What you need to know about scams and how to protect yourself against them Scams target all people in Australia regardless of their source, age, and wage level. Everyone can be victimized by fraud, so everyone has to learn about identifying and avoiding them. Callers are deceptive so if you do not know how to spell it, you can easily fall victim to it. What you can do is protect yourself How to spot a fake Where to help
Extra information
Callbacks occur because they are real and they catch you during your weaknesses and you do not expect it. This may include offers that are too good to be true, calling for a loan from your computer or threatening to pay off a loan, bank notice or telephone company with a problem with your bank or invitation to contact them. to “online”.
Callers use new technologies, new products or services and big events to create credible stories that will inspire you to provide money or personal details. Callers can cheat like government officials and make false claims or threats of fines, arrests and deportations to scare you and pay. Callers can get some personal information from "facebook" or "social media" to make their demands seem legitimate.
What you can do is protect yourself
Be alert and protect yourself from fraud by these signs:
Be alert against intruders. If someone calls from a person or business over the phone or in the mail, email, personal or social networking site (example: facebook), always consider this to be a call.
Identify who you are talking to. If you've only met someone on the internet / online or you're not sure that a business is legitimate, check it carefully. Do a "Google search" or search the internet for people who may be related to it.
Don't open suspicious text, pop-up windows or email - delete them immediately. If not known, check out the contact through an independent source of information such as a phone book or online search. Do not use their contact details.
Keep personal details safe. Lock your “mailbox” and pull out your receipts and other important documents before deleting. Keep your “passwords” and “pin numbers” in a safe place. Be careful about providing personal information on "social media".
Keep your mobile and computer devices safe. Always use "password" protectors, do not share with others "access" (even remotely), keep security software and "back up content" up-to-date. Protect your "WiFi network" by "password" and avoid using public computers or "WiFi hotspots" for your online banking or for providing personal information.
Choose your passwords carefully. Choose "passwords" that others can't easily predict and change. Do not use one “password” for all your accounts / profiles and do not share your “passwords” with others.
Review your privacy and security settings on “social media”. If using "social networking sites", such as "Facebook", be careful who's associated and learn how to use "privacy" and "security settings" to make sure you stay safe.
Be careful about asking for your details or money. Do not send money or provide details of your “credit card”, “online account” or copy of personal documents to anyone you do not know or trust.
Be careful when shopping online / online. Beware of offers that may seem overwhelming, and only use known and trusted online shopping services.
How to spot a fake
Signs of a fake document
It is easy to fake documents. There are some that look like real but others with these signs are dangerous, such as:
greetings are personal and personal
there are names of associations that are false poor image grammar and spelling are poor the word is too expressive and imaginative
Documents such as “flight itineraries” and bank reports have a simple, uncomplicated design because they allow businesses to have their clients complete reports online.
So it is very easy to fake these documents.
Signs of fake email
Callers know how to fake "emails" to look authentic, use the same "logo" and look like "email" just like a real company.
You often do not anticipate if you are receiving an email from a company you are affiliated with, such as Australia Post or an online shopping site. If you do not expect emaill, you should check that it is fake before you click on any "links" or "attachments".
Signs of fake "dating profile"
When looking for new acquaintances from the "dating agency", take note of any unusual ones:
picture
location
interest
compare the spoken word to their source
Callers often use fake pictures taken over the internet.
Tip: Do an "image search" of your fan to see if they're the same as what they say. You can use image search services in “Google” or “TinEye”.
Where to help
If you lose money on a call or you give your personal details to a caller, you may not be able to return it. But there are ways that you can take immediate action to limit harm and protect you from continuing harm.
Call your bank or credit union
If you provide money or personal banking information, call your bank or credit union immediately. They may stop exchanging money or checks, or close your “account” if the caller has obtained your banking details.
If you are not sure if you are bowing down, don't stop giving money. Callers will continue to ask for money until you stop.
Recover your lost identity
If there is a suspicion that you have been the victim of identity theft, it is important to act immediately to minimize possible financial loss or other damage.
You can:
call iDcare - a free government funded service to help create a unique plan for your situation and support you in fulfilling it. Visit the iDcare website or call 1300 IDCARE (432273)
apply for a Commonwealth Victims' Certificate - a document that will assist your claim as a victim of identity theft, and can be used to re-establish identities in government and financial institutions. Visit “Victims of Commonwealth identity crime”.
Report the summons to the authorities
By reporting to the appropriate agency, you can help keep the callers alert and warn people about the call.
If you think you like it like,up vote thank you
@Rodalyn Basco
Nice.thank you for sharing this useful articles, it will help us.