Placeholder Content Image

How an AI grandma is combating phone scams

<p>Fraudsters frequently target the elderly for scams, so one company took matters into their own hands and created an AI grandmother who tricks phone scammers. </p> <p>At first glance Daisy looks like every other grandmother, with hobbies like knitting, a cat named Fluffy and loves talking about her family among other things. However, the AI chatbot is designed to trick phone scammers into thinking they are speaking to a real person. </p> <p>The AI, created by British mobile phone company O2, is designed to combat fraud, and while Daisy doesn't intercept any calls, she has a list of phone numbers used by UK scammers. </p> <p>Daisy's mission “is to talk with fraudsters and waste as much of their time as possible with human-like rambling chat to keep them away from real people,” the company said in a statement unveiling Daisy earlier this month. </p> <p>Her tactics have kept “numerous fraudsters on calls for 40 minutes at a time." </p> <p>Developed in partnership with London advertising agency VCCP, Daisy uses a custom language model to hold autonomous conversations with scam callers in real time. </p> <p>Her voice was modelled on a staff member's grandmother. </p> <p>“Whilst anyone can be a victim of a scam, criminal fraud gangs often target the elderly so we leaned into scammers’ own biases to create an AI granny based on a real relative of a VCCP employee,”  the agency said in a statement. </p> <p>“Over the course of many hours of scam calls she’s told meandering stories of her family, talked at length about her passion for knitting and provided false personal information including made-up bank details.”</p> <p>Last year, Virgin Media O2, blocked more than £250 million ($A487.5 million) in suspected fraudulent transactions, which is roughly equivalent to stopping one every two minutes. </p> <p>According to the telecommunications company, Daisy was developed in response to research revealing that the top reason why the British public wouldn’t bait scammers themselves is because they don't want to waste their own time. </p> <p>“With scammers operating full-time call centres specifically to target Brits, we’re urging everyone to remain vigilant,” commented Murray Mackenzie, Virgin Media O2’s director of fraud.</p> <p>Daisy, has "all the time in the world", and the video's unveiling her character, showed just how positive her work has been. </p> <p>“It’s nearly been an hour!” one exasperated scammer said over the phone. </p> <p>Another fraudster said: “I think your profession is bothering people.” </p> <p>The chatbot replied: “I’m just trying to have a little chat.”</p> <p><em>Image: O2</em></p> <p> </p>

Legal

Placeholder Content Image

Prince Philip's final phone call to King Charles revealed

<p>Prince Philip was known for his quick wit and sense of humour, and now his family have shared their favourite moments with him in the BBC documentary <em>Prince Philip: The Family Remembers</em>. </p> <p>In the documentary, King Charles revealed the cheeky remarks the Duke made in their final phone call just hours before his passing on April 9, 2021 at the age of 99. </p> <p>Charles recalled discussing the Duke's upcoming 100th birthday celebrations and having to raise his voice so his father could hear him better, saying: “We’re talking about your birthday! And whether there’s going to be a reception!” </p> <p>The Duke quipped: “Well, I’ve got to be alive for it, haven’t I?”</p> <p>King Charles fondly shared what he said to his father's cheeky remark, “I told him ‘I knew you’d say that!'”.</p> <p>In another part of the documentary, the monarch recalled the benefits of having young parents. </p> <p>“He was marvellous at arranging silly games. I mean, the fun of having obviously young parents was… there were lots of chasing around and mad things," he said.</p> <p>Prince William also shared some of his fond memories with his late grandfather, recalling the pranks they used to pull together, and one of them being squirting mustard all over the ceiling - much to the Queen’s annoyance.</p> <p> “He used to take the lid off [the tube] and put it in your hands … and then he’d squish your hands together to fire the mustard onto the ceiling," William said. </p> <p>“He used to get in a lot of trouble from my grandmother,” he added.</p> <p>William’s cousins, Princess Anne’s children Zara Tindall and Peter Phillips, also remembered the same prank. </p> <p>“He gets you to hold it in your hands and I can’t remember exactly what he says — but he ends up slamming your hands together… it goes all over the ceiling,” Zara said.</p> <p>Her brother Peter added: “I actually think the marks are still there.”</p> <p><em>Image: Canadian Press/ Shutterstock Editorial</em></p>

Family & Pets

Placeholder Content Image

Are older adults more vulnerable to scams? What psychologists have learned about who’s most susceptible, and when

