbers.
  • Avoid clicking links and attachments: Be sure to avoid clicking any links or attachments, as spoofed emails may contain links that can take you to malicious websites or expose you to malware.
  • Run a search for related scams: If an email seems suspicious, copy and paste the contents of the email into a search engine. It's possible that the email has been sent to others before, and it may have been reported as a scam somewhere online.
  • Check for grammar and spelling errors: In many cases, spoofed emails contain spelling and grammatical errors that a legitimate message would not.
  • Safeguard your personal information: Always think twice before sharing any sort of personal information online. If you do, be sure to verify that you're sharing it with a reliable person or organization.
  • Use antivirus software: Antivirus software an help protect your device from the dangers of email spoofing like phishing, malware, and identity theft.
 
Top 10 Tax Scams

It starts with your phone ringing- the most prevalent tax scam making the rounds this year. The caller claims to be from the IRS and demands your money NOW. Don't think you're the only one singled out for this tactic; aggressive, threatening phone scams occur regularly across the country. But scamming also happens via email, U.S. mail or in person.

1. Phone scams from phony IRS Agents

If the caller threatens you with police arrest, deportation or immediate criminal action- they're not from the IRS. Phone calls demanding immediate cash payments are made by criminals who impersonate tax agents. These calls are so common; it's likely you've been targeted at some point.

Don't give any information to these callers. Ask for a name, title and phone number, but don't call back.

2. Emails designed to steal personal information

Phishing is a serious scam; it refers to fake emails often claiming to be from the IRS that mention a bill or refund you didn't expect. Remember that tax authorities won't email you out of the blue, so don't open messages supposedly from the IRS. They are likely fraudulent attempts to steal your Social Security number or other personal information. Think twice or three times before giving out your credit card or other financial information online.

3. False tax returns to pocket your refund

Once a criminal gets access to your Social Security number, they have everything necessary to file a tax return in your name. The purpose of a fraudulent tax return is, obviously, not to pay your back taxes, but to pocket your refund. This scam occurs early in the tax season, well before most taxpayers file. Take every possible precaution to keep your SSN secret, and if possible, file your taxes early.

4. False charities that solicit donations

If you lost a family member from a disease or another tragedy, con artists can close in. These scammers target taxpayers who might want to make a tax-free donation to a particular charity. If you get a phone call or email soliciting money to fight disease or assist victims, don't give out cash or financial info. Instead, look up the charity on the Exempt Organizations Select Check tool to see if it's legitimate.

5. False tax preparers that pose as legitimate professionals

Think of these scammers as wolves in sheep's clothing who pose as legitimate tax preparers or professionals, but actually intend to steal your money. Taxpayers targeted in this case are often people who don't speak English well or don't fully understand the U.S. tax system, such as first- time tax filers. Not only do the scammers take a large fee for their "services", but they may also inflate deductions with phony benefits or tax credits, and then have the refund forwarded to their accounts.
  • Your best bet for avoiding this kind of scam is to ask for references from tax preparers before you sign on the dotted line.
  • You might also consider using a tax preparer recommended to you you by someone you trust.
  • The IRS also has a Federal Tax Return Preparer directory you can use to search for a tax preparer near you.
6. Offers to move money offshore

You may have heard that wealthy business people keep financial accounts offshore, so if you get a call or email about moving money overseas, you might be tempted. However, this may be another of the top tax scams, trying to lure you into hiding money in offshore accounts or foreign trusts. If the scammer succeeds, the money is likely to stay hidden from you as well, and the IRS may prosecute you.

7. Promises of getting a larger tax refund that you're due

Watch out for scammers who promise to file a return for you and get you a much larger tax refund than you're entitled to. According to the IRS, these con artists use advertisements, flyers or even false storefronts to lure taxpayers in. If someone tells you to sign a blank tax return or estimates your taxes off the top of their head, it's best to be skeptical.

8. Offers to avoid taxes with tax shelters

Some scammers peddle phony tax schemes. Invest your money in certain shelters, they claim, and you'll avoid paying taxes. However, these complex tax-avoidance schemes are often illegal, and the IRS prosecutes scammers who create and sell them, along with taxpayers who participate. If you are uncertain if a complicated tax product is legitimate, seek an independent opinion before getting involved.

