Placeholder Content Image

Are older adults more vulnerable to scams? What psychologists have learned about who’s most susceptible, and when

<p><em><a href="https://theconversation.com/profiles/natalie-c-ebner-1527554">Natalie C. Ebner</a>, <a href="https://theconversation.com/institutions/university-of-florida-1392">University of Florida</a> and <a href="https://theconversation.com/profiles/didem-pehlivanoglu-1527551">Didem Pehlivanoglu</a>, <a href="https://theconversation.com/institutions/university-of-florida-1392">University of Florida</a></em></p> <p>About 1 in 6 Americans <a href="https://www.census.gov/library/stories/2023/05/2020-census-united-states-older-population-grew.html">are age 65 or older</a>, and that percentage <a href="https://www.ncoa.org/article/get-the-facts-on-older-americans">is projected to grow</a>. Older adults often hold positions of power, have retirement savings accumulated over the course of their lifetimes, and make important financial and health-related decisions – all of which makes them attractive targets for financial exploitation.</p> <p>In 2021, there were more than 90,000 older victims of fraud, according to the FBI. These cases resulted in <a href="https://www.ic3.gov/Media/PDF/AnnualReport/2021_IC3ElderFraudReport.pdf">US$1.7 billion in losses</a>, a 74% increase compared with 2020. Even so, that may be a significant undercount, since embarrassment or lack of awareness <a href="https://assets.aarp.org/rgcenter/econ/fraud-victims-11.pdf">keeps some victims from reporting</a>.</p> <p><a href="https://ncea.acl.gov/elder-abuse#gsc.tab=0">Financial exploitation</a> represents one of the most common forms of elder abuse. Perpetrators are often individuals in the victims’ inner social circles – family members, caregivers or friends – but can also be strangers.</p> <p>When older adults experience financial fraud, they typically <a href="https://public.tableau.com/app/profile/federal.trade.commission/viz/AgeandFraud/Infographic">lose more money</a> than younger victims. Those losses can have <a href="https://doi.org/10.1057/sj.2012.11">devastating consequences</a>, especially since older adults have limited time to recoup – dramatically reducing their independence, health and well-being.</p> <p>But older adults have been largely neglected in research on this burgeoning type of crime. We are <a href="https://ebnerlab.psych.ufl.edu/natalie-c-ebner-phd/">psychologists who study social cognition</a> and <a href="https://ebnerlab.psych.ufl.edu/didem-pehlivanoglu/">decision-making</a>, and <a href="https://ebnerlab.psych.ufl.edu/">our research lab</a> at the University of Florida is aimed at understanding the factors that shape vulnerability to deception in adulthood and aging.</p> <h2>Defining vulnerability</h2> <p>Financial exploitation involves a variety of exploitative tactics, such as coercion, manipulation, undue influence and, frequently, some sort of deception.</p> <p>The majority of current research focuses on <a href="https://doi.org/10.1002/acp.3052">people’s ability to distinguish between truth and lies</a> during interpersonal communication. However, deception occurs in many contexts – increasingly, over the internet.</p> <p>Our lab conducts laboratory experiments and real-world studies to measure susceptibility under various conditions: investment games, lie/truth scenarios, phishing emails, text messages, fake news and deepfakes – fabricated videos or images that are created by artificial intelligence technology.</p> <p>To study how people respond to deception, we use measures like surveys, brain imaging, behavior, eye movement and heart rate. We also collect health-related biomarkers, such as being a carrier of <a href="https://pubmed.ncbi.nlm.nih.gov/8346443/">gene variants</a> that increase risk for Alzheimer’s disease, to identify individuals with particular vulnerability.</p> <p>And <a href="https://doi.org/10.20900/agmr20230007">our work</a> shows that an older adult’s ability to detect deception is not just about their individual characteristics. It also depends on how they are being targeted.</p> <figure class="align-center zoomable"><a href="https://images.theconversation.com/files/593784/original/file-20240513-16-j9zy1i.png?ixlib=rb-4.1.0&amp;q=45&amp;auto=format&amp;w=1000&amp;fit=clip"><img src="https://images.theconversation.com/files/593784/original/file-20240513-16-j9zy1i.png?ixlib=rb-4.1.0&amp;q=45&amp;auto=format&amp;w=754&amp;fit=clip" sizes="(min-width: 1466px) 754px, (max-width: 599px) 100vw, (min-width: 600px) 600px, 237px" srcset="https://images.theconversation.com/files/593784/original/file-20240513-16-j9zy1i.png?ixlib=rb-4.1.0&amp;q=45&amp;auto=format&amp;w=600&amp;h=339&amp;fit=crop&amp;dpr=1 600w, https://images.theconversation.com/files/593784/original/file-20240513-16-j9zy1i.png?ixlib=rb-4.1.0&amp;q=30&amp;auto=format&amp;w=600&amp;h=339&amp;fit=crop&amp;dpr=2 1200w, https://images.theconversation.com/files/593784/original/file-20240513-16-j9zy1i.png?ixlib=rb-4.1.0&amp;q=15&amp;auto=format&amp;w=600&amp;h=339&amp;fit=crop&amp;dpr=3 1800w, https://images.theconversation.com/files/593784/original/file-20240513-16-j9zy1i.png?ixlib=rb-4.1.0&amp;q=45&amp;auto=format&amp;w=754&amp;h=426&amp;fit=crop&amp;dpr=1 754w, https://images.theconversation.com/files/593784/original/file-20240513-16-j9zy1i.png?ixlib=rb-4.1.0&amp;q=30&amp;auto=format&amp;w=754&amp;h=426&amp;fit=crop&amp;dpr=2 1508w, https://images.theconversation.com/files/593784/original/file-20240513-16-j9zy1i.png?ixlib=rb-4.1.0&amp;q=15&amp;auto=format&amp;w=754&amp;h=426&amp;fit=crop&amp;dpr=3 2262w" alt="A figure with two circles and an arrow between them. One circle shows icons that symbolize individual susceptibility to deception -- like a brain, and a walking cane -- while the other has icons of types of deception, like mail or a text message." /></a><figcaption><span class="caption">Vulnerability depends not only on the person, but also the type of fraud being used.</span> <span class="attribution">Natalie Ebner and Didem Pehlivanoglu</span></figcaption></figure> <h2>Individual risk factors</h2> <p>Better cognition, social and emotional capacities, and brain health are all associated with less susceptibility to deception.</p> <p>Cognitive functions, such as how quickly our brain processes information and how well we remember it, <a href="https://doi.org/10.1177/1745691619827511">decline with age</a> and impact decision-making. For example, among people around 70 years of age or older, declines in analytical thinking are associated with <a href="https://doi.org/10.1037/xap0000426">reduced ability to detect false news stories</a>.</p> <p>Additionally, low memory function in aging is associated with <a href="https://doi.org/10.1093/geronb/gby036">greater susceptibility to email phishing</a>. Further, according to recent <a href="https://osf.io/preprints/osf/6f2y9">research</a>, this correlation is specifically pronounced among older adults who carry a gene variant that is a genetic risk factor for developing Alzheimer’s disease later in life. Indeed, some research suggests that greater financial exploitability may serve as <a href="https://doi.org/10.1016/j.neubiorev.2022.104773">an early marker</a> of disease-related cognitive decline.</p> <p>Social and emotional influences are also crucial. Negative mood can enhance somebody’s ability to detect lies, while <a href="https://doi.org/10.1037/xap0000426">positive mood in very old</a> age can impair a person’s ability to detect fake news.</p> <p>Lack of support and loneliness exacerbate susceptibility to deception. Social isolation during the COVID-19 pandemic has led to <a href="https://doi.org/10.1093/gerona/glaa077">increased reliance on online platforms</a>, and older adults with lower digital literacy are <a href="https://doi.org/10.1093/geront/gnac188">more vulnerable to fraudulent emails and robocalls</a>.</p> <p>Finally, an individual’s brain and body responses play a critical role in susceptibility to deception. One important factor is <a href="https://doi.org/10.1016/j.tins.2020.10.007">interoceptive awareness</a>: the ability to accurately read our own body’s signals, like a “gut feeling.” This awareness is correlated with <a href="https://doi.org/10.1093/geroni/igad104.3714">better lie detection</a> in older adults.</p> <p>According to <a href="https://doi.org/10.1093/gerona/glx051">a first study</a>, financially exploited older adults had a significantly smaller size of insula – a brain region key to integrating bodily signals with environmental cues – than older adults who had been exposed to the same threat but avoided it. Reduced insula activity is also related to greater difficulty <a href="https://doi.org/10.1073/pnas.1218518109">picking up on cues</a> that make someone appear less trustworthy.</p> <h2>Types of effective fraud</h2> <p>Not all deception is equally effective on everyone.</p> <p><a href="https://doi.org/10.1145/3336141">Our findings</a> show that email phishing that relies on reciprocation – people’s tendency to repay what another person has provided them – was more effective on older adults. Younger adults, on the other hand, were more likely to fall for phishing emails that employed scarcity: people’s tendency to perceive an opportunity as more valuable if they are told its availability is limited. For example, an email might alert you that a coin collection from the 1950s has become available for a special reduced price if purchased within the next 24 hours.</p> <p>There is also evidence that as we age, we have greater difficulty detecting the “wolf in sheep’s clothing”: someone who appears trustworthy, but is not acting in a trustworthy way. In <a href="https://doi.org/10.1038/s41598-023-50500-x">a card-based gambling game</a>, we found that compared with their younger counterparts, older adults are more likely to select decks presented with trustworthy-looking faces, even though those decks consistently resulted in negative payouts. Even after learning about untrustworthy behavior, older adults showed greater difficulty overcoming their initial impressions.</p> <h2>Reducing vulnerability</h2> <p>Identifying who is especially at risk for financial exploitation in aging is crucial for preventing victimization.</p> <p>We believe interventions should be tailored, instead of a one-size-fits-all approach. For example, perhaps machine learning algorithms could someday determine the most dangerous types of deceptive messages that certain groups encounter – such as in text messages, emails or social media platforms – and provide on-the-spot warnings. Black and Hispanic consumers are <a href="https://www.ftc.gov/system/files/documents/reports/combating-fraud-african-american-latino-communities-ftcs-comprehensive-strategic-plan-federal-trade/160615fraudreport.pdf">more likely to be victimized</a>, so there is also a dire need for interventions that resonate with their communities.</p> <p>Prevention efforts would benefit from taking a holistic approach to help older adults reduce their vulnerability to scams. Training in <a href="https://doi.org/10.1007/s40520-019-01259-7">financial, health</a> and <a href="https://www.nature.com/articles/s41598-022-08437-0.pdf">digital literacy</a> are important, but so are programs to <a href="https://doi.org/10.1186/s12889-021-10363-1">address loneliness</a>.</p> <p>People of all ages need to keep these lessons in mind when interacting with online content or strangers – but not only then. Unfortunately, financial exploitation often comes from individuals close to the victim.<img style="border: none !important; box-shadow: none !important; margin: 0 !important; max-height: 1px !important; max-width: 1px !important; min-height: 1px !important; min-width: 1px !important; opacity: 0 !important; outline: none !important; padding: 0 !important;" src="https://counter.theconversation.com/content/227991/count.gif?distributor=republish-lightbox-basic" alt="The Conversation" width="1" height="1" /></p> <p><a href="https://theconversation.com/profiles/natalie-c-ebner-1527554"><em>Natalie C. Ebner</em></a><em>, Professor of Psychology, <a href="https://theconversation.com/institutions/university-of-florida-1392">University of Florida</a> and <a href="https://theconversation.com/profiles/didem-pehlivanoglu-1527551">Didem Pehlivanoglu</a>, Postdoctoral Researcher, Psychology, <a href="https://theconversation.com/institutions/university-of-florida-1392">University of Florida</a></em></p> <p><em>Image credits: Shutterstock</em></p> <p><em>This article is republished from <a href="https://theconversation.com">The Conversation</a> under a Creative Commons license. Read the <a href="https://theconversation.com/are-older-adults-more-vulnerable-to-scams-what-psychologists-have-learned-about-whos-most-susceptible-and-when-227991">original article</a>.</em></p>