<p><em><a href="https://theconversation.com/profiles/natalie-c-ebner-1527554">Natalie C. Ebner</a>, <a href="https://theconversation.com/institutions/university-of-florida-1392">University of Florida</a> and <a href="https://theconversation.com/profiles/didem-pehlivanoglu-1527551">Didem Pehlivanoglu</a>, <a href="https://theconversation.com/institutions/university-of-florida-1392">University of Florida</a></em></p> <p>About 1 in 6 Americans <a href="https://www.census.gov/library/stories/2023/05/2020-census-united-states-older-population-grew.html">are age 65 or older</a>, and that percentage <a href="https://www.ncoa.org/article/get-the-facts-on-older-americans">is projected to grow</a>. Older adults often hold positions of power, have retirement savings accumulated over the course of their lifetimes, and make important financial and health-related decisions – all of which makes them attractive targets for financial exploitation.</p> <p>In 2021, there were more than 90,000 older victims of fraud, according to the FBI. These cases resulted in <a href="https://www.ic3.gov/Media/PDF/AnnualReport/2021_IC3ElderFraudReport.pdf">US$1.7 billion in losses</a>, a 74% increase compared with 2020. Even so, that may be a significant undercount, since embarrassment or lack of awareness <a href="https://assets.aarp.org/rgcenter/econ/fraud-victims-11.pdf">keeps some victims from reporting</a>.</p> <p><a href="https://ncea.acl.gov/elder-abuse#gsc.tab=0">Financial exploitation</a> represents one of the most common forms of elder abuse. Perpetrators are often individuals in the victims’ inner social circles – family members, caregivers or friends – but can also be strangers.</p> <p>When older adults experience financial fraud, they typically <a href="https://public.tableau.com/app/profile/federal.trade.commission/viz/AgeandFraud/Infographic">lose more money</a> than younger victims. Those losses can have <a href="https://doi.org/10.1057/sj.2012.11">devastating consequences</a>, especially since older adults have limited time to recoup – dramatically reducing their independence, health and well-being.</p> <p>But older adults have been largely neglected in research on this burgeoning type of crime. We are <a href="https://ebnerlab.psych.ufl.edu/natalie-c-ebner-phd/">psychologists who study social cognition</a> and <a href="https://ebnerlab.psych.ufl.edu/didem-pehlivanoglu/">decision-making</a>, and <a href="https://ebnerlab.psych.ufl.edu/">our research lab</a> at the University of Florida is aimed at understanding the factors that shape vulnerability to deception in adulthood and aging.</p> <h2>Defining vulnerability</h2> <p>Financial exploitation involves a variety of exploitative tactics, such as coercion, manipulation, undue influence and, frequently, some sort of deception.</p> <p>The majority of current research focuses on <a href="https://doi.org/10.1002/acp.3052">people’s ability to distinguish between truth and lies</a> during interpersonal communication. However, deception occurs in many contexts – increasingly, over the internet.</p> <p>Our lab conducts laboratory experiments and real-world studies to measure susceptibility under various conditions: investment games, lie/truth scenarios, phishing emails, text messages, fake news and deepfakes – fabricated videos or images that are created by artificial intelligence technology.</p> <p>To study how people respond to deception, we use measures like surveys, brain imaging, behavior, eye movement and heart rate. We also collect health-related biomarkers, such as being a carrier of <a href="https://pubmed.ncbi.nlm.nih.gov/8346443/">gene variants</a> that increase risk for Alzheimer’s disease, to identify individuals with particular vulnerability.</p> <p>And <a href="https://doi.org/10.20900/agmr20230007">our work</a> shows that an older adult’s ability to detect deception is not just about their individual characteristics. It also depends on how they are being targeted.</p> <figure class="align-center zoomable"><a href="https://images.theconversation.com/files/593784/original/file-20240513-16-j9zy1i.png?ixlib=rb-4.1.0&amp;q=45&amp;auto=format&amp;w=1000&amp;fit=clip"><img src="https://images.theconversation.com/files/593784/original/file-20240513-16-j9zy1i.png?ixlib=rb-4.1.0&amp;q=45&amp;auto=format&amp;w=754&amp;fit=clip" sizes="(min-width: 1466px) 754px, (max-width: 599px) 100vw, (min-width: 600px) 600px, 237px" srcset="https://images.theconversation.com/files/593784/original/file-20240513-16-j9zy1i.png?ixlib=rb-4.1.0&amp;q=45&amp;auto=format&amp;w=600&amp;h=339&amp;fit=crop&amp;dpr=1 600w, https://images.theconversation.com/files/593784/original/file-20240513-16-j9zy1i.png?ixlib=rb-4.1.0&amp;q=30&amp;auto=format&amp;w=600&amp;h=339&amp;fit=crop&amp;dpr=2 1200w, https://images.theconversation.com/files/593784/original/file-20240513-16-j9zy1i.png?ixlib=rb-4.1.0&amp;q=15&amp;auto=format&amp;w=600&amp;h=339&amp;fit=crop&amp;dpr=3 1800w, https://images.theconversation.com/files/593784/original/file-20240513-16-j9zy1i.png?ixlib=rb-4.1.0&amp;q=45&amp;auto=format&amp;w=754&amp;h=426&amp;fit=crop&amp;dpr=1 754w, https://images.theconversation.com/files/593784/original/file-20240513-16-j9zy1i.png?ixlib=rb-4.1.0&amp;q=30&amp;auto=format&amp;w=754&amp;h=426&amp;fit=crop&amp;dpr=2 1508w, https://images.theconversation.com/files/593784/original/file-20240513-16-j9zy1i.png?ixlib=rb-4.1.0&amp;q=15&amp;auto=format&amp;w=754&amp;h=426&amp;fit=crop&amp;dpr=3 2262w" alt="A figure with two circles and an arrow between them. One circle shows icons that symbolize individual susceptibility to deception -- like a brain, and a walking cane -- while the other has icons of types of deception, like mail or a text message." /></a><figcaption><span class="caption">Vulnerability depends not only on the person, but also the type of fraud being used.</span> <span class="attribution">Natalie Ebner and Didem Pehlivanoglu</span></figcaption></figure> <h2>Individual risk factors</h2> <p>Better cognition, social and emotional capacities, and brain health are all associated with less susceptibility to deception.</p> <p>Cognitive functions, such as how quickly our brain processes information and how well we remember it, <a href="https://doi.org/10.1177/1745691619827511">decline with age</a> and impact decision-making. For example, among people around 70 years of age or older, declines in analytical thinking are associated with <a href="https://doi.org/10.1037/xap0000426">reduced ability to detect false news stories</a>.</p> <p>Additionally, low memory function in aging is associated with <a href="https://doi.org/10.1093/geronb/gby036">greater susceptibility to email phishing</a>. Further, according to recent <a href="https://osf.io/preprints/osf/6f2y9">research</a>, this correlation is specifically pronounced among older adults who carry a gene variant that is a genetic risk factor for developing Alzheimer’s disease later in life. Indeed, some research suggests that greater financial exploitability may serve as <a href="https://doi.org/10.1016/j.neubiorev.2022.104773">an early marker</a> of disease-related cognitive decline.</p> <p>Social and emotional influences are also crucial. Negative mood can enhance somebody’s ability to detect lies, while <a href="https://doi.org/10.1037/xap0000426">positive mood in very old</a> age can impair a person’s ability to detect fake news.</p> <p>Lack of support and loneliness exacerbate susceptibility to deception. Social isolation during the COVID-19 pandemic has led to <a href="https://doi.org/10.1093/gerona/glaa077">increased reliance on online platforms</a>, and older adults with lower digital literacy are <a href="https://doi.org/10.1093/geront/gnac188">more vulnerable to fraudulent emails and robocalls</a>.</p> <p>Finally, an individual’s brain and body responses play a critical role in susceptibility to deception. One important factor is <a href="https://doi.org/10.1016/j.tins.2020.10.007">interoceptive awareness</a>: the ability to accurately read our own body’s signals, like a “gut feeling.” This awareness is correlated with <a href="https://doi.org/10.1093/geroni/igad104.3714">better lie detection</a> in older adults.</p> <p>According to <a href="https://doi.org/10.1093/gerona/glx051">a first study</a>, financially exploited older adults had a significantly smaller size of insula – a brain region key to integrating bodily signals with environmental cues – than older adults who had been exposed to the same threat but avoided it. Reduced insula activity is also related to greater difficulty <a href="https://doi.org/10.1073/pnas.1218518109">picking up on cues</a> that make someone appear less trustworthy.</p> <h2>Types of effective fraud</h2> <p>Not all deception is equally effective on everyone.</p> <p><a href="https://doi.org/10.1145/3336141">Our findings</a> show that email phishing that relies on reciprocation – people’s tendency to repay what another person has provided them – was more effective on older adults. Younger adults, on the other hand, were more likely to fall for phishing emails that employed scarcity: people’s tendency to perceive an opportunity as more valuable if they are told its availability is limited. For example, an email might alert you that a coin collection from the 1950s has become available for a special reduced price if purchased within the next 24 hours.</p> <p>There is also evidence that as we age, we have greater difficulty detecting the “wolf in sheep’s clothing”: someone who appears trustworthy, but is not acting in a trustworthy way. In <a href="https://doi.org/10.1038/s41598-023-50500-x">a card-based gambling game</a>, we found that compared with their younger counterparts, older adults are more likely to select decks presented with trustworthy-looking faces, even though those decks consistently resulted in negative payouts. Even after learning about untrustworthy behavior, older adults showed greater difficulty overcoming their initial impressions.</p> <h2>Reducing vulnerability</h2> <p>Identifying who is especially at risk for financial exploitation in aging is crucial for preventing victimization.</p> <p>We believe interventions should be tailored, instead of a one-size-fits-all approach. For example, perhaps machine learning algorithms could someday determine the most dangerous types of deceptive messages that certain groups encounter – such as in text messages, emails or social media platforms – and provide on-the-spot warnings. Black and Hispanic consumers are <a href="https://www.ftc.gov/system/files/documents/reports/combating-fraud-african-american-latino-communities-ftcs-comprehensive-strategic-plan-federal-trade/160615fraudreport.pdf">more likely to be victimized</a>, so there is also a dire need for interventions that resonate with their communities.</p> <p>Prevention efforts would benefit from taking a holistic approach to help older adults reduce their vulnerability to scams. Training in <a href="https://doi.org/10.1007/s40520-019-01259-7">financial, health</a> and <a href="https://www.nature.com/articles/s41598-022-08437-0.pdf">digital literacy</a> are important, but so are programs to <a href="https://doi.org/10.1186/s12889-021-10363-1">address loneliness</a>.</p> <p>People of all ages need to keep these lessons in mind when interacting with online content or strangers – but not only then. Unfortunately, financial exploitation often comes from individuals close to the victim.<img style="border: none !important; box-shadow: none !important; margin: 0 !important; max-height: 1px !important; max-width: 1px !important; min-height: 1px !important; min-width: 1px !important; opacity: 0 !important; outline: none !important; padding: 0 !important;" src="https://counter.theconversation.com/content/227991/count.gif?distributor=republish-lightbox-basic" alt="The Conversation" width="1" height="1" /></p> <p><a href="https://theconversation.com/profiles/natalie-c-ebner-1527554"><em>Natalie C. Ebner</em></a><em>, Professor of Psychology, <a href="https://theconversation.com/institutions/university-of-florida-1392">University of Florida</a> and <a href="https://theconversation.com/profiles/didem-pehlivanoglu-1527551">Didem Pehlivanoglu</a>, Postdoctoral Researcher, Psychology, <a href="https://theconversation.com/institutions/university-of-florida-1392">University of Florida</a></em></p> <p><em>Image credits: Shutterstock</em></p> <p><em>This article is republished from <a href="https://theconversation.com">The Conversation</a> under a Creative Commons license. Read the <a href="https://theconversation.com/are-older-adults-more-vulnerable-to-scams-what-psychologists-have-learned-about-whos-most-susceptible-and-when-227991">original article</a>.</em></p>