9. Promises of "free money"

You know in your heart that nobody gives away money, so when you meet scammers who promise "free money" if you file tax returns with them, be wary. These people often target communities or church groups, file incorrect and exaggerated tax returns and pocket the victim's refunds.

10. Scamming Social Security refunds

Another tax scam involves promises that you can obtain a large Social Security refund or rebate. Even when you are legitimately owed a refund, criminals will inflate amounts in the tax return and steal the refund.

Other scammers claim they can use IRS forms to transfer funds from the Social Security Administration to the tax authorities. The victim, they claim, will get a check from the IRS, but that's not likely to happen.

Hesitate to sign on with a tax preparer who promises you far more than you expected to get in a refund. If you have doubts about the legality of the schemes promised, consider obtaining a second opionion.


 
Cybersecurity Basics

Common cyber-related crimes include identity theft, frauds, and scams. Identity theft is a crime in which someone wrongfully obtains and uses another person's personal data to open fraudulent credit card accounts, charge existing credit card accounts, withdraw funds from deposit accounts, or obtain new loans. A victim's losses may include not only out-of-pocket financial losses but substantial costs to restore credit history and to correct erroneous information in their credit reports.

In addition to identity theft, every year millions of people are victims of frauds and scams which often start with an email, text message, or phone message that appears to be from a legitimate, trusted organization. These messages typically ask consumers to verify or update personal information or they direct consumers to bogus websites (such as for credit repair services) in the hopes that consumers will visit the site and enter their personal information.

Tips to Avoid Identity Theft

The best protection against identity theft is to carefully guard your personal information. For example:
  • Do not share personal information over the phone, through the mail, or over the internet unless you initiated the contact or know the person you are dealing with.
  • Be suspicious if someone contacts you unexpectedly online and asks for your personal information. It doesn't matter how legitimate the email or website may look. Only open emails from people or organizations you know and, even then, be cautious if they look questionable. Be especially wary of fraudulent emails or websites that have typos or other obvious mistakes.
  • Don't give out personal information in response to unsolicited requests. Be particularly careful about to whom you give your Social Security number, financial account information, and driver's license number.
  • Shred old receipts, account statements, and unused credit card offers.
  • Choose PINs and passwords that would be difficult to guess and avoid using easily identifiable information, such as your mother's maiden name, birth dates, the last four digits of your social security number, or phone numbers.
  • Pay attention to billing cycles and account statements and contact your bank if you don't receive a monthly bill or statement. Identity thieves often divert account documentation.
  • Review account statements thoroughly to ensure all transactions are authorized.
  • Guard your email from theft, promptly remove incoming mail, and do not leave bill payment envelopes in your mailbox with the flag up for pick up by mail carrier.
  • Obtain your free credit report annually and review your credit history to ensure it is accurate.
  • Use an updated security program to protect your computer.
  • Be careful about where and how you conduct financial transactions. For example, don't use an unsecured WiFi network because someone might be able to access the information you are transmitting or viewing.
Tips to Avoid Frauds and Scams

Consumers should always exercise caution when it comes to your personal and financial information. The following tips may help prevent your from becoming a fraud victim.
  • Be aware of incoming email or text messages that ask you to click on a link because the link may install malware that allows thieves to spy on your computer and gain access to your information.
  • Be suspicious of incoming email or text messages that ask you to click on a link because the link may install malware that allows thieves to spy on your computer and gain access to your information.
  • Be suspicious of any email or phone requests to update or verify your personal information because a legitimate organization would not solicit updates in an unsecured manner for information it already has.
  • Confirm a message is legitimate by contacting the sender (it is best to look up the sender's contact information yourself instead of using contact information in the message).
  • Assume any offer that seems too good to be true, is probably a fraud.
  • Be on guard against fraudulent checks, cashier's checks, money orders, or electronic fund transfers sent to you with requests for you to wire back part of the money.
  • Be wary of unsolicited offers that require you to act fast.
  • Check your security settings on social media network sites. Make sure they block out people who you don't want seeing your page.
  • Research any apps before downloading and don't assume an app is legitimate just because it resembles the name of your bank or other company you are familiar with.
  • Be wary of offers that pressure you to send funds quickly by wire transfer or involve another party who insists on secrecy.



Proudly serving North Texas for over 130 years.