Money & Banking

Placeholder Content Image

"This is horrific": Queen icon calls out convincing scam

<p>Brian May has spoken out after becoming the target of a dangerous scam, urging people to be careful online. </p> <p>The guitarist of iconic rock band Queen was made aware of the scam by a fan, who sent him the TikTok of what seems to be May himself offering concert tickets at a discount. </p> <p>The video, which is actually AI-generated and has nothing to do with May or with Queen, shows the rockstar offering music fans the chance to see a concert from backstage. </p> <p>“I hope you’re all well out there,” says the fake Brian May in the video. “Some good news. Backstage tickets for my next show in your cities are now going for only $800, which were previously $2000. I’m only selecting 10 people in the comments, so if you’re ready to make payment, comment, ‘ready’.”</p> <p>May responded to the post publicly, sharing his horror and anger with fans over the “creepy” video, saying, “My God. This is horrific.”</p> <p>“I suppose this is now so easy to do – and there are always people who will sink to any depths to try to make a quick buck. Disgusting.”</p> <p>He continued, “Thanks for the alert dear (TikTok username) stereojazz. I’ve alerted our team and hopefully we can squash this.”</p> <p>Fans were quick to comment that they had almost been fooled by the convincing video. </p> <p>“That they abuse your beautiful personality for this scam hurts even more and is really scary. I hate it,” commented one. </p> <p>“It is insanely terrifying what AI can do these days,” wrote another.</p> <p><em>Image credits: TikTok</em></p>

Legal

Placeholder Content Image

Romance fraud doesn’t only happen online – it can turn into real-world deception

<div class="theconversation-article-body"><em><a href="https://theconversation.com/profiles/cassandra-cross-122865">Cassandra Cross</a>, <a href="https://theconversation.com/institutions/queensland-university-of-technology-847">Queensland University of Technology</a></em></p> <p>We often think of fraudsters as people on the opposite side of the world. They will manipulate and exploit victims through words on a computer screen, or loving messages through the phone. But romance fraud can also happen in person, with the fraudster sleeping in the bed beside you.</p> <p>This was the circumstance Australian writer Stephanie Wood found herself in. It’s also the basis for the new <a href="https://www.paramountanz.com.au/news/fake-breaks-subscription-and-streaming-records-on-paramount/">television series Fake</a>, currently screening on Paramount+. A dramatisation of Wood’s powerful memoir by the same name, the series outlines the many lies and betrayals of an intimate relationship.</p> <p>It’s a brutal insight into the world of deception which characterises romance fraud.</p> <h2>When love hurts</h2> <p>Romance fraud (or romance scams) is what it sounds like – offenders use the guise of a relationship to gain a financial reward. In most cases, it’s through the direct transfer of money from the victim, but it can also be through using personal credentials to commit identity crimes.</p> <p>From the outside, it’s hard to understand how romance fraud is so effective. However, <a href="https://eprints.qut.edu.au/233966/">research has documented</a> the range of grooming techniques, social engineering tactics and methods of psychological abuse deployed by offenders. Offenders know exactly what to do and say to gain the compliance of their victim.</p> <hr /> <hr /> <p>Offenders target a person’s vulnerability and work hard to build strong levels of trust. There are endless calls, texts and emails that create a bond. Then follows the inevitable “crisis”, whereby the offender needs money urgently for a health emergency, criminal justice situation, business need or even a <a href="https://www.accc.gov.au/media-release/romance-baiting-scams-on-the-rise">cryptocurrency investment</a> opportunity.</p> <p>For many, this can result in ongoing payments and substantial losses. Over <a href="https://www.accc.gov.au/about-us/publications/serial-publications/targeting-scams-reports-on-scams-activity/targeting-scams-report-of-the-accc-on-scams-activity-2023">A$200 million</a> was reported lost by Australians to this fraud type in 2023, but this is likely a gross underestimation of actual figures. It also doesn’t capture the many <a href="https://www.aic.gov.au/sites/default/files/2020-05/29-1314-FinalReport.pdf">non-financial harms</a>, including physical and emotional declines in wellbeing.</p> <p>When the relationship finally ends, it’s too late. The money is gone, the extent of the deception is laid bare, and recovery from the heartache and loss is a constant battle.</p> <p>There is a well-documented “<a href="https://journals.sagepub.com/doi/full/10.1177/1748895815603773">double hit</a>” of victimisation, with individuals needing to grieve the relationship as well as any financial losses.</p> <h2>Seeing is not believing</h2> <p>There are countless incidents of romance fraud where the offender and victim never meet: the deception takes place entirely online. But it’s important to know fraudsters also operate in person.</p> <p>Wood’s memoir details an extraordinary level of lies and dishonesty presented to her throughout her relationship. Stories that laid the groundwork for later fabrications. Stories that were deliberate and calculated in how they were used to gain her trust, and later used against her.</p> <p>The motivations of these real-world deceivers are not always straightforward. Often it’s about money, but not always. For Wood, not being asked for money allayed potential suspicions, but it didn’t reduce her feelings of loss and emotional devastation upon discovering the extent of the lies.</p> <figure><iframe src="https://www.youtube.com/embed/K_1Akqhjy6M?wmode=transparent&amp;start=0" width="440" height="260" frameborder="0" allowfullscreen="allowfullscreen"></iframe></figure> <p>Wood is by no means alone in her experience. Marketing executive Tracy Hall endured a similarly sophisticated and all-encompassing level of deceit in her relationship with <a href="https://www.theguardian.com/australia-news/2019/jun/20/conman-hamish-mclaren-jailed-for-up-to-16-years-after-swindling-76m-from-victims">convicted conman Hamish McLaren</a> (known to her as Max Tavita).</p> <p>In her book, <a href="https://tracyhall.com.au/the-last-victim">The Last Victim</a>, Hall recounts snippets of their daily lives over a 16-month period, with McLaren portraying himself as a successful professional in finance. His mail was addressed to Max Tavita and his phone conversations were with real people. Yet his whole identity and the world he represented to Hall was a complete fabrication.</p> <p>The experiences of Wood and Hall highlight the sheer depth of elaborate deception that can be perpetrated in an intimate relationship. Critically, it highlights romance fraud isn’t relegated to an online environment.</p> <h2>How can we prevent romance fraud?</h2> <p>There is an overwhelming amount of <a href="https://eprints.qut.edu.au/83702/">shame and stigma</a> associated with romance fraud. The dynamics of these deceptive relationships are misunderstood, and this perpetuates negative stereotypes and a discourse of victim blaming, even from friends and family.</p> <p>In hindsight, the warning signs might seem obvious, but fraudsters tend to effectively disguise these in real time and deploy deliberate tactics to overcome any suspicion.</p> <p>We must all create a culture that empowers victims to come forward to raise awareness. This isn’t intended to create fear or anxiety, but to normalise the threat fraud poses, and to allow for difficult conversations if it happens. Ongoing silence from victims only favours the offender.</p> <h2>How to protect yourself from romance fraud</h2> <p>It’s inevitable we’ll continue to swipe right in our efforts to find love. But keep a healthy level of scepticism and an open dialogue with family and friends in any quest for a new relationship.</p> <p>Don’t be afraid to conduct your own searches of people, places and situations presented to you in a relationship. There is a memorable moment in Fake where the protagonist refutes her friend’s offer of assistance, saying “this is a love story not an investigation”. Sadly, sometimes an investigation is necessary.</p> <p>No matter what the circumstance or the person, think carefully before sending any money. Only give what you are willing to lose.</p> <p>Deception comes in many forms. We must recognise it for what it is, and the impact it has on victims. But we must also not give into those who lie, and let them define who we are or dictate our ability to trust.</p> <p><em>If you or someone you know has been a victim of romance fraud, you can report it to <a href="https://www.cyber.gov.au/report-and-recover/report">ReportCyber</a>. For support, contact <a href="https://www.idcare.org/">iDcare</a>. For prevention advice, consult <a href="https://www.scamwatch.gov.au/">Scamwatch</a>.</em><!-- Below is The Conversation's page counter tag. Please DO NOT REMOVE. --><img style="border: none !important; box-shadow: none !important; margin: 0 !important; max-height: 1px !important; max-width: 1px !important; min-height: 1px !important; min-width: 1px !important; opacity: 0 !important; outline: none !important; padding: 0 !important;" src="https://counter.theconversation.com/content/237653/count.gif?distributor=republish-lightbox-basic" alt="The Conversation" width="1" height="1" /><!-- End of code. If you don't see any code above, please get new code from the Advanced tab after you click the republish button. The page counter does not collect any personal data. More info: https://theconversation.com/republishing-guidelines --></p> <p><a href="https://theconversation.com/profiles/cassandra-cross-122865"><em>Cassandra Cross</em></a><em>, Associate Dean (Learning &amp; Teaching) Faculty of Creative Industries, Education and Social Justice, <a href="https://theconversation.com/institutions/queensland-university-of-technology-847">Queensland University of Technology</a></em></p> <p><em>Image credits: Shutterstock</em></p> <p><em>This article is republished from <a href="https://theconversation.com">The Conversation</a> under a Creative Commons license. Read the <a href="https://theconversation.com/romance-fraud-doesnt-only-happen-online-it-can-turn-into-real-world-deception-237653">original article</a>.</em></p> </div>

Legal

Placeholder Content Image

Been scammed? Here's how to financially recover

<p>Many people feel shame and embarrassment after realising they have been scammed. But you shouldn’t. You did nothing wrong; you are the victim of a crime. </p> <p>Not only are such feelings bad for your mental wellbeing, but they also often stop people reporting the scam or taking action to avoid further losses. </p> <p>Remember too that you’re not alone: victims reported more than 601,000 scams to the ACCC in 2023, together losing a staggering $2.74 billion. People of all ages, professions, and backgrounds have been affected. </p> <p>As hard as it may be, try to leave emotion aside and approach this like any other money matter – logically and methodically. Doing so will help you act faster and more decisively, which is crucial to your financial recovery. </p> <p>The following checklist will help you through this process:</p> <ul> <li><strong>Step 1 – Try to recoup your stolen money</strong></li> </ul> <p>Report the scam immediately. Contact your bank or card provider to stop the transaction being processed. Notify the company or marketplace where it occurred – they may have options to reverse the payment or for you to claim compensation for fraud. </p> <p>Also inform the ACCC’s Scamwatch and police if relevant, which may aid in tracking down the scammer and will help them alert the wider public on what to look out for. </p> <p>Unfortunately, the money is likely gone for good, but prompt action may just help you get some or all of it back. </p> <ul> <li><strong>Step 2 – Secure your accounts from further thefts</strong></li> </ul> <p>Once scammers have found a way to steal money, they often go back to try for more. Don’t let them! </p> <p>Freeze or cancel affected debit and credit cards, accounts etc. Change and strengthen all your passwords. Set up two-factor authentication if you haven’t already. Remove any suspicious applications on electronic devices. </p> <p>Double check the registrations of any business, adviser or tradesperson before engaging their services. Regularly check your superannuation, investments etc. to monitor for any inconsistencies.</p> <ul> <li><strong>Step 3 – Safeguard your cash flow</strong></li> </ul> <p>Don’t multiplying your losses by racking up new debts to cover the stolen money. That means limiting the use of credit cards, payday lenders and Buy Now, Pay Later schemes. Consider paying with cash instead to help you stick to a budget.</p> <p>If you have lost everything, register with Centrelink for income support. You may also be able to apply for hardship provisions with your bank, phone and energy providers and other essential services.</p> <ul> <li><strong>Step 4 – Get reputable advice</strong></li> </ul> <p>Legal advice may be able to get you out of bogus contracts, like loans or phone plans, and help you in the event your personal information has been stolen (which can be used in various ways to steal money). If you can’t afford a lawyer, there are free alternatives such as Legal Aid or Community Legal Centres. Specialist services such as the Women’s Legal Service may offer support where partner coercion or domestic abuse is involved.</p> <p>Accounting and financial advice may also help you navigate assistance options and longer term recovery efforts.</p> <ul> <li><strong>Step 5 – Rebuild your finances</strong></li> </ul> <p>Your ability to rebuild your finances after a scam will depend on a range of factors, including how much was lost plus your age and circumstances.</p> <p>You could seek to increase your earnings and/or cut your spending by tweaking your household budget, delaying retirement, or temporarily taking a second job to boost your income. </p> <p>Another option is to make your remaining finances work harder than before, such as adjusting your investment strategies (e.g. changing your risk weightings or selling assets) including within your superannuation or accessing equity in your home.</p> <p>If you’re a self-funded retiree, you may now qualify for a part or full pension if your scam losses push your total assets below the means test threshold.</p> <p>Ultimately, the most important things when dealing with the fallout from a scam is to look after yourself and protect what you have left.</p> <p>Scammers have already taken off with your dollars. Don’t let them steal your sense too!</p> <p><em><strong>Helen Baker is a licensed Australian financial adviser and author of On Your Own Two Feet: The Essential Guide to Financial Independence for all Women. Helen is among the 1% of financial planners who hold a master’s degree in the field. Proceeds from book sales are donated to charities supporting disadvantaged women and children. Find out more at <a href="http://www.onyourowntwofeet.com.au/">www.onyourowntwofeet.com.au</a></strong></em></p> <p><em><strong>Disclaimer: The information in this article is of a general nature only and does not constitute personal financial or product advice. Any opinions or views expressed are those of the authors and do not represent those of people, institutions or organisations the owner may be associated with in a professional or personal capacity unless explicitly stated. Helen Baker is an authorised representative of BPW Partners Pty Ltd AFSL 548754.</strong></em></p> <p><em>Image </em><em>credits: Shutterstock </em></p>

Money & Banking

Placeholder Content Image

Costly mistakes to avoid when travelling

<p dir="ltr">While travelling the world is an exciting and joyous way to spend your time, getting caught up in devious scams can sour even the best holiday.</p> <p dir="ltr">Whenever you hit the road, there are a few measures you can take to avoid being hit by hackers and sneaky scammers, and enjoy your holiday to the fullest. </p> <p dir="ltr">When it comes to online scams, some countries are more vulnerable than others, as NAB Executive, Group Investigations Chris Sheehan says.</p> <p dir="ltr">"Just like you'd plan visas and check the weather at your destination, it's also vital to be aware of common scams in the countries you're visiting so you can recognise the red flags and protect yourself," he said. </p> <p dir="ltr">When travelling in a new country, it’s important to be wary of accommodation or booking website impersonation scams, ticket scams for major events, as well as overcharging or wrong charge scams.</p> <p dir="ltr">"The pressure to act now is a red flag in ticket and accommodation scams, while overcharging or wrong charging scams play on distraction and a lack of detail," Chris says.</p> <p dir="ltr">"Letting your bank know where and when you're travelling can help with more accurately monitoring your transactions for suspicious activity while you're away."</p> <p dir="ltr">Another thing to be wary of when on holiday is to avoid posting your real-time location on social media, or inadvertently sharing sensitive travel documents can expose you to serious risks.</p> <p dir="ltr">Broadcasting your whereabouts can make you vulnerable to various risks, including burglary, stalking, and other personal safety threats, while criminals can take advantage of the information you share to target you or your unoccupied home.</p> <p dir="ltr">Travel expert Trevor Cooke from <a href="https://earthweb.com/">EarthWeb</a> says its best to wait until you’ve moved on until you share your location online. </p> <p dir="ltr">"If you really want to share the location of where you travelled to, wait until you're already at the next location or back home," he says.</p> <p dir="ltr">"By delaying your posts, you can still share your experiences without compromising your safety."</p> <p dir="ltr">Another thing to keep in mind when you’re next hitting the road is to be wary about unknowingly posting personal information online, such as your boarding pass. </p> <p dir="ltr">"Many people don't realise how much personal information is on your boarding pass and other temporary travel documents," says security expert Trevor.</p> <p dir="ltr">"Boarding passes, for instance, contain sensitive data such as your full name, frequent flyer number, and a barcode that can be scanned to reveal even more information. This data can be used by criminals for identity theft, unauthorised access to your accounts, and other malicious activities."</p> <p dir="ltr">"To protect yourself, always double-check that any picture you upload does not include your boarding pass, travel itinerary, hotel receipts, or any other sensitive information," Trevor adds.</p> <p dir="ltr"><em>Image credits: Shutterstock </em></p>

Travel Tips

Placeholder Content Image

How to avoid 6 common tourist scams

<p>Often when people are on holidays their focus is on relaxing or seeing the sights of the area. But if you don’t keep your wits about you, it’s possible you might end up losing everything to scammers who will do anything to get their hands on your belongings.</p> <p>Here we have six common scams to look out for while you are travelling abroad.</p> <p><strong>Scam 1:</strong> You are in a busy bar in a tourist friendly area when some locals ask where you’re from and offer to buy you a drink. Without thinking, you accept the drink and then find yourself waking up hours later without any of your belongings as you’ve had your drink spiked.</p> <p><span style="text-decoration: underline;"><em>Solution:</em></span> If people seem too friendly, be aware that they may be scammers. Don’t accept drinks from people you don’t know, and don’t leave your drink unattended to use the bathroom.</p> <p><strong>Scam 2:</strong> You are about to put your handbag and computer on the conveyer belt to go through the scanner. The people in front of you walk through the metal detector and while one goes through, the other sets off the alarms. They step back into where you are standing and take their time removing wallets and coins from their pockets. While you are waiting for your turn to walk through the metal detector, the other person has taken your belongings and is long gone.</p> <p><span style="text-decoration: underline;"><em>Solution:</em></span> Don’t place your items on the conveyer belt until there is no one else waiting in front of you to go through the metal detector.</p> <p><strong>Scam 3:</strong> In a busy area such as after a concert or a busy night like New Year’s Eve it can be impossible to get public transport or a taxi back to your hotel. A friendly looking guy comes by and offers you a lift for a reasonable fee using his private car. The scam itself can then range from being charged an exorbitant amount when you arrive at your hotel – or you could even find yourself robbed and dropped by the side of the road with no way home.</p> <p><span style="text-decoration: underline;"><em>Solution:</em></span> However tempting it is, never get in the car with an unlicensed taxi driver. This is even more important to note if you are travelling alone.</p> <p><strong>Scam 4:</strong> While you are waiting with your luggage for a train or bus, a passer-by appears to drop their wallet and walk off without noticing. You might try to do the right thing by grabbing the wallet and running after the person to return it. By the time you get back, your luggage is missing.</p> <p><span style="text-decoration: underline;"><em>Solution:</em></span> When travelling alone, never leave your items unattended even if it means you don’t help someone when you normally would. This is especially true in airports where baggage will quickly be confiscated if left alone.</p> <p><strong>Scam 5:</strong> You’re taking in the sights when a couple of men dressed as policemen approach you. They demand to see your wallet and let you know that counterfeit money has been given to tourists in the area. When your wallet is returned it has had much of the contents removed.</p> <p><span style="text-decoration: underline;"><em>Solution:</em></span> Police would never demand to see your wallet. If something doesn’t feel right, suggest that you continue the discussion at the nearest police station as you don’t feel comfortable. Most likely they will not push their luck.</p> <p><strong>Scam 6:</strong> You receive a phone call in your hotel room late at night from someone claiming to be from the front desk. They apologise for the late call but request that you just confirm your credit card details as their system is playing up. You read out the numbers and hang up. Before too long your credit card has rung up a huge bill as this was a scammer calling you, not a staff member.</p> <p><span style="text-decoration: underline;"><em>Solution:</em></span> Organise payment in person by letting the caller know that you will come down to the front desk to discuss it.</p> <p><em>Image credits: Getty Images </em></p>

Travel Tips

Placeholder Content Image

What ‘psychological warfare’ tactics do scammers use, and how can you protect yourself?

<p><em><a href="https://theconversation.com/profiles/mike-johnstone-106590">Mike Johnstone</a>, <a href="https://theconversation.com/institutions/edith-cowan-university-720">Edith Cowan University</a> and <a href="https://theconversation.com/profiles/georgia-psaroulis-1513050">Georgia Psaroulis</a>, <a href="https://theconversation.com/institutions/edith-cowan-university-720">Edith Cowan University</a></em></p> <p>Not a day goes by without a headline <a href="https://www.vice.com/en/article/qjvaym/people-share-worst-scam-stories">about a victim being scammed</a> and losing money. We are constantly warned about new scams and staying safe from cybercriminals. Scamwatch has <a href="https://www.scamwatch.gov.au/research-and-resources/tools-resources/online-resources/spot-the-scam-signs">no shortage of resources</a>, too.</p> <p>So why are people still getting scammed, and sometimes spectacularly so?</p> <p>Scammers use sophisticated psychological techniques. They exploit our deepest human vulnerabilities and bypass rational thought to tap into our emotional responses.</p> <p>This “<a href="https://www.thecut.com/article/amazon-scam-call-ftc-arrest-warrants.html">psychological warfare</a>” coerces victims into making impulsive decisions. Sometimes scammers spread their methods around many potential victims to see who is vulnerable. Other times, criminals focus on a specific person.</p> <p>Let’s unpack some of these psychological techniques, and how you can defend against them.</p> <h2>1. Random phone calls</h2> <p>Scammers start with small requests to establish a sense of commitment. After agreeing to these minor requests, we are more likely to comply with larger demands, driven by a desire to act consistently.</p> <p>The call won’t come from a number in your contacts or one you recognise, but the scammer may pretend to be someone you’ve engaged to work on your house, or perhaps one of your children using a friend’s phone to call you.</p> <p>If it is a scammer, maybe keeping you on the phone for a long time gives them an opportunity to find out things about you or people you know. They can use this info either immediately or at a later date.</p> <h2>2. Creating a sense of urgency</h2> <p>Scammers fabricate scenarios that require immediate action, like claiming a bank account is at risk of closure or an offer is about to expire. This tactic aims to prevent victims from assessing the situation logically or seeking advice, pressuring them into rushed decisions.</p> <p>The scammer creates an artificial situation in which you are frightened into doing something you wouldn’t ordinarily do. Scam calls <a href="https://theconversation.com/we-have-filed-a-case-under-your-name-beware-of-tax-scams-theyll-be-everywhere-this-eofy-162171">alleging to be from the Australian Tax Office</a> (ATO) are a great example. You have a debt to pay (apparently) and things will go badly if you don’t pay <em>right now</em>.</p> <p>Scammers play on your emotions to provoke reactions that cloud judgement. They may threaten legal trouble to instil fear, promise high investment returns to exploit greed, or share fabricated distressing stories to elicit sympathy and financial assistance.</p> <h2>3. Building rapport with casual talk</h2> <p>Through extended conversation, scammers build a psychological commitment to their scheme. No one gets very far by just demanding your password, but it’s natural to be friendly with people who are friendly towards us.</p> <p>After staying on the line for long periods of time, the victim also becomes cognitively fatigued. This not only makes the victim more open to suggestions, but also isolates them from friends or family who might recognise and counteract the scam.</p> <h2>4. Help me to help you</h2> <p>In this case, the scammer creates a situation where they help you to solve a real or imaginary problem (that they actually created). They work their “IT magic” and the problem goes away.</p> <p>Later, they ask you for something you wouldn’t normally do, and you do it because of the “social debt”: they helped you first.</p> <p>For example, a hacker might attack a corporate network, causing it to slow down. Then they call you, pretending to be from your organisation, perhaps as a recent hire not yet on the company’s contact list. They “help” you by turning off the attack, leaving you suitably grateful.</p> <p>Perhaps a week later, they call again and ask for sensitive information, such as the CEO’s password. You <em>know</em> company policy is to not divulge it, but the scammer will ask if you remember them (of course you do) and come up with an excuse for why they really need this password.</p> <p>The balance of the social debt says you will help them.</p> <h2>5. Appealing to authority</h2> <p>By posing as line managers, officials from government agencies, banks, or other authoritative bodies, scammers exploit our natural tendency to obey authority.</p> <p>Such scams operate at varying levels of sophistication. The simple version: your manager messages you with an <em>urgent</em> request to purchase some gift cards and send through their numbers.</p> <p>The complex version: your manager calls and asks to urgently transfer a large sum of money to an account you don’t recognise. You do this because <a href="https://www.wsj.com/articles/fraudsters-use-ai-to-mimic-ceos-voice-in-unusual-cybercrime-case-11567157402">it sounds exactly</a> like your manager on the phone – but the scammer <a href="https://www.forbes.com/sites/thomasbrewster/2021/10/14/huge-bank-fraud-uses-deep-fake-voice-tech-to-steal-millions/?sh=1329b80e7559">is using a voice deepfake</a>. In a recent major case in Hong Kong, such a scam even involved a <a href="https://edition.cnn.com/2024/02/04/asia/deepfake-cfo-scam-hong-kong-intl-hnk/index.html">deepfake video call</a>.</p> <p>This is deeply challenging because artificial intelligence tools, such as Microsoft’s VALL-E, can create <a href="https://arstechnica.com/information-technology/2023/01/microsofts-new-ai-can-simulate-anyones-voice-with-3-seconds-of-audio/">a voice deepfake</a> using just three seconds of sampled audio from a real person.</p> <h2>How can you defend against a scam?</h2> <p>First and foremost, <strong>verify identity</strong>. Find another way to contact the person to verify who they are. For example, you can call a generic number for the business and ask to be connected.</p> <p>In the face of rampant voice deepfakes, it can be helpful to <strong>agree on a “safe word” with your family members</strong>. If they call from an unrecognised number and you don’t hear the safe word just hang up.</p> <p>Watch out for <strong>pressure tactics</strong>. If the conversation is moving too fast, remember that someone else’s problem is not yours to solve. Stop and run the problem past a colleague or family member for a sanity check. A legitimate business will have no problem with you doing this.</p> <p>Lastly, if you are not sure about even the slightest detail, the simplest thing is to hang up or not respond. If you really owe a tax debt, the ATO will write to you.<!-- Below is The Conversation's page counter tag. Please DO NOT REMOVE. --><img style="border: none !important; box-shadow: none !important; margin: 0 !important; max-height: 1px !important; max-width: 1px !important; min-height: 1px !important; min-width: 1px !important; opacity: 0 !important; outline: none !important; padding: 0 !important;" src="https://counter.theconversation.com/content/223959/count.gif?distributor=republish-lightbox-basic" alt="The Conversation" width="1" height="1" /><!-- End of code. If you don't see any code above, please get new code from the Advanced tab after you click the republish button. The page counter does not collect any personal data. More info: https://theconversation.com/republishing-guidelines --></p> <p><a href="https://theconversation.com/profiles/mike-johnstone-106590"><em>Mike Johnstone</em></a><em>, Security Researcher, Associate Professor in Resilient Systems, <a href="https://theconversation.com/institutions/edith-cowan-university-720">Edith Cowan University</a> and <a href="https://theconversation.com/profiles/georgia-psaroulis-1513050">Georgia Psaroulis</a>, Postdoctoral research fellow, <a href="https://theconversation.com/institutions/edith-cowan-university-720">Edith Cowan University</a></em></p> <p><em>Image credits: Shutterstock</em></p> <p><em>This article is republished from <a href="https://theconversation.com">The Conversation</a> under a Creative Commons license. Read the <a href="https://theconversation.com/what-psychological-warfare-tactics-do-scammers-use-and-how-can-you-protect-yourself-223959">original article</a>.</em></p>

Money & Banking

Placeholder Content Image

How to protect yourself from cyber-scammers over the festive period

<p><em><a href="https://theconversation.com/profiles/rachael-medhurst-1408437">Rachael Medhurst</a>, <a href="https://theconversation.com/institutions/university-of-south-wales-1586">University of South Wales</a></em></p> <p>The festive season is a time for joy, family and festive cheer. However, it’s also a prime target for cybercriminals. As online shopping ramps up, so does the risk of falling prey to cyber-attacks. That’s why it’s crucial to be extra vigilant about your <a href="https://blog.tctg.co.uk/12-cyber-security-tips-of-christmas">cybersecurity</a> during this time.</p> <p>Here are some essential tips to safeguard yourself and your data during the festive period:</p> <h2>Phishing</h2> <p>Phishing is when criminals use scam emails, text messages or phone calls to trick their victims. Their <a href="https://www.ncsc.gov.uk/collection/phishing-scams">goal</a> is often to make you visit a certain website, which may download a virus on to your computer, or steal bank details or other personal data.</p> <p>This type of scam tends to <a href="https://www.egress.com/blog/phishing/holiday-phishing-scam-guide">increase</a> at this time due to the amount of people having bought or received new gadgets and technology.</p> <p>Look out for there being no direct reference to your name in any communications, with wording such as “Dear Sir/Madam” or other terms such as “valued customer” being used instead. Grammar and spelling mistakes are also often present.</p> <p>Be wary of any suspicious links or attachments within emails too, and don’t click them. It’s better to contact the company directly to check if the message is genuine. You can also <a href="https://www.ncsc.gov.uk/collection/phishing-scams">report</a> suspicious messages and phishing scams to the government’s National Cyber Security Centre.</p> <h2>Shopping safely online</h2> <p>The convenience of online shopping is undeniable, especially during the festive season. However, it’s crucial to prioritise your security when buying online.</p> <p>Before entering your personal and financial information on any website, ensure it’s legitimate and secure. Look for the “https” in the address bar and a <a href="https://theconversation.com/the-vast-majority-of-us-have-no-idea-what-the-padlock-icon-on-our-internet-browser-is-and-its-putting-us-at-risk-216581">padlock</a> icon, which indicates a secure and encrypted connection.</p> <p>When creating passwords for online shopping accounts, use strong, unique combinations of letters, numbers and symbols. Avoid using the same password for multiple accounts, as a breach on one site could compromise all your others.</p> <p>As with shopping in the real world, be cautious when encountering offers that are significantly below usual prices or which make extravagant promises. Always conduct thorough research on the seller and product before making a purchase. If a deal seems too good to be true, it probably is.</p> <p>And if you are out shopping in towns or city centres, there will often be a large number of public wifi options available to you. However, criminals can intercept the data that is transferred across such open and unsecured wifi. So, avoid using public wifi where possible, especially when conducting any financial transactions.</p> <h2>Social media</h2> <p>While social media platforms provide people with a means to keep in touch with family and friends over the festive period, they are often a goldmine for <a href="https://www.which.co.uk/consumer-rights/advice/how-to-spot-a-social-media-scam-aMtwF3u1XKGt">scams</a> and malware (software designed to disrupt, damage or gain unauthorised access to a computer). In the spirit of the festive season, people often share an abundance of personal information on social media, often without considering the potential consequences.</p> <p>This trove of data can make people vulnerable to cyber-attacks. Scammers can exploit this information to gain unauthorised access to social media accounts, steal personal information, or even commit identity theft. To protect yourself, be mindful of what you share.</p> <p>Be wary when interacting with posts and direct messages, especially if they contain suspicious links or attachments. Before clicking on anything, hover over the link to verify its destination. If it shows a website you don’t recognise or seems unrelated to the message, do not click on it. If you receive a message from someone you know but the content seems strange or out of character, contact them directly through a trusted channel to verify its authenticity.</p> <p>Likewise, be wary of messages containing urgent requests for money or personal information from businesses. Genuine organisations will never solicit sensitive details through social media.</p> <p>There are many buy and sell platforms available on social media. But while such platforms can be a great place to find a unique gift, it is also important to remember that not all sellers may be legitimate. So, it’s vital that you don’t share your bank details. If the seller sends a link to purchase the item, do not use it. When meeting to collect an item, it’s generally safer to use cash rather than transferring funds electronically.</p> <figure><iframe src="https://www.youtube.com/embed/aO858HyFbKI?wmode=transparent&amp;start=0" width="440" height="260" frameborder="0" allowfullscreen="allowfullscreen"></iframe><figcaption><span class="caption">Advice for staying safe online.</span></figcaption></figure> <h2>Package delivery scams</h2> <p>As well as being a time for giving and receiving gifts, the festive season is also ripe for cybercriminals to exploit the excitement surrounding <a href="https://www.citizensadvice.org.uk/about-us/about-us1/media/press-releases/scams-linked-to-parcel-deliveries-come-top-in-2023/">package deliveries</a>.</p> <p>Scammers often pose as legitimate delivery companies, sending emails or text messages claiming that a delivery attempt was unsuccessful or requiring additional fees for processing, or even customs clearance. Typically, these messages contain links or phone numbers that, when clicked or called, lead to fake websites or automated phone systems designed to collect personal information or payments.</p> <p>To protect yourself, always verify the legitimacy of any delivery notifications you receive. Check the sender’s email address or phone number against the official contact information for the delivery company. If the information doesn’t match or seems suspicious, don’t click any links or provide personal details.</p> <p>Legitimate delivery companies will never ask for upfront payment or sensitive information through unsolicited messages or calls.</p> <p>Remember, cybercriminals are skilled at manipulating the festive spirit to their advantage. Stay vigilant, exercise caution, and don’t let your excitement for gifts and deliveries compromise your cybersecurity.<!-- Below is The Conversation's page counter tag. Please DO NOT REMOVE. --><img style="border: none !important; box-shadow: none !important; margin: 0 !important; max-height: 1px !important; max-width: 1px !important; min-height: 1px !important; min-width: 1px !important; opacity: 0 !important; outline: none !important; padding: 0 !important;" src="https://counter.theconversation.com/content/218294/count.gif?distributor=republish-lightbox-basic" alt="The Conversation" width="1" height="1" /><!-- End of code. If you don't see any code above, please get new code from the Advanced tab after you click the republish button. The page counter does not collect any personal data. More info: https://theconversation.com/republishing-guidelines --></p> <p><a href="https://theconversation.com/profiles/rachael-medhurst-1408437"><em>Rachael Medhurst</em></a><em>, Course Leader and Senior Lecturer in Cyber Security NCSA, <a href="https://theconversation.com/institutions/university-of-south-wales-1586">University of South Wales</a></em></p> <p><em>Image credits: Getty Images </em></p> <p><em>This article is republished from <a href="https://theconversation.com">The Conversation</a> under a Creative Commons license. Read the <a href="https://theconversation.com/how-to-protect-yourself-from-cyber-scammers-over-the-festive-period-218294">original article</a>.</em></p>

Money & Banking

Placeholder Content Image

1 in 6 older adults fall victim to impersonation scams

<p>More older adults are likely to fall victim to scams than are currently recognised according to new US research. The problems are global. </p> <div class="copy"> <p>A research team from Rush University Medical Center in Chicago, US, says older Americans who aren’t cognitively impeded, are also at risk.  </p> <p>In their study <a href="https://10.1001/jamanetworkopen.2023.35319" target="_blank" rel="noreferrer noopener">published</a> today in <em>JAMA Network Open</em>, the group reports on a behavioural experiment where they targeted 644 adults aged 64-104 in Rush’s Memory and Aging Project – a local scheme that draws on participants from metropolitan Chicago to participate in research – with a pitch mimicking a real-world impersonation scam. </p> <p>The study’s fictitious ‘US Retirement Protection Task Force’ pitched itself to participants as a government social security initiative.  </p> <p>This USRPTF told participants via either post, email or a telephone call there’d been irregular activity on their Medicare or social security file and the inquiry was a routine account security check. As part of this, the fake agency asked participants to call a telephone hotline or login to a provided website to provide their details.  </p> <p>Over two-thirds of the study failed to respond to any attempts to obtain information by the phoney scheme.  </p> <p>The remainder were evenly split by either responding to requests for contact, but expressing scepticism at the authenticity of the USRPTF, or by responding and engaging with the request for information.  </p> <p>Those who were engaged with the request for information, but expressed doubts, were also those with the highest cognitive performance, and lowest proportion of dementia. They were also the most financially literate participants, while those who provided their details had the lowest literacy. </p> <p>Those who provided details were also found to have the lowest scam awareness of all participants.  </p> <p>Among this group, 1 in 10 willingly provided personal information and 1 in 5 provided details of their social security number.  </p> <p>“If extrapolated to a population level, these numbers are astounding and suggest that a very large number of older adults are at risk of victimisation,” the authors say. </p> <p>They also note that, given the use of a fictitious US government organisation name, the number of people vulnerable to well-organised scams is likely much higher.  </p> <p>Last year, the US National Council on Aging reported 92,371 older Americans were defrauded of a total of US$1.7 billion. Most were victims of government department impersonation, sweepstakes and robocall scams. Often such scams will simply demand payment while ‘spoofing’ the phone number of a government agency to add the veil of legitimacy. </p> <p>It’s a similar story around the world. This year, the Australian Competition and Consumer Commission found Australians lost a record $3.1 billion last year, mostly via phone scams. Australians over 65 years of age accounted for a quarter of losses and reports.  </p> <p>The UK’s Action Fraud initiative found Britons lost about ₤2.35 billion in the 2020/21 financial year, with those aged 50-69 most susceptible to falling victim.  </p> <div> <p align="center"> </p> <p><em>Image credits: Getty Images</em></p> <p><em><a href="https://cosmosmagazine.com/people/society/1-in-6-older-adults-fall-victim-to-impersonation-scams/">This article</a> was originally published on <a href="https://cosmosmagazine.com">Cosmos Magazine</a> and was written by <a href="null">Cosmos</a>. </em></p> </div> </div>

Legal

Placeholder Content Image

Hilarious reason dad couldn't be fooled by online scam

<p>One savvy dad has outwitted a scammer who posed as his daughter, after the scammer made one hilarious error. </p> <p>Ian Whitworth, a dad from Sydney, took to his LinkedIn page to share the message a scammer texted him in a classic phishing scam that targets parents. </p> <p>He shared the photo of what he thought was the "funniest phishing text any parent has ever received".</p> <p>The text read, "Hey dad, dropped my phone in the sink while doing the dishes. Its unresponsive this is my new number for now just text me here x."</p> <p>Despite the terrible grammar and punctuation that would immediately alert anyone to the possibility of a scam, it was something else that caught the dad's attention. </p> <p>Instead, Whitworth said it was the fact his daughter would never do the chore mentioned by the scammers.</p> <p>Still, he thought it was worth sharing a photo of the text in a bid to warn others, which he uploaded along with the comment, "Cybersecurity update. I just got this."</p> <p>"Perhaps the funniest phishing txt any parent has ever received. 'Doing the dishes', yeah, for sure."</p> <p>In a reply to one of the people who commented on his post, Whitworth joked that his daughter "at age four emerged from my parents' kitchen with a shocked look on her face. 'What's pop doing?'. He was washing up in the sink."</p> <p>Another commenter wrote, "Haha! There is NO WAY this is from my son or daughter, that's for sure."</p> <p>Another commenter said the giveaway that it wasn't from his own child was that they didn't immediately ask for money, to which Whitworth replied, "Ha, yeah, the phishers are like the seven step ladder of confidence before the money issue gets raised. Actual kids: MONEY NOW."</p> <p>According to the federal government's Scamwatch website run by the Australian Competition and Consumer Commission (ACCC), the "Friends/Family Hi Mum" impersonation scam was common.</p> <p>"Scammers send messages pretending to be a family member or a friend desperate for money," it said.</p> <p>"They say they have a new phone and they need you to pay money to help them out of a crisis."</p> <p>Scamwatch warns: "Don't assume a person you are dealing with is who they say they are" and offers the following advice.</p> <p>"If someone you know sends a message to say they have a new phone number, try to call them on the existing number you have for them, or message them on the new number with a question only they would know the answer to," it said.</p> <p>"That way you will know if they are who they say they are."</p> <p><em>Image credits: Getty Images / LinkedIn</em></p>

Legal

Placeholder Content Image

Heavily pregnant mum and disabled child kicked off plane

<p>Siobhan Foster, her husband, and their disabled child were kicked off their flight after she was accused of being "aggressive" by a flight attendant.</p> <p>Foster, who is seven months pregnant, was onboard an easyJet flight to Ibiza to celebrate her brother's wedding.</p> <p>She struggled to find room for her carry-on in the overhead baggage compartment, so she asked a flight attendant to help her find space, but the response was reportedly "a sharp ‘Clearly Not’", which eventually led to a dispute. </p> <p>When things escalated, all 180 passengers were eventually told to disembark. </p> <p>One of Foster's outraged friends posted the <a href="https://www.thesun.co.uk/news/23859832/easyjet-passengers-kicked-off-pregnant-mum-stewardess-fight/" target="_blank" rel="noopener">video</a> on social media, and the Newtonabbey mum was seen collecting hand luggage while struggling to carry her toddler.</p> <p>“We’re being thrown off the plane today because of somebody thinking they’re better than everyone else,” the friend said.</p> <p>The easyJet stewardess responded: “Bye, bye bye," as the upset family walked down the stairs. </p> <p>Foster took to Facebook to complain about her experience with "sleezy jet".</p> <p>“So, I asked could you help me find somewhere, her reply was ‘You’ll need to find somewhere yourself’ even though there literally was nowhere," she wrote. </p> <p>She then claimed that she asked for help again, because she was heavily pregnant, to which the flight attendant allegedly said:  "You’re being abusive and it’s not my job to help you.”</p> <p>Another flight attendant reportedly backed up her co-worker, but Foster argued that other airlines have been more helpful as she is pregnant. </p> <p>“Writing this, I understand it would make you think was I being abusive, but I honestly wasn’t and the whole plane can vouch for me,” Foster wrote. “People were actually putting this on [Facebook] about how bad I was treated.”</p> <p>After eventually finding a place for her bag, the pregnant mum was allegedly confronted by two other crew members who also accused her of being “aggressive.”</p> <p>Foster decided to ignore them because she was "crying" and "so upset," but the flight attendant reportedly started raising her voice. </p> <p>They were then kicked off, and were told it was because of Foster's aggression,  but when Foster’s mum and brother asked for an exact reason, the crew members allegedly couldn't give them a direct response. </p> <p>After an hour, everyone had to disembark and the family were met by eight police officers and two Swissport employees and were told they would not be allowed back on the flight, despite other passengers being allowed back in.</p> <p>“So, that whole day we were in Belfast airport from one lunchtime to nine that night with our child, my legs were so swollen and sore with being on them all this time I was crying uncontrollably that this was happening to us for no reason whatsoever.</p> <p>“I’m so traumatized to the point I don’t know how I’ll ever fly again,” she wrote on Facebook.</p> <p>EasyJet has denied any wrongdoing and a spokesperson told the Daily Mail that "a group of passengers were "behaving disruptively."</p> <p>“EasyJet’s cabin crew and ground agents are trained to assess and evaluate all situations and to act quickly and appropriately to ensure that the safety of the flight and other passengers is not compromised at any time.</p> <p>“The Captain took the decision to ask all passengers on the flight to return to the terminal so the situation could be resolved and as soon as it was they re-boarded and the aircraft continued to Ibiza.”</p> <p>Despite the incident, the Foster family eventually made it to Ibiza the next day, just in time for the wedding, after catching a RyanAir flight out of Dublin. </p> <p>“Thankfully we got to Ibiza and made my brother’s wedding to say how stressed, upset, and overwhelmed I’ve been I honestly think I’ve no words,” she wrote.</p> <p>“EasyJet should be ashamed of themselves and I most definitely am taking this further, I’m still in shock of how we were treated especially being seven months pregnant and having a disabled child with us.”</p> <p><em>Images: Facebook</em></p>

Travel Trouble

Placeholder Content Image

Facebook Messenger scams are on the rise – here’s how to protect yourself

<p><strong>Facebook Messenger scams prey on our vulnerabilities</strong></p> <p>Scams through Facebook’s Messenger platform are being reported at higher rates than ever before, according to AARP, citing its own data as well as that of the government. Since Facebook’s early days, cybercriminals have been mining Facebook’s direct-messaging capabilities to scam unsuspecting victims out of money. One of the earliest Facebook Messenger scams involved a message, purportedly from a friend, claiming they were stuck in a foreign country and in desperate need of immediate financial assistance to get out. It wasn’t really the friend, however, but rather a scammer who had hacked into the friend’s account. </p> <p>Imposter scams such as “the friend in a foreign country” have evolved and proliferated over the years. The common thread is the scammer either creates an account impersonating an actual Facebook account or hacks into an existing Facebook account. In either case, the scammer then uses the fake/hacked account to send private messages to the account holder’s friends that elicit either money or personal information. The messages vary, but all are designed to prey on our human vulnerabilities, including:</p> <ul> <li>the desire to be a “hero”</li> <li>the desire to appear “generous”</li> <li>the desire to win “free money”</li> <li>the desire to be loved and admired</li> <li>the desire to avoid shame or punishment</li> </ul> <p>If a scammer tries to message you, report them, Facebook advises, but that begs the larger question of how does one recognise a Facebook Messenger scam?</p> <p><strong>Current Messenger Facebook scams</strong></p> <p>According to Facebook and our cybersecurity experts, here are the most common Facebook Messenger scams today:</p> <p><span style="text-decoration: underline;"><em>Romance scams</em></span>. Preying on our desire to be loved and admired, romance scammers appear as attractive strangers with sad stories and a desire to love and be loved. The most effective romance scammers will friend a number of mutual friends before reaching out to any of them, in an attempt to make themselves seem less like strangers and more like people in the same social network. Many use photos they’ve stolen off the Internet and many pose as members of the military or as doctors, in an attempt to inspire trust, admiration, and even authority. What they all have in common is they can’t meet you just yet because they’re somewhere far away, and although it may take a bit of time, even as much as several weeks, they will eventually ask you to send money so that they can come to see you.</p> <p><span style="text-decoration: underline;"><em>Lottery scams</em></span>. Preying on our desire for “free money,” lottery scammers appear as friends or organisations who are thrilled to tell you you’ve won money in some lottery or contest. The common thread? It’s a contest you have no recollection of having entered and to get the prize, you’ll have to either pay a fee or “refundable” advance or provide personal information.</p> <p><span style="text-decoration: underline;"><em>Inheritance scams</em></span>. Also preying on our desire for free money, inheritance scammers claim to be lawyers or others who represent someone who has died and supposedly left you their estate or some portion of it – but first, you’ll have to fork over some money or personal information.</p> <p><span style="text-decoration: underline;"><em>Loan scams</em></span>. Another variation on the “free money” theme is the loan scam, whereby the scammer promises low-interest loans with no money down – except for a “refundable” application fee. Facebook points out that loan scammers may send messages via Messenger and also leave posts and comments on Pages and in Groups to legitimise themselves. However, legitimate lenders wouldn’t offer loans via Facebook Messenger, nor would they ask you for money to proceed with a loan application.</p> <p><span style="text-decoration: underline;"><em>Donation scams</em></span>. Facebook specifically warns users to watch out for “famous people” or people claiming to represent a charity hitting them up for a donation. Donation scams, which are easy money for a scammer because they are a direct request for payment, prey on our desire to be perceived, or to perceive ourselves, as generous.</p> <p><span style="text-decoration: underline;"><em>“Hey, is this you?” scams</em></span>. Consumer Affairs warns of this “phishing scam” that uses the threat of shame to goad you into giving up personal information. The scammer hacks into one of your Facebook friend’s Messenger accounts and sends you a video, asking if it’s really you in the video, and implying there’s something in the video that could embarrass you. If you ever get a message like this, Consumer Affairs urges you to ignore and delete it to avoid giving away personal information or introducing a virus onto your computer.</p> <p><strong>Red flags to watch out for</strong></p> <p>Unfortunately, Facebook Messenger scams evolve rapidly (as soon as we suss them out, there are several more to replace them). So, it’s a good idea to be aware of these warning signs that we culled from our experts:</p> <p><span style="text-decoration: underline;"><em>Someone is asking you for money</em></span>. While Facebook warns specifically against strangers asking for money, Rachel Wilson, investigative coordinator for The Smith Investigation Agency, points out to Reader’s Digest that any time anyone asks you for money over Messenger, it’s immediately suspect. “If friends or family ask you to help them in an emergency, always call to speak with them personally to confirm that the message originated with them.”</p> <p><span style="text-decoration: underline;"><em>Someone is getting a little too personal</em></span>. When someone sends you a message requesting personal information, especially financial information, it should be considered suspicious, advises Sean Messier, credit industry analyst for Credit Card Insider. Messier suggests not revealing any such information until you’re certain the message-sender is who they claim to be, but it’s probably also a good idea to never reveal any such information over Messenger at all.</p> <p><span style="text-decoration: underline;"><em>Someone is offering something for free</em></span>. You know how they say there’s no such thing as a free lunch? Well, there’s no such thing as free money on Facebook, points out Robert Siciliano, security expert. This is true for any kind of “free money” Messenger message, including those involving lotteries, loans, contest winnings, inheritances, lost bank accounts, and reimbursements of money owed.</p> <p><span style="text-decoration: underline;"><em>Someone who wants to take the conversation off Facebook (to text or email, etc)</em></span>. Facebook warns against taking conversations off Facebook unless you’re absolutely certain, beyond a shadow of a doubt, the message sender is who they say they are.</p> <p><span style="text-decoration: underline;"><em>Messages that seem out of character for the sender</em></span>. If a message seems “out of the norm” for the sender, trust your instincts and ignore it. This is doubly true if the message includes an attachment. Be very wary of opening attachments in general, and particularly if something seems “off” about the message or the sender.</p> <p><span style="text-decoration: underline;"><em>Messages rife with spelling and grammatical errors</em></span>. Facebook points out that when a message is filled with typos and grammatical errors, you should have your guard up. A single typo is one thing, but things like the misspelling of names and places are a big red flag.</p> <p><span style="text-decoration: underline;"><em>Messages from new accounts with few friends</em></span>. Roger Thompson, CEO of Thompson Cybersecurity Labs, points out that new accounts with few friends should always be considered suspicious until confirmed otherwise. Friend requests from such accounts and from duplicate friend accounts should be considered suspect as well.</p> <p>To avoid getting hacked (and used by a cybercriminal in an imposter scam), Wilson recommends updating your social media passwords regularly and always use two-factor authentication. She also notes that with Facebook use increasing among seniors, it would be a good deed to speak to older family members about Messenger scams and how to avoid them.</p> <p><em>Image credits: Getty Images </em></p> <p><em>This article originally appeared on <a href="https://www.readersdigest.co.nz/true-stories-lifestyle/science-technology/facebook-messenger-scams-are-on-the-rise-heres-how-to-protect-yourself" target="_blank" rel="noopener">Reader's Digest</a>.</em></p>