Money & Banking

Placeholder Content Image

"This is horrific": Queen icon calls out convincing scam

<p>Brian May has spoken out after becoming the target of a dangerous scam, urging people to be careful online. </p> <p>The guitarist of iconic rock band Queen was made aware of the scam by a fan, who sent him the TikTok of what seems to be May himself offering concert tickets at a discount. </p> <p>The video, which is actually AI-generated and has nothing to do with May or with Queen, shows the rockstar offering music fans the chance to see a concert from backstage. </p> <p>“I hope you’re all well out there,” says the fake Brian May in the video. “Some good news. Backstage tickets for my next show in your cities are now going for only $800, which were previously $2000. I’m only selecting 10 people in the comments, so if you’re ready to make payment, comment, ‘ready’.”</p> <p>May responded to the post publicly, sharing his horror and anger with fans over the “creepy” video, saying, “My God. This is horrific.”</p> <p>“I suppose this is now so easy to do – and there are always people who will sink to any depths to try to make a quick buck. Disgusting.”</p> <p>He continued, “Thanks for the alert dear (TikTok username) stereojazz. I’ve alerted our team and hopefully we can squash this.”</p> <p>Fans were quick to comment that they had almost been fooled by the convincing video. </p> <p>“That they abuse your beautiful personality for this scam hurts even more and is really scary. I hate it,” commented one. </p> <p>“It is insanely terrifying what AI can do these days,” wrote another.</p> <p><em>Image credits: TikTok</em></p>

Legal

Placeholder Content Image

Do mobile phones cause brain cancer? Science makes definitive call

<p>The question of whether mobile phones - specifically the electromagnetic radiation or radio waves emitted by these devices - cause cancer has been debated and researched for a long time, and now scientists have made a definitive call. </p> <p>A new comprehensive review commissioned by the World Health Organization has found that mobile phones are NOT linked to brain and head cancers. </p> <p>The systematic review, led by the Australian Radiation Protection and Nuclear Safety Agency (Arpansa), examined over 5,000 studies, which included 63 observational studies on humans published between 1994 and 2022 and is "the most comprehensive review to date" according to review lead author, associate prof Ken Karipidis. </p> <p>“We concluded the evidence does not show a link between mobile phones and brain cancer or other head and neck cancers," he said. </p> <p>The review, which was published on Wednesday, focused on cancers of the nervous system, salivary gland and brain tumours. </p> <p>They found no overall association between mobile phone use and cancer, even if people have used it for a long time (over 10 years) or spend a lot of time on their phones. </p> <p>“I’m quite confident with our conclusion. And what makes us quite confident is … even though mobile phone use has skyrocketed, brain tumour rates have remained stable,” Karipidis continued. </p> <p>Despite emitting electromagnetic radiation, also known as radio waves, the exposure is relatively low. </p> <p>Karipidis said people hear the word radiation and assume it is similar to nuclear radiation, “and because we use a mobile phone close to the head when we’re making calls, there is a lot of concern.”</p> <p>He clarified that “radiation is basically energy that travels from one point to another. There are many different types, for example, ultraviolet radiation from the sun." </p> <p>“We’re always exposed to low-level radio waves in the everyday environment.”</p> <p>While exposure from mobile phones is still low, it is much higher than exposure from any other wireless technology sources since they are used close to the head, Karipidis said. </p> <p>The association between mobile phones and cancers came about from early studies comparing differences between those with and without brain tumours and asking about their exposure history. </p> <p>According to Karipidis, who is also the vice-chair of the International Commission on Non-Ionizing Radiation Protection, the results from these kind of studies tend to be biased, as the group with the tumour tend to overreport their exposure. </p> <p>Based on these early studies WHO’s International Agency for Research on Cancer (IARC) designated radio-frequency fields like those from mobile phones as a possible cancer risk, but Karipidis said "this classification doesn’t mean all that much”.</p> <p>This is because the IARC has different classifications of cancer risk, with some substances classified as  a “definite” carcinogen (such as smoking), and others as “probable” or “possible” carcinogens.</p> <p>Tim Driscoll, a professor at the University of Sydney and chair of the Australian Cancer Council’s occupational and environmental cancers committee, also backed the systematic review. </p> <p>“I think people should feel reassured by this study … but it’s worthwhile just remembering that the studies aren’t perfect, but the weight of evidence certainly is that mobile phones should be considered safe to use in terms of any concerns about increased risk of cancer,” Driscoll said.</p> <p><em>Images: Shutterstock</em></p>