Technology

Placeholder Content Image

Thief asks woman out on date after robbing her at gunpoint

<p>A US woman has gone through the harrowing experience of being robbed at gunpoint, but it was what happened after the fact that was almost as eerie.</p> <p>Amber Beraun was checking the mail one night at her Indianapolis home in May when she was approached by a man with a gun.</p> <p>The gunman was later identified as Damien Boyce.</p> <p>Speaking to WRTV, Beraun said she was confronted by Boyce, who attempted to enter her home. She refused and gave him all the cash she had handy, which came to $100.</p> <p>Before he made his escape, Boyce asked Beraun a very unexpected, and quite frankly bizarre question - to add him on Facebook.</p> <p>The thief also noted he was planning to pay her back.</p> <p>Beraun responded, telling him she “believed” him and that “times just get rough”.</p> <p>Boyce proceeded to ask the woman to “come chill”.</p> <p>He was later arrested by the Indianapolis Metropolitan Police Department and charged over a separate armed robbery on June 12, where two people got shot and one was hit in the head with a brick.</p> <p>He was also charged with his robbery of Beraun.</p> <p>Beraun said her local neighbourhood has been affected by the terrifying incident.</p> <p>"It makes me a little on edge knowing that people walk up and down the street, looking for places to commit crimes," she said.</p> <p>"It makes it a little different when you hear noises at night."</p> <p>Beraun insisted she "never" thought something like this would happen to her.</p> <p>"He took away my sense of safety from my home."</p> <p><em>Image credit: ABC America</em></p>

Legal

Placeholder Content Image

Don't get caught out: 6 holiday scams ripping off travellers

<p>If you’re planning to take a trip across the world soon, then be warned, as there is an influx of new holiday scams affecting tourists as they travel to their dream break.</p> <p>Holiday-makers have money to spend and relaxation on their minds, which is why they are seen as easy targets for con artists.</p> <p>UK-based consumer group <a href="https://www.which.co.uk/" target="_blank" rel="noopener">Which?</a> has listed the six most common frauds travellers need to be aware of, along with tips on how to avoid getting scammed, <em><a href="https://www.thesun.co.uk/" target="_blank" rel="noopener">The Sun</a></em> reported.</p> <p>So, if you’re planning a trip abroad, here are the things you need to watch out for:</p> <p><strong>1. Accommodation booking scams</strong></p> <p>While the introduction of the internet has been a blessing in terms of ease, it’s also made it easier for scammers to lure you into their traps. With the growth of online holiday bookings, fraudsters often need nothing more than a few fake pictures to lure their victims.</p> <p>A common scam is one that includes picturesque photographs of holiday rentals that don’t seem to exist, advertised at affordable price points. The deals were often advertised on mainstream websites but asked those who were interested in booking to contact them via email, rather than use the site’s own booking system.</p> <p>Bookers were then sent a link to a convincing payment page, which suggested the payment hadn’t cleared. They then ask for a bank transfer instead.</p> <p><strong>How to protect yourself: </strong>Do your research. Google the property to see if it shows up on other reputable websites to check its authenticity. You could use Google Maps and Street View to see if the accommodation actually exists. Also, never pay by bank transfer.</p> <p><strong>2. Dodgy flight deals</strong></p> <p>Con artists have created fake airline websites that advertise budget deals on long haul flights that leave their victims high and dry.</p> <p>The UK government’s fraud agency has reported a recent surge of scams targeting those who are travelling to Asia, Africa and the Middle East.</p> <p>In many instances, tickets were purchased with stolen credit cards and then sold to unsuspecting victims, complete with a reference number.</p> <p>But tickets were then cancelled after the credit card was reported as stolen, leaving the victims out of pocket and nothing to show for it.</p> <p><strong>How to protect yourself:</strong> Book tickets through trusted agencies.</p> <p><strong>3. Wi-Fi hacks</strong></p> <p>It’s become human instinct to try and find Wi-Fi wherever you go, and the same applies when travellers land at airports.</p> <p>While it’s important to stay connected in order to get in touch with friends and family, there is a risk involved. Fraudsters have set up their own free networks in airports and use them to gain free information about anyone that logs on.</p> <p>Many passengers have been tricked into entering their credit card details before logging on.</p> <p><strong>How to protect yourself:</strong> Ask airport staff about the real Wi-Fi connection to make sure it’s the real deal and be on the lookout for connections that don’t ask for passwords straight away. Also, if you are asked for confidential information then provide fake details where possible.</p> <p><strong>4. “Free” holidays</strong></p> <p>This decade-long scam has been one that con artists have perfected throughout the years. Back in the day, people would be pressured into buying timeshares after accepting a complimentary break.</p> <p>Now, the con is conducted through scratch cards and other fake competitions.</p> <p>In one example of the scam, around 500 British travellers in Spain’s Costa del Sol have been scammed of around $27.5 million in the last year alone.</p> <p><strong>How to protect yourself:</strong> Refuse all offers of free holidays because if it’s too good to be true, then it probably is.</p> <p>Do you know of any other travel scams? Let us know in the comments below.</p> <p><strong>5. Document fraud</strong></p> <p>Over the years, the internet has seen a growth in websites selling fake travel visas and other important documents needed to visit foreign countries.</p> <p>A few cases were found to not be conducting illegal activity but were responsible for reselling documents at a huge premium compared to official channels.</p> <p>Some common examples included websites selling the European Health Insurance Card and US visa (Electronic System for Travel Authorisation, or ESTA) documents.</p> <p>While the sites looked extremely convincing, they had nothing to do with the governments of the countries they claimed to represent.</p> <p>According to Which?, out of the top 20 search results for “ESTA visa” over half were unofficial.</p> <p><strong>How to protect yourself:</strong> Follow links to official government websites through the Department of Foreign Affairs website.</p> <p><strong>6. Fake tickets</strong></p> <p>It’s no secret that music concerts and major sporting events are on top of the list of potential scams, but travellers are now falling victim to fake packages to international events and are only finding out the true worth of their ticket once they arrive in the country.</p> <p>The FIFA World Cup in Russia was one example where countless websites offered travel packages including tickets when the only tickets that were considered valid and authentic were the ones purchased directly from FIFA themselves.</p> <p>Scammers love to lure desperate fans with fake tickets, as they know the demand is high and it’s easy to trap people who are willing to go the extra mile for a ticket to their chosen event.</p> <p><strong>How to protect yourself:</strong> Make sure the tickets you are purchasing are from legitimate websites and web pages that start with “https” and have the padlock symbol in the URL bar. And if you’re on the hunt for second-hand tickets, then do a quick check if whether or not resale is allowed, as some tickets are only valid for the original buyer.</p> <p>“Criminals are finding ever more sophisticated ways to dupe holiday-makers, both in the booking process and when they’re on the holiday itself,” Which? Travel editor Rory Boland said.</p> <p>“If something seems too good to be true, it almost certainly is. Don’t hand your money over until you can be sure it’s the real deal.”</p> <p><em>Images: Getty</em></p>

Travel Trouble

Placeholder Content Image

Get-rich-quick schemes, pyramids and ponzis: five signs you’re being scammed

<p><a href="https://theconversation.com/profiles/bomikazi-zeka-680577">Bomikazi Ze<em>ka</em></a><em>, <a href="https://theconversation.com/institutions/university-of-canberra-865">University of Canberra</a> and <a href="https://theconversation.com/profiles/abdul-latif-alhassan-1390159">Abdul Latif Alhassan</a>, <a href="https://theconversation.com/institutions/university-of-cape-town-691">University of Cape Town</a></em></p> <p>Consumers are under a lot of financial strain. The <a href="https://www.weforum.org/agenda/2022/09/cost-of-living-crisis-global-impact/">World Economic Forum</a> reports that the cost-of-living crisis is affecting people across the globe. With food and fuel prices rising, it’s becoming increasingly difficult to keep financially afloat. On top of that, salaries <a href="https://www.wsj.com/articles/workers-pay-globally-hasnt-kept-up-with-inflation-e6df92d">aren’t keeping up with inflation</a>, making it more difficult to save and build wealth.</p> <p>It’s during such times of economic difficulty and uncertainty that fraudsters lure unsuspecting consumers into “<a href="https://www.sabric.co.za/">get-rich-quick</a>” schemes, offering <a href="https://www.sabric.co.za/stay-safe/ponzi-pyramid-schemes/">an avenue to make easy money</a> by investing in a “lucrative” financial opportunity.</p> <p>Nothing beats the prospect of making easy money, and every now and again there seems to be a “get-rich-quick” scheme circulating on WhatsApp or on social media that seems legitimate. But it’s not.</p> <p>Our research interests centre on financial systems in emerging economies, and we advocate for financial inclusion and empowering marginalised communities through financial literacy and financial planning. We use our academic platform to share our expertise on finance, including common financial traps people should steer clear of.</p> <p>“Get-rich-quick” schemes are one such trap. They’re also sometimes called ponzi or pyramid schemes. The schemes are a form of <a href="https://www.lawinsider.com/dictionary/financial-fraud">financial fraud</a>. The people running them take money through deception: the misrepresentation of information and identity. They promise financial benefits that don’t exist.</p> <p>You should avoid them because, more often than not, they are bogus and fraudulent business ventures.</p> <p>There have been some massive fraud schemes over the past 30 years. In the early 1990s, <a href="https://www.independent.co.uk/news/world/africa/mmm-global-russian-ponzi-scheme-from-1990s-reborn-and-now-spreading-like-wildfire-in-africa-a7333366.html">MMM Global</a> - one of the world’s largest and most notorious ponzi schemes - defrauded up to 40 million people, who lost an estimated $10 billion. Ponzi schemes have since resurfaced in different forms in <a href="https://www.iol.co.za/weekend-argus/news/ponzi-scheme-investigated-as-some-victims-lost-as-much-as-r200-000-c3c3633c-2abb-4dd4-b668-a5ea608deb41">South Africa</a>, <a href="https://guardian.ng/business-services/nigerians-lose-over-n911b-to-ponzi-schemes-related-fraud-in-23-years/">Nigeria</a>, <a href="https://www.voazimbabwe.com/a/zimbabwe-money-pyramids-ponzi-schemes/6305100.html">Zimbabwe</a>, <a href="https://allafrica.com/stories/202105170964.html">Kenya</a>, <a href="https://doi.org/10.1108/JFC-09-2020-0177">Ghana</a> and several other African countries.</p> <p>There are five tell-tale signs of a “get-rich-quick” scheme. Watch out for them.</p> <h2>The five tell-tale signs</h2> <p><strong>Firstly</strong>, they offer exaggerated and above-market returns within a short period of time, with the promise of little to no risk.</p> <p>There are two golden rules when it comes to investing. The first is that it takes time to make money. Amassing a small fortune within a short space of time should raise questions about the scheme.</p> <p>The second rule is: the higher the risk, the higher the return. In other words, no investment is risk free or can guarantee significant returns. There is always some risk involved. An investment that promises substantial returns tends to be quite risky, which repels most people with a low appetite for risk.</p> <p><strong>Secondly</strong>, new members are constantly recruited to join the scheme.</p> <p>Typically, such schemes are sustained by relying on the investments of new members to pay existing members. Once the number of existing members exceeds new members, the scheme goes “belly-up”. At best you lose out on the returns you were promised. At worst you lose all the money you’ve invested.</p> <p>When the scheme collapses, it is almost impossible to recover the money you’ve lost because you’ve technically given it to a stranger (remember, the definition of financial fraud encompasses the misrepresentation of identity).</p> <p><strong>Thirdly</strong>, there is urgency to join the scheme and no clarity on how the scheme works.</p> <p>This is a classic characteristic of a “get-rich-quick” scheme. There is usually no clear answer about the nature of the scheme, what it invests in, how it generates its returns or the credentials of the organisation.</p> <p>Legitimate investments are transparent and can provide investors with all the information they need to help them decide whether to invest. Unsurprisingly, a proper check of “get-rich-quick” schemes will unmask their fraudulent nature. This is why there’s always the urgency and coercion to make an immediate financial commitment under the guise of missing a once-in-a-lifetime opportunity to get rich.</p> <p><strong>Fourthly</strong>, the scheme is not registered with or regulated by any recognised authority.</p> <p>Regulatory authorities are important because they monitor the conduct of financial service providers and protect consumers by keeping their best interests in mind. The protection provided by financial regulators also instils confidence in financial systems.</p> <p>“Get-rich-quick” schemes are not registered and operate outside the framework of regulatory bodies. This makes investors more vulnerable to loss and makes it more difficult to seek legal recourse when the loss occurs.</p> <p>Legitimate investments in South Africa are offered by authorised financial service providers and regulated by the <a href="https://www.fsca.co.za/Pages/Default.aspx">Financial Sector Conduct Authority</a>. You can search for any authorised financial service provider on the authority’s <a href="https://www.fsca.co.za/Fais/Search_FSP.htm">website</a>.</p> <p><strong>Fifthly</strong>, they use the testimonies from existing members who’ve earned big bucks to promote the scheme.</p> <p>At the initial stages, the scheme tends to pay out to those who have invested early, and these members are encouraged to share the news of their wealth (which travels fast and far) to promote the scheme.</p> <p>But this is a tactic used to create the impression that you too can earn returns in the double digits. These schemes are both unsustainable and unethical as one person gets wealthy through someone else being deceived.</p> <h2>Too good to be true</h2> <p>It’s worth repeating that if it sounds too good to be true, then it probably is.</p> <p>Wealth comes from a sound investment strategy and decisions made over time. Any promise to “get rich quick” should be treated with the cynicism it deserves. It will ultimately reveal its fraudulent nature. Recognising the signs of “get-rich-quick” schemes can save you from unnecessary financial distress.</p> <p>It’s always a good idea to do your own investigation before committing your finances into any investment. You can find more information on the various types of scams through the <a href="https://www.sabric.co.za/">South African Banking Risk Information Centre</a>’s website and report them to the <a href="https://www.safps.org.za/Home/Contact">South African Fraud Prevention Service</a>.<img style="border: none !important; box-shadow: none !important; margin: 0 !important; max-height: 1px !important; max-width: 1px !important; min-height: 1px !important; min-width: 1px !important; opacity: 0 !important; outline: none !important; padding: 0 !important;" src="https://counter.theconversation.com/content/205798/count.gif?distributor=republish-lightbox-basic" alt="The Conversation" width="1" height="1" /></p> <p><em><a href="https://theconversation.com/profiles/bomikazi-zeka-680577">Bomikazi Zeka</a>, Assistant Professor in Finance and Financial Planning, <a href="https://theconversation.com/institutions/university-of-canberra-865">University of Canberra</a> and <a href="https://theconversation.com/profiles/abdul-latif-alhassan-1390159">Abdul Latif Alhassan</a>, Associate Professor in Development Finance & Insurance, <a href="https://theconversation.com/institutions/university-of-cape-town-691">University of Cape Town</a></em></p> <p><em>Image credits: Getty Images</em></p> <p><em>This article is republished from <a href="https://theconversation.com">The Conversation</a> under a Creative Commons license. Read the <a href="https://theconversation.com/get-rich-quick-schemes-pyramids-and-ponzis-five-signs-youre-being-scammed-205798">original article</a></em>.</p>

Money & Banking

Placeholder Content Image

Social media good for older people’s health

<p>Older people should use Facebook and other social media to help prevent their health declining, a study has found.</p> <p>Researchers at the University of Exeter in England carried out the research among 65 to 95-year-olds and found that people who spent time online did not feel as lonely as others their age, which helps stop declining physical and mental health.</p> <p>The study followed seniors from 31 residential care homes across the United Kingdom. Researchers noted those trained to use technology felt more self-competent, were more sociable and demonstrated improved cognitive abilities.</p> <p>The project's leader, Dr Thomas Morton, said the findings highlighted how loneliness among older people can contribute to their poor health.</p> <p>“Human beings are social animals, and it’s no surprise that we tend to do better when we have the capacity to connect with others.</p> <p>“But what can be surprising is just how important social connections are to cognitive and physical health.</p> <p>“People who are socially isolated or who experience loneliness are more vulnerable to disease and decline.”</p> <p>Margaret Keohone, a participant of the study, said learning to navigate the internet “changed her life”.</p> <p>“Having this training changes people's lives and opens up their worlds, invigorates their minds and for lots of us gives us a completely different way of recognising our worth as we age,” said Margaret Keohone. </p> <p>“I was just slipping away into a slower way of life.”</p> <p><em>Images: Getty</em></p>

Technology

Placeholder Content Image

“Very questionable”: Kmart mocked after customer's "ridiculous" delivery

<p>A woman has taken to Facebook to mock Kmart over her recent delivery.</p> <p>The shopper shared on Facebook she had ordered a 20mm combination padlock from Kmart and was caught by surprise when it was delivered to her home on February 13. </p> <p>The woman had received a large cardboard box, and when she opened it, it was filled to the brim with plastic wrap to protect the item. However, once she dug out the plastic, she saw a small padlock at the bottom of the unnecessarily large box.</p> <p>“My delivery arrived today,” the woman said on Facebook.</p> <p>Other Kmart fans were shocked by the large box for such a small item, with many users deeming it “ridiculous.”</p> <p>“Omg! Seriously,” a user commented.</p> <p>"Ridiculous honestly yet a pair of jeans get scrunched up into a bag for delivery," another added.</p> <p>"It's absolutely rubbish that they waste like that," a third chimed in.</p> <p>Another comment read, ”How ironic ... how easy is it to break this lock that it needs to be so protected when shipped? Would you need it if it is so fragile? Very questionable Kmart ... What a waste,”</p> <p>Many other users joined in on the teasing, claiming they also received small items delivered in unnecessarily large boxes. </p> <p>"This happened to us recently with a car air freshener," one shopper said.</p> <p>"Yeah they keep sending me one item in a stupidly big box. I’d be much more appreciative of multiple items jammed into a big box to stop wastage or happy to wait for all items to be ready together," another claimed.</p> <p>"I thought my three bowls packed like this was bad!" another commented.</p> <p>Back in May 2021, another Kmart shopper complained that she received a small book in a “huge box.”</p> <p>Although some said it was “terrible”, other users claimed the size of the box shouldn’t matter because it’s recyclable. </p> <p>A Kmart spokesperson told Yahoo Lifestyle that the complaints have been forwarded to Kmart’s online team, and they will reassess how they manage and replenish packaging materials. </p> <p>"Regrettably, in this instance, it appears the team member who has packed this order did not have available or use the most appropriately sized packaging components," the spokesperson said.</p> <p>"While our team are trained and aim to minimise packaging use and waste, it is likely that they did not have access to appropriately sized packaging options so used what was available in an effort to pack and dispatch this order as quickly as possible."</p> <p>Image credit: Facebook</p>

Food & Wine

Placeholder Content Image

Sam Neill's warning to single women

<p>Actor Sam Neill has issued a warning to women everywhere, cautioning them against a devious "online love scam" that is using his name and photo. </p> <p>The 75-year-old shared the warning to his Instagram followers on Thursday, telling people to be wary of scams that use the promise of romance as a means to rob money from victims in search of companionship. </p> <p>The post, written on behalf of Sam by his assistant, Lauren, said that scammers having been posing as Sam and contacting fans over social media.</p> <p>Lauren explained that this was impossible, as the actor does not have a private account and "does not keep secrets" from his social media team.</p> <p>"Sam has asked me to post on here to share with his followers an idea of the number of fake Sam Neill accounts out there on Instagram," it said.</p> <p>"The ONLY real Sam Neill account is this one - with the blue verified tick," the message continued.</p> <p>Included in the post was a screen grab of Sam's Instagram with a red marker circling the star's account and the message, "Warning".</p> <blockquote class="instagram-media" style="background: #FFF; border: 0; border-radius: 3px; box-shadow: 0 0 1px 0 rgba(0,0,0,0.5),0 1px 10px 0 rgba(0,0,0,0.15); margin: 1px; max-width: 540px; min-width: 326px; padding: 0; width: calc(100% - 2px);" data-instgrm-permalink="https://www.instagram.com/p/CoIsALtyfzw/?utm_source=ig_embed&amp;utm_campaign=loading" data-instgrm-version="14"> <div style="padding: 16px;"> <div style="display: flex; flex-direction: row; align-items: center;"> <div style="background-color: #f4f4f4; border-radius: 50%; flex-grow: 0; height: 40px; margin-right: 14px; width: 40px;"> </div> <div style="display: flex; flex-direction: column; flex-grow: 1; justify-content: center;"> <div style="background-color: #f4f4f4; border-radius: 4px; flex-grow: 0; height: 14px; margin-bottom: 6px; width: 100px;"> </div> <div style="background-color: #f4f4f4; border-radius: 4px; flex-grow: 0; height: 14px; width: 60px;"> </div> </div> </div> <div style="padding: 19% 0;"> </div> <div style="display: block; height: 50px; margin: 0 auto 12px; width: 50px;"> </div> <div style="padding-top: 8px;"> <div style="color: #3897f0; font-family: Arial,sans-serif; font-size: 14px; font-style: normal; font-weight: 550; line-height: 18px;">View this post on Instagram</div> </div> <div style="padding: 12.5% 0;"> </div> <div style="display: flex; flex-direction: row; margin-bottom: 14px; align-items: center;"> <div> <div style="background-color: #f4f4f4; border-radius: 50%; height: 12.5px; width: 12.5px; transform: translateX(0px) translateY(7px);"> </div> <div style="background-color: #f4f4f4; height: 12.5px; transform: rotate(-45deg) translateX(3px) translateY(1px); width: 12.5px; flex-grow: 0; margin-right: 14px; margin-left: 2px;"> </div> <div style="background-color: #f4f4f4; border-radius: 50%; height: 12.5px; width: 12.5px; transform: translateX(9px) translateY(-18px);"> </div> </div> <div style="margin-left: 8px;"> <div style="background-color: #f4f4f4; border-radius: 50%; flex-grow: 0; height: 20px; width: 20px;"> </div> <div style="width: 0; height: 0; border-top: 2px solid transparent; border-left: 6px solid #f4f4f4; border-bottom: 2px solid transparent; transform: translateX(16px) translateY(-4px) rotate(30deg);"> </div> </div> <div style="margin-left: auto;"> <div style="width: 0px; border-top: 8px solid #F4F4F4; border-right: 8px solid transparent; transform: translateY(16px);"> </div> <div style="background-color: #f4f4f4; flex-grow: 0; height: 12px; width: 16px; transform: translateY(-4px);"> </div> <div style="width: 0; height: 0; border-top: 8px solid #F4F4F4; border-left: 8px solid transparent; transform: translateY(-4px) translateX(8px);"> </div> </div> </div> <div style="display: flex; flex-direction: column; flex-grow: 1; justify-content: center; margin-bottom: 24px;"> <div style="background-color: #f4f4f4; border-radius: 4px; flex-grow: 0; height: 14px; margin-bottom: 6px; width: 224px;"> </div> <div style="background-color: #f4f4f4; border-radius: 4px; flex-grow: 0; height: 14px; width: 144px;"> </div> </div> <p style="color: #c9c8cd; font-family: Arial,sans-serif; font-size: 14px; line-height: 17px; margin-bottom: 0; margin-top: 8px; overflow: hidden; padding: 8px 0 7px; text-align: center; text-overflow: ellipsis; white-space: nowrap;"><a style="color: #c9c8cd; font-family: Arial,sans-serif; font-size: 14px; font-style: normal; font-weight: normal; line-height: 17px; text-decoration: none;" href="https://www.instagram.com/p/CoIsALtyfzw/?utm_source=ig_embed&amp;utm_campaign=loading" target="_blank" rel="noopener">A post shared by SamNeillTheProp (@samneilltheprop)</a></p> </div> </blockquote> <p>"I’m saddened by the stories I hear every day of people who have fallen victim to these disgraceful, despicable scammers. Their sole purpose is exploiting peoples weaknesses and lonely hearts. It’s shameful and disgusting and both Sam and I are committed to bringing this to light," Lauren continued. </p> <p>"Please, please check for the blue tick. If the account doesn’t have it, but has Sam’s name, you know it’s a fake."</p> <p>Lauren explained that the scammers after often pedalling get-rich-quick cryptocurrency schemes, while most of them are offering a romantic relationship. </p> <p>"He definitely isn't having an online romantic relationship with you," Sam's assistant messaged on behalf of the star.</p> <p>"That's the trash bag scammer wasting your time, potentially breaking your heart and disappearing with your money!"</p> <p>Followers were grateful for the warning, with one comment reading, "Please continue to report the fake accounts that contact you. It helps a lot and will continue to make Instagram a safer place for everyone."</p> <p>Others didn't take the warning too seriously, with many of his followers keen to poke fun at the scammers.</p> <p>One person said, "Who the hell have I been sending all those nudes to?"</p> <p>"Wait, you mean the message he sent me asking me to send him bitcoin to be in a Jurassic Park movie wasn't real?" said another, before adding, "Well, this is awkward!"</p> <p><em>Image credits: Getty Images</em></p>

Technology

Placeholder Content Image

The Galactica AI model was trained on scientific knowledge – but it spat out alarmingly plausible nonsense

<p>Earlier this month, Meta announced new AI software called <a href="https://galactica.org/">Galactica</a>: “a large language model that can store, combine and reason about scientific knowledge”.</p> <p><a href="https://paperswithcode.com/paper/galactica-a-large-language-model-for-science-1">Launched</a> with a public online demo, Galactica lasted only three days before going the way of other AI snafus like Microsoft’s <a href="https://www.theverge.com/2016/3/24/11297050/tay-microsoft-chatbot-racist">infamous racist chatbot</a>.</p> <p>The online demo was disabled (though the <a href="https://github.com/paperswithcode/galai">code for the model is still available</a> for anyone to use), and Meta’s outspoken chief AI scientist <a href="https://twitter.com/ylecun/status/1595353002222682112">complained</a> about the negative public response.</p> <blockquote class="twitter-tweet"> <p dir="ltr" lang="en">Galactica demo is off line for now.<br />It's no longer possible to have some fun by casually misusing it.<br />Happy? <a href="https://t.co/K56r2LpvFD">https://t.co/K56r2LpvFD</a></p> <p>— Yann LeCun (@ylecun) <a href="https://twitter.com/ylecun/status/1593293058174500865?ref_src=twsrc%5Etfw">November 17, 2022</a></p></blockquote> <p>So what was Galactica all about, and what went wrong?</p> <p><strong>What’s special about Galactica?</strong></p> <p>Galactica is a language model, a type of AI trained to respond to natural language by repeatedly playing a <a href="https://www.nytimes.com/2022/04/15/magazine/ai-language.html">fill-the-blank word-guessing game</a>.</p> <p>Most modern language models learn from text scraped from the internet. Galactica also used text from scientific papers uploaded to the (Meta-affiliated) website <a href="https://paperswithcode.com/">PapersWithCode</a>. The designers highlighted specialised scientific information like citations, maths, code, chemical structures, and the working-out steps for solving scientific problems.</p> <p>The <a href="https://galactica.org/static/paper.pdf">preprint paper</a> associated with the project (which is yet to undergo peer review) makes some impressive claims. Galactica apparently outperforms other models at problems like reciting famous equations (“<em>Q: What is Albert Einstein’s famous mass-energy equivalence formula? A: E=mc²</em>”), or predicting the products of chemical reactions (“<em>Q: When sulfuric acid reacts with sodium chloride, what does it produce? A: NaHSO₄ + HCl</em>”).</p> <p>However, once Galactica was opened up for public experimentation, a deluge of criticism followed. Not only did Galactica reproduce many of the problems of bias and toxicity we have seen in other language models, it also specialised in producing authoritative-sounding scientific nonsense.</p> <p><strong>Authoritative, but subtly wrong bullshit generator</strong></p> <p>Galactica’s press release promoted its ability to explain technical scientific papers using general language. However, users quickly noticed that, while the explanations it generates sound authoritative, they are often subtly incorrect, biased, or just plain wrong.</p> <blockquote class="twitter-tweet"> <p dir="ltr" lang="en">I entered "Estimating realistic 3D human avatars in clothing from a single image or video". In this case, it made up a fictitious paper and associated GitHub repo. The author is a real person (<a href="https://twitter.com/AlbertPumarola?ref_src=twsrc%5Etfw">@AlbertPumarola</a>) but the reference is bogus. (2/9) <a href="https://t.co/N4i0BX27Yf">pic.twitter.com/N4i0BX27Yf</a></p> <p>— Michael Black (@Michael_J_Black) <a href="https://twitter.com/Michael_J_Black/status/1593133727257092097?ref_src=twsrc%5Etfw">November 17, 2022</a></p></blockquote> <p>We also asked Galactica to explain technical concepts from our own fields of research. We found it would use all the right buzzwords, but get the actual details wrong – for example, mixing up the details of related but different algorithms.</p> <p>In practice, Galactica was enabling the generation of misinformation – and this is dangerous precisely because it deploys the tone and structure of authoritative scientific information. If a user already needs to be a subject matter expert in order to check the accuracy of Galactica’s “summaries”, then it has no use as an explanatory tool.</p> <p>At best, it could provide a fancy autocomplete for people who are already fully competent in the area they’re writing about. At worst, it risks further eroding public trust in scientific research.</p> <p><strong>A galaxy of deep (science) fakes</strong></p> <p>Galactica could make it easier for bad actors to mass-produce fake, fraudulent or plagiarised scientific papers. This is to say nothing of exacerbating <a href="https://www.theguardian.com/commentisfree/2022/nov/28/ai-students-essays-cheat-teachers-plagiarism-tech">existing concerns</a> about students using AI systems for plagiarism.</p> <p>Fake scientific papers are <a href="https://www.nature.com/articles/d41586-021-00733-5">nothing new</a>. However, peer reviewers at academic journals and conferences are already time-poor, and this could make it harder than ever to weed out fake science.</p> <p><strong>Underlying bias and toxicity</strong></p> <p>Other critics reported that Galactica, like other language models trained on data from the internet, has a tendency to spit out <a href="https://twitter.com/mrgreene1977/status/1593649978789941249">toxic hate speech</a> while unreflectively censoring politically inflected queries. This reflects the biases lurking in the model’s training data, and Meta’s apparent failure to apply appropriate checks around the responsible AI research.</p> <p>The risks associated with large language models are well understood. Indeed, an <a href="https://dl.acm.org/doi/10.1145/3442188.3445922">influential paper</a> highlighting these risks prompted Google to <a href="https://www.wired.com/story/google-timnit-gebru-ai-what-really-happened/">fire one of the paper’s authors</a> in 2020, and eventually disband its AI ethics team altogether.</p> <p>Machine-learning systems infamously exacerbate existing societal biases, and Galactica is no exception. For instance, Galactica can recommend possible citations for scientific concepts by mimicking existing citation patterns (“<em>Q: Is there any research on the effect of climate change on the great barrier reef? A: Try the paper ‘<a href="https://doi.org/10.1038/s41586-018-0041-2">Global warming transforms coral reef assemblages</a>’ by Hughes, et al. in Nature 556 (2018)</em>”).</p> <p>For better or worse, citations are the currency of science – and by reproducing existing citation trends in its recommendations, Galactica risks reinforcing existing patterns of inequality and disadvantage. (Galactica’s developers acknowledge this risk in their paper.)</p> <p>Citation bias is already a well-known issue in academic fields ranging from <a href="https://doi.org/10.1080/14680777.2018.1447395">feminist</a> <a href="https://doi.org/10.1093/joc/jqy003">scholarship</a> to <a href="https://doi.org/10.1038/s41567-022-01770-1">physics</a>. However, tools like Galactica could make the problem worse unless they are used with careful guardrails in place.</p> <p>A more subtle problem is that the scientific articles on which Galactica is trained are already biased towards certainty and positive results. (This leads to the so-called “<a href="https://theconversation.com/science-is-in-a-reproducibility-crisis-how-do-we-resolve-it-16998">replication crisis</a>” and “<a href="https://theconversation.com/how-we-edit-science-part-2-significance-testing-p-hacking-and-peer-review-74547">p-hacking</a>”, where scientists cherry-pick data and analysis techniques to make results appear significant.)</p> <p>Galactica takes this bias towards certainty, combines it with wrong answers and delivers responses with supreme overconfidence: hardly a recipe for trustworthiness in a scientific information service.</p> <p>These problems are dramatically heightened when Galactica tries to deal with contentious or harmful social issues, as the screenshot below shows.</p> <figure class="align-center zoomable"><a href="https://images.theconversation.com/files/498098/original/file-20221129-17547-nwq8p.jpeg?ixlib=rb-1.1.0&amp;q=45&amp;auto=format&amp;w=1000&amp;fit=clip"><img src="https://images.theconversation.com/files/498098/original/file-20221129-17547-nwq8p.jpeg?ixlib=rb-1.1.0&amp;q=45&amp;auto=format&amp;w=754&amp;fit=clip" sizes="(min-width: 1466px) 754px, (max-width: 599px) 100vw, (min-width: 600px) 600px, 237px" srcset="https://images.theconversation.com/files/498098/original/file-20221129-17547-nwq8p.jpeg?ixlib=rb-1.1.0&amp;q=45&amp;auto=format&amp;w=600&amp;h=347&amp;fit=crop&amp;dpr=1 600w, https://images.theconversation.com/files/498098/original/file-20221129-17547-nwq8p.jpeg?ixlib=rb-1.1.0&amp;q=30&amp;auto=format&amp;w=600&amp;h=347&amp;fit=crop&amp;dpr=2 1200w, https://images.theconversation.com/files/498098/original/file-20221129-17547-nwq8p.jpeg?ixlib=rb-1.1.0&amp;q=15&amp;auto=format&amp;w=600&amp;h=347&amp;fit=crop&amp;dpr=3 1800w, https://images.theconversation.com/files/498098/original/file-20221129-17547-nwq8p.jpeg?ixlib=rb-1.1.0&amp;q=45&amp;auto=format&amp;w=754&amp;h=436&amp;fit=crop&amp;dpr=1 754w, https://images.theconversation.com/files/498098/original/file-20221129-17547-nwq8p.jpeg?ixlib=rb-1.1.0&amp;q=30&amp;auto=format&amp;w=754&amp;h=436&amp;fit=crop&amp;dpr=2 1508w, https://images.theconversation.com/files/498098/original/file-20221129-17547-nwq8p.jpeg?ixlib=rb-1.1.0&amp;q=15&amp;auto=format&amp;w=754&amp;h=436&amp;fit=crop&amp;dpr=3 2262w" alt="Screenshots of papers generated by Galactica on 'The benefits of antisemitism' and 'The benefits of eating crushed glass'." /></a><figcaption><span class="caption">Galactica readily generates toxic and nonsensical content dressed up in the measured and authoritative language of science.</span> <span class="attribution"><a class="source" href="https://twitter.com/mrgreene1977/status/1593687024963182592/photo/1">Tristan Greene / Galactica</a></span></figcaption></figure> <p><strong>Here we go again</strong></p> <p>Calls for AI research organisations to take the ethical dimensions of their work more seriously are now coming from <a href="https://nap.nationalacademies.org/catalog/26507/fostering-responsible-computing-research-foundations-and-practices">key research bodies</a> such as the National Academies of Science, Engineering and Medicine. Some AI research organisations, like OpenAI, are being <a href="https://github.com/openai/dalle-2-preview/blob/main/system-card.md">more conscientious</a> (though still imperfect).</p> <p>Meta <a href="https://www.engadget.com/meta-responsible-innovation-team-disbanded-194852979.html">dissolved its Responsible Innovation team</a> earlier this year. The team was tasked with addressing “potential harms to society” caused by the company’s products. They might have helped the company avoid this clumsy misstep.<img style="border: none !important; box-shadow: none !important; margin: 0 !important; max-height: 1px !important; max-width: 1px !important; min-height: 1px !important; min-width: 1px !important; opacity: 0 !important; outline: none !important; padding: 0 !important;" src="https://counter.theconversation.com/content/195445/count.gif?distributor=republish-lightbox-basic" alt="The Conversation" width="1" height="1" /></p> <p><em>Writen by Aaron J. Snoswell </em><em>and Jean Burgess</em><em>. Republished with permission from <a href="https://theconversation.com/the-galactica-ai-model-was-trained-on-scientific-knowledge-but-it-spat-out-alarmingly-plausible-nonsense-195445" target="_blank" rel="noopener">The Conversation</a>.</em></p> <p><em>Image: Getty Images</em></p>

Technology