Body

Placeholder Content Image

Romance fraud doesn’t only happen online – it can turn into real-world deception

<div class="theconversation-article-body"><em><a href="https://theconversation.com/profiles/cassandra-cross-122865">Cassandra Cross</a>, <a href="https://theconversation.com/institutions/queensland-university-of-technology-847">Queensland University of Technology</a></em></p> <p>We often think of fraudsters as people on the opposite side of the world. They will manipulate and exploit victims through words on a computer screen, or loving messages through the phone. But romance fraud can also happen in person, with the fraudster sleeping in the bed beside you.</p> <p>This was the circumstance Australian writer Stephanie Wood found herself in. It’s also the basis for the new <a href="https://www.paramountanz.com.au/news/fake-breaks-subscription-and-streaming-records-on-paramount/">television series Fake</a>, currently screening on Paramount+. A dramatisation of Wood’s powerful memoir by the same name, the series outlines the many lies and betrayals of an intimate relationship.</p> <p>It’s a brutal insight into the world of deception which characterises romance fraud.</p> <h2>When love hurts</h2> <p>Romance fraud (or romance scams) is what it sounds like – offenders use the guise of a relationship to gain a financial reward. In most cases, it’s through the direct transfer of money from the victim, but it can also be through using personal credentials to commit identity crimes.</p> <p>From the outside, it’s hard to understand how romance fraud is so effective. However, <a href="https://eprints.qut.edu.au/233966/">research has documented</a> the range of grooming techniques, social engineering tactics and methods of psychological abuse deployed by offenders. Offenders know exactly what to do and say to gain the compliance of their victim.</p> <hr /> <hr /> <p>Offenders target a person’s vulnerability and work hard to build strong levels of trust. There are endless calls, texts and emails that create a bond. Then follows the inevitable “crisis”, whereby the offender needs money urgently for a health emergency, criminal justice situation, business need or even a <a href="https://www.accc.gov.au/media-release/romance-baiting-scams-on-the-rise">cryptocurrency investment</a> opportunity.</p> <p>For many, this can result in ongoing payments and substantial losses. Over <a href="https://www.accc.gov.au/about-us/publications/serial-publications/targeting-scams-reports-on-scams-activity/targeting-scams-report-of-the-accc-on-scams-activity-2023">A$200 million</a> was reported lost by Australians to this fraud type in 2023, but this is likely a gross underestimation of actual figures. It also doesn’t capture the many <a href="https://www.aic.gov.au/sites/default/files/2020-05/29-1314-FinalReport.pdf">non-financial harms</a>, including physical and emotional declines in wellbeing.</p> <p>When the relationship finally ends, it’s too late. The money is gone, the extent of the deception is laid bare, and recovery from the heartache and loss is a constant battle.</p> <p>There is a well-documented “<a href="https://journals.sagepub.com/doi/full/10.1177/1748895815603773">double hit</a>” of victimisation, with individuals needing to grieve the relationship as well as any financial losses.</p> <h2>Seeing is not believing</h2> <p>There are countless incidents of romance fraud where the offender and victim never meet: the deception takes place entirely online. But it’s important to know fraudsters also operate in person.</p> <p>Wood’s memoir details an extraordinary level of lies and dishonesty presented to her throughout her relationship. Stories that laid the groundwork for later fabrications. Stories that were deliberate and calculated in how they were used to gain her trust, and later used against her.</p> <p>The motivations of these real-world deceivers are not always straightforward. Often it’s about money, but not always. For Wood, not being asked for money allayed potential suspicions, but it didn’t reduce her feelings of loss and emotional devastation upon discovering the extent of the lies.</p> <figure><iframe src="https://www.youtube.com/embed/K_1Akqhjy6M?wmode=transparent&amp;start=0" width="440" height="260" frameborder="0" allowfullscreen="allowfullscreen"></iframe></figure> <p>Wood is by no means alone in her experience. Marketing executive Tracy Hall endured a similarly sophisticated and all-encompassing level of deceit in her relationship with <a href="https://www.theguardian.com/australia-news/2019/jun/20/conman-hamish-mclaren-jailed-for-up-to-16-years-after-swindling-76m-from-victims">convicted conman Hamish McLaren</a> (known to her as Max Tavita).</p> <p>In her book, <a href="https://tracyhall.com.au/the-last-victim">The Last Victim</a>, Hall recounts snippets of their daily lives over a 16-month period, with McLaren portraying himself as a successful professional in finance. His mail was addressed to Max Tavita and his phone conversations were with real people. Yet his whole identity and the world he represented to Hall was a complete fabrication.</p> <p>The experiences of Wood and Hall highlight the sheer depth of elaborate deception that can be perpetrated in an intimate relationship. Critically, it highlights romance fraud isn’t relegated to an online environment.</p> <h2>How can we prevent romance fraud?</h2> <p>There is an overwhelming amount of <a href="https://eprints.qut.edu.au/83702/">shame and stigma</a> associated with romance fraud. The dynamics of these deceptive relationships are misunderstood, and this perpetuates negative stereotypes and a discourse of victim blaming, even from friends and family.</p> <p>In hindsight, the warning signs might seem obvious, but fraudsters tend to effectively disguise these in real time and deploy deliberate tactics to overcome any suspicion.</p> <p>We must all create a culture that empowers victims to come forward to raise awareness. This isn’t intended to create fear or anxiety, but to normalise the threat fraud poses, and to allow for difficult conversations if it happens. Ongoing silence from victims only favours the offender.</p> <h2>How to protect yourself from romance fraud</h2> <p>It’s inevitable we’ll continue to swipe right in our efforts to find love. But keep a healthy level of scepticism and an open dialogue with family and friends in any quest for a new relationship.</p> <p>Don’t be afraid to conduct your own searches of people, places and situations presented to you in a relationship. There is a memorable moment in Fake where the protagonist refutes her friend’s offer of assistance, saying “this is a love story not an investigation”. Sadly, sometimes an investigation is necessary.</p> <p>No matter what the circumstance or the person, think carefully before sending any money. Only give what you are willing to lose.</p> <p>Deception comes in many forms. We must recognise it for what it is, and the impact it has on victims. But we must also not give into those who lie, and let them define who we are or dictate our ability to trust.</p> <p><em>If you or someone you know has been a victim of romance fraud, you can report it to <a href="https://www.cyber.gov.au/report-and-recover/report">ReportCyber</a>. For support, contact <a href="https://www.idcare.org/">iDcare</a>. For prevention advice, consult <a href="https://www.scamwatch.gov.au/">Scamwatch</a>.</em><!-- Below is The Conversation's page counter tag. Please DO NOT REMOVE. --><img style="border: none !important; box-shadow: none !important; margin: 0 !important; max-height: 1px !important; max-width: 1px !important; min-height: 1px !important; min-width: 1px !important; opacity: 0 !important; outline: none !important; padding: 0 !important;" src="https://counter.theconversation.com/content/237653/count.gif?distributor=republish-lightbox-basic" alt="The Conversation" width="1" height="1" /><!-- End of code. If you don't see any code above, please get new code from the Advanced tab after you click the republish button. The page counter does not collect any personal data. More info: https://theconversation.com/republishing-guidelines --></p> <p><a href="https://theconversation.com/profiles/cassandra-cross-122865"><em>Cassandra Cross</em></a><em>, Associate Dean (Learning &amp; Teaching) Faculty of Creative Industries, Education and Social Justice, <a href="https://theconversation.com/institutions/queensland-university-of-technology-847">Queensland University of Technology</a></em></p> <p><em>Image credits: Shutterstock</em></p> <p><em>This article is republished from <a href="https://theconversation.com">The Conversation</a> under a Creative Commons license. Read the <a href="https://theconversation.com/romance-fraud-doesnt-only-happen-online-it-can-turn-into-real-world-deception-237653">original article</a>.</em></p> </div>

Legal

Placeholder Content Image

Yes, blue light from your phone can harm your skin. A dermatologist explains

<p><em><a href="https://theconversation.com/profiles/michael-freeman-223922">Michael Freeman</a>, <a href="https://theconversation.com/institutions/bond-university-863">Bond University</a></em></p> <p>Social media is full of claims that everyday habits can harm your skin. It’s also full of recommendations or advertisements for products that can protect you.</p> <p>Now social media has blue light from our devices in its sights.</p> <p>So can scrolling on our phones really damage your skin? And will applying creams or lotions help?</p> <p>Here’s what the evidence says and what we should really be focusing on.</p> <h2>Remind me, what actually is blue light?</h2> <p>Blue light is part of the visible light spectrum. Sunlight is the strongest source. But our electronic devices – such as our phones, laptops and TVs – also emit it, albeit at levels <a href="https://melasmaclinic.com.au/wp-content/uploads/2024/01/Melasma-LEDS.pdf">100-1,000 times</a> lower.</p> <p>Seeing as we spend so much time using these devices, there has been some concern about the impact of blue light on our health, including <a href="https://theconversation.com/do-blue-light-glasses-really-work-can-they-reduce-eye-strain-or-help-me-sleep-213145">on our eyes and sleep</a>.</p> <p>Now, we’re learning more about the impact of blue light on our skin.</p> <h2>How does blue light affect the skin?</h2> <p>The evidence for blue light’s impact on skin is still emerging. But there are some interesting findings.</p> <p><strong>1. Blue light can increase pigmentation</strong></p> <p><a href="https://academic.oup.com/ced/article-abstract/46/5/934/6598472?redirectedFrom=fulltext&amp;login=false">Studies</a> <a href="https://onlinelibrary.wiley.com/doi/full/10.1111/srt.13401">suggest</a> exposure to blue light can stimulate production of melanin, the natural skin pigment that gives skin its colour.</p> <p>So too much blue light can potentially worsen hyperpigmentation – overproduction of melanin leading to dark spots on the skin – especially in people with darker skin.</p> <p><strong>2. Blue light can give you wrinkles</strong></p> <p>Some research <a href="https://www.ncbi.nlm.nih.gov/pmc/articles/PMC6280109/">suggests</a> blue light might damage collagen, a protein essential for skin structure, potentially accelerating the formation of wrinkles.</p> <p>A laboratory <a href="https://pubmed.ncbi.nlm.nih.gov/29399830/">study suggests</a> this can happen if you hold your device one centimetre from your skin for as little as an hour.</p> <p>However, for most people, if you hold your device more than 10cm away from your skin, that would reduce your exposure <a href="https://en.wikipedia.org/wiki/Inverse-square_law">100-fold</a>. So this is much less likely to be significant.</p> <p><strong>3. Blue light can disrupt your sleep, affecting your skin</strong></p> <p>If the skin around your eyes looks dull or puffy, it’s easy to blame this directly on blue light. But as we know blue light affects sleep, what you’re probably seeing are some of the visible signs of sleep deprivation.</p> <p>We know blue light is particularly good at <a href="https://journals.physiology.org/doi/full/10.1152/japplphysiol.01413.2009?rss=1">suppressing</a> production of melatonin. This natural hormone normally signals to our bodies when it’s time for sleep and helps regulate our sleep-wake cycle.</p> <p>By suppressing melatonin, blue light exposure before bed disrupts this natural process, making it harder to fall asleep and potentially reducing the <a href="https://www.tandfonline.com/doi/abs/10.1080/07420528.2023.2173606">quality of your sleep</a>.</p> <p>The stimulating nature of screen content further disrupts sleep. Social media feeds, news articles, video games, or even work emails can keep our brains active and alert, hindering the transition into a sleep state.</p> <p>Long-term sleep problems can also <a href="https://academic.oup.com/ced/article-abstract/40/1/17/6621145?login=false">worsen</a> existing skin conditions, such as acne, eczema and rosacea.</p> <p>Sleep deprivation can elevate cortisol levels, a stress hormone that breaks down collagen, the protein responsible for skin’s firmness. Lack of sleep can also weaken the skin’s natural barrier, making it more susceptible to environmental damage and dryness.</p> <h2>Can skincare protect me?</h2> <p>The beauty industry has capitalised on concerns about blue light and offers a range of protective products such as mists, serums and lip glosses.</p> <p>From a practical perspective, probably only those with the more troublesome hyperpigmentation known as <a href="https://dermnetnz.org/topics/melasma">melasma</a> need to be concerned about blue light from devices.</p> <p>This condition requires the skin to be well protected from all visible light at all times. The only products that are totally effective are those that block all light, namely mineral-based suncreens or some cosmetics. If you can’t see the skin through them they are going to be effective.</p> <p>But there is a lack of rigorous testing for non-opaque products outside laboratories. This makes it difficult to assess if they work and if it’s worth adding them to your skincare routine.</p> <h2>What can I do to minimise blue light then?</h2> <p>Here are some simple steps you can take to minimise your exposure to blue light, especially at night when it can disrupt your sleep:</p> <ul> <li> <p>use the “night mode” setting on your device or use a blue-light filter app to reduce your exposure to blue light in the evening</p> </li> <li> <p>minimise screen time before bed and create a relaxing bedtime routine to avoid the types of sleep disturbances that can affect the health of your skin</p> </li> <li> <p>hold your phone or device away from your skin to minimise exposure to blue light</p> </li> <li> <p>use sunscreen. Mineral and physical sunscreens containing titanium dioxide and iron oxides offer broad protection, including from blue light.</p> </li> </ul> <h2>In a nutshell</h2> <p>Blue light exposure has been linked with some skin concerns, particularly pigmentation for people with darker skin. However, research is ongoing.</p> <p>While skincare to protect against blue light shows promise, more testing is needed to determine if it works.</p> <p>For now, prioritise good sun protection with a broad-spectrum sunscreen, which not only protects against UV, but also light.<img style="border: none !important; box-shadow: none !important; margin: 0 !important; max-height: 1px !important; max-width: 1px !important; min-height: 1px !important; min-width: 1px !important; opacity: 0 !important; outline: none !important; padding: 0 !important;" src="https://counter.theconversation.com/content/233335/count.gif?distributor=republish-lightbox-basic" alt="The Conversation" width="1" height="1" /></p> <p><em><a href="https://theconversation.com/profiles/michael-freeman-223922">Michael Freeman</a>, Associate Professor of Dermatology, <a href="https://theconversation.com/institutions/bond-university-863">Bond University</a></em></p> <p><em>Image credits: Shutterstock </em></p> <p><em>This article is republished from <a href="https://theconversation.com">The Conversation</a> under a Creative Commons license. Read the <a href="https://theconversation.com/yes-blue-light-from-your-phone-can-harm-your-skin-a-dermatologist-explains-233335">original article</a>.</em></p>

Body

Placeholder Content Image

Been scammed? Here's how to financially recover

<p>Many people feel shame and embarrassment after realising they have been scammed. But you shouldn’t. You did nothing wrong; you are the victim of a crime. </p> <p>Not only are such feelings bad for your mental wellbeing, but they also often stop people reporting the scam or taking action to avoid further losses. </p> <p>Remember too that you’re not alone: victims reported more than 601,000 scams to the ACCC in 2023, together losing a staggering $2.74 billion. People of all ages, professions, and backgrounds have been affected. </p> <p>As hard as it may be, try to leave emotion aside and approach this like any other money matter – logically and methodically. Doing so will help you act faster and more decisively, which is crucial to your financial recovery. </p> <p>The following checklist will help you through this process:</p> <ul> <li><strong>Step 1 – Try to recoup your stolen money</strong></li> </ul> <p>Report the scam immediately. Contact your bank or card provider to stop the transaction being processed. Notify the company or marketplace where it occurred – they may have options to reverse the payment or for you to claim compensation for fraud. </p> <p>Also inform the ACCC’s Scamwatch and police if relevant, which may aid in tracking down the scammer and will help them alert the wider public on what to look out for. </p> <p>Unfortunately, the money is likely gone for good, but prompt action may just help you get some or all of it back. </p> <ul> <li><strong>Step 2 – Secure your accounts from further thefts</strong></li> </ul> <p>Once scammers have found a way to steal money, they often go back to try for more. Don’t let them! </p> <p>Freeze or cancel affected debit and credit cards, accounts etc. Change and strengthen all your passwords. Set up two-factor authentication if you haven’t already. Remove any suspicious applications on electronic devices. </p> <p>Double check the registrations of any business, adviser or tradesperson before engaging their services. Regularly check your superannuation, investments etc. to monitor for any inconsistencies.</p> <ul> <li><strong>Step 3 – Safeguard your cash flow</strong></li> </ul> <p>Don’t multiplying your losses by racking up new debts to cover the stolen money. That means limiting the use of credit cards, payday lenders and Buy Now, Pay Later schemes. Consider paying with cash instead to help you stick to a budget.</p> <p>If you have lost everything, register with Centrelink for income support. You may also be able to apply for hardship provisions with your bank, phone and energy providers and other essential services.</p> <ul> <li><strong>Step 4 – Get reputable advice</strong></li> </ul> <p>Legal advice may be able to get you out of bogus contracts, like loans or phone plans, and help you in the event your personal information has been stolen (which can be used in various ways to steal money). If you can’t afford a lawyer, there are free alternatives such as Legal Aid or Community Legal Centres. Specialist services such as the Women’s Legal Service may offer support where partner coercion or domestic abuse is involved.</p> <p>Accounting and financial advice may also help you navigate assistance options and longer term recovery efforts.</p> <ul> <li><strong>Step 5 – Rebuild your finances</strong></li> </ul> <p>Your ability to rebuild your finances after a scam will depend on a range of factors, including how much was lost plus your age and circumstances.</p> <p>You could seek to increase your earnings and/or cut your spending by tweaking your household budget, delaying retirement, or temporarily taking a second job to boost your income. </p> <p>Another option is to make your remaining finances work harder than before, such as adjusting your investment strategies (e.g. changing your risk weightings or selling assets) including within your superannuation or accessing equity in your home.</p> <p>If you’re a self-funded retiree, you may now qualify for a part or full pension if your scam losses push your total assets below the means test threshold.</p> <p>Ultimately, the most important things when dealing with the fallout from a scam is to look after yourself and protect what you have left.</p> <p>Scammers have already taken off with your dollars. Don’t let them steal your sense too!</p> <p><em><strong>Helen Baker is a licensed Australian financial adviser and author of On Your Own Two Feet: The Essential Guide to Financial Independence for all Women. Helen is among the 1% of financial planners who hold a master’s degree in the field. Proceeds from book sales are donated to charities supporting disadvantaged women and children. Find out more at <a href="http://www.onyourowntwofeet.com.au/">www.onyourowntwofeet.com.au</a></strong></em></p> <p><em><strong>Disclaimer: The information in this article is of a general nature only and does not constitute personal financial or product advice. Any opinions or views expressed are those of the authors and do not represent those of people, institutions or organisations the owner may be associated with in a professional or personal capacity unless explicitly stated. Helen Baker is an authorised representative of BPW Partners Pty Ltd AFSL 548754.</strong></em></p> <p><em>Image </em><em>credits: Shutterstock </em></p>

Money & Banking

Placeholder Content Image

Why you should be wary of charging your phone in an airport

<p dir="ltr">While charging stations at airports can often be life-savings before boarding a flight, it turns out these handy outlets can be leaving you vulnerable. </p> <p dir="ltr">Many people have fought over a spot to charge up your devices at the last minute before embarking on a holiday, but next time you leave home with your phone or laptop needing some more juice, think again. </p> <p dir="ltr">Emily Stallings, co-founder of tech retailer <em><a href="https://www.getcasely.com/">Casely</a></em>, says that by plugging your phone into a power outlet at a public USB charging station, you're at risk of data breaches and malware infection.</p> <p dir="ltr">"If a device gets infected, it could end up leaking sensitive information or even stop working properly," she told <em><a href="https://travel.nine.com.au/latest/charging-phone-at-the-airport-danger-expert/57d141df-33ba-4a50-89e5-26f6f2a0c18d">9Travel</a></em>.</p> <p dir="ltr">These public USB ports have often been compromised by cybercriminals, who then use these unsecured ports to steal sensitive information transmitted between devices.</p> <p dir="ltr">"From personal emails to financial data, the information intercepted through these compromised ports could lead to identity theft, financial loss, and other serious consequences," explains Stallings.</p> <p dir="ltr">The best way to get around this threat, without letting your phone run out of battery, is to pack a portable charging device in your carry-on bag every time you travel.</p> <p dir="ltr">With your own cord and power bank, it's far less likely that any sneaky hackers will be able to access your device's data.</p> <p dir="ltr">Stallings says you can also enable security features such as USB Restricted Mode on your device, for those moments when you're desperate for a charger and have to rely on public ports. </p> <p dir="ltr">"This adds an extra layer of protection against potential data breaches and malware infections when charging from public USB ports."</p> <p dir="ltr">"By activating USB Restricted Mode or similar security features, you restrict data transfer over USB connections, effectively preventing unauthorised access to your device's data while charging in public spaces."</p> <p dir="ltr"><em>Image credits: Shutterstock </em></p>

Travel Tips

Placeholder Content Image

Costly mistakes to avoid when travelling

<p dir="ltr">While travelling the world is an exciting and joyous way to spend your time, getting caught up in devious scams can sour even the best holiday.</p> <p dir="ltr">Whenever you hit the road, there are a few measures you can take to avoid being hit by hackers and sneaky scammers, and enjoy your holiday to the fullest. </p> <p dir="ltr">When it comes to online scams, some countries are more vulnerable than others, as NAB Executive, Group Investigations Chris Sheehan says.</p> <p dir="ltr">"Just like you'd plan visas and check the weather at your destination, it's also vital to be aware of common scams in the countries you're visiting so you can recognise the red flags and protect yourself," he said. </p> <p dir="ltr">When travelling in a new country, it’s important to be wary of accommodation or booking website impersonation scams, ticket scams for major events, as well as overcharging or wrong charge scams.</p> <p dir="ltr">"The pressure to act now is a red flag in ticket and accommodation scams, while overcharging or wrong charging scams play on distraction and a lack of detail," Chris says.</p> <p dir="ltr">"Letting your bank know where and when you're travelling can help with more accurately monitoring your transactions for suspicious activity while you're away."</p> <p dir="ltr">Another thing to be wary of when on holiday is to avoid posting your real-time location on social media, or inadvertently sharing sensitive travel documents can expose you to serious risks.</p> <p dir="ltr">Broadcasting your whereabouts can make you vulnerable to various risks, including burglary, stalking, and other personal safety threats, while criminals can take advantage of the information you share to target you or your unoccupied home.</p> <p dir="ltr">Travel expert Trevor Cooke from <a href="https://earthweb.com/">EarthWeb</a> says its best to wait until you’ve moved on until you share your location online. </p> <p dir="ltr">"If you really want to share the location of where you travelled to, wait until you're already at the next location or back home," he says.</p> <p dir="ltr">"By delaying your posts, you can still share your experiences without compromising your safety."</p> <p dir="ltr">Another thing to keep in mind when you’re next hitting the road is to be wary about unknowingly posting personal information online, such as your boarding pass. </p> <p dir="ltr">"Many people don't realise how much personal information is on your boarding pass and other temporary travel documents," says security expert Trevor.</p> <p dir="ltr">"Boarding passes, for instance, contain sensitive data such as your full name, frequent flyer number, and a barcode that can be scanned to reveal even more information. This data can be used by criminals for identity theft, unauthorised access to your accounts, and other malicious activities."</p> <p dir="ltr">"To protect yourself, always double-check that any picture you upload does not include your boarding pass, travel itinerary, hotel receipts, or any other sensitive information," Trevor adds.</p> <p dir="ltr"><em>Image credits: Shutterstock </em></p>

Travel Tips

Placeholder Content Image

How to avoid 6 common tourist scams

<p>Often when people are on holidays their focus is on relaxing or seeing the sights of the area. But if you don’t keep your wits about you, it’s possible you might end up losing everything to scammers who will do anything to get their hands on your belongings.</p> <p>Here we have six common scams to look out for while you are travelling abroad.</p> <p><strong>Scam 1:</strong> You are in a busy bar in a tourist friendly area when some locals ask where you’re from and offer to buy you a drink. Without thinking, you accept the drink and then find yourself waking up hours later without any of your belongings as you’ve had your drink spiked.</p> <p><span style="text-decoration: underline;"><em>Solution:</em></span> If people seem too friendly, be aware that they may be scammers. Don’t accept drinks from people you don’t know, and don’t leave your drink unattended to use the bathroom.</p> <p><strong>Scam 2:</strong> You are about to put your handbag and computer on the conveyer belt to go through the scanner. The people in front of you walk through the metal detector and while one goes through, the other sets off the alarms. They step back into where you are standing and take their time removing wallets and coins from their pockets. While you are waiting for your turn to walk through the metal detector, the other person has taken your belongings and is long gone.</p> <p><span style="text-decoration: underline;"><em>Solution:</em></span> Don’t place your items on the conveyer belt until there is no one else waiting in front of you to go through the metal detector.</p> <p><strong>Scam 3:</strong> In a busy area such as after a concert or a busy night like New Year’s Eve it can be impossible to get public transport or a taxi back to your hotel. A friendly looking guy comes by and offers you a lift for a reasonable fee using his private car. The scam itself can then range from being charged an exorbitant amount when you arrive at your hotel – or you could even find yourself robbed and dropped by the side of the road with no way home.</p> <p><span style="text-decoration: underline;"><em>Solution:</em></span> However tempting it is, never get in the car with an unlicensed taxi driver. This is even more important to note if you are travelling alone.</p> <p><strong>Scam 4:</strong> While you are waiting with your luggage for a train or bus, a passer-by appears to drop their wallet and walk off without noticing. You might try to do the right thing by grabbing the wallet and running after the person to return it. By the time you get back, your luggage is missing.</p> <p><span style="text-decoration: underline;"><em>Solution:</em></span> When travelling alone, never leave your items unattended even if it means you don’t help someone when you normally would. This is especially true in airports where baggage will quickly be confiscated if left alone.</p> <p><strong>Scam 5:</strong> You’re taking in the sights when a couple of men dressed as policemen approach you. They demand to see your wallet and let you know that counterfeit money has been given to tourists in the area. When your wallet is returned it has had much of the contents removed.</p> <p><span style="text-decoration: underline;"><em>Solution:</em></span> Police would never demand to see your wallet. If something doesn’t feel right, suggest that you continue the discussion at the nearest police station as you don’t feel comfortable. Most likely they will not push their luck.</p> <p><strong>Scam 6:</strong> You receive a phone call in your hotel room late at night from someone claiming to be from the front desk. They apologise for the late call but request that you just confirm your credit card details as their system is playing up. You read out the numbers and hang up. Before too long your credit card has rung up a huge bill as this was a scammer calling you, not a staff member.</p> <p><span style="text-decoration: underline;"><em>Solution:</em></span> Organise payment in person by letting the caller know that you will come down to the front desk to discuss it.</p> <p><em>Image credits: Getty Images </em></p>

Travel Tips

Placeholder Content Image

Tourist slapped with $225k bill after simple mistake

<p>An American tourist has revealed the moment he was charged with a $US143k (AU$225k) bill after a short holiday to Switzerland. </p> <p>Rene Remund and his wife Linda went on the trip last September.</p> <p>Prior to their travels, Remund made sure to inform his mobile phone provider, T-Mobile, that he was going overseas and as a customer of 30 years, he was told he was “covered”.</p> <p>So, with no worries at all, the tourist shared photos of his moments in the Swiss countryside with friends and family via photo messages. </p> <p>Imagine his surprise when he came home to a six-figure bill, after he racked up thousands and thousands of dollars in daily roaming costs. </p> <p>“I get this T-Mobile bill and it doesn’t bother me very much because I was reading $143,” he explained, adding it wasn’t until he went to pay the bill that he realised a few more zeros were involved.</p> <p>“I look at the bill and I say, ‘excuse me’,” he said.</p> <p>“$143,000 … are you guys crazy?”</p> <p>According to the bill, Remund had racked up 9.5 gigabytes of data while in Europe, which cost him thousands of dollars each day. While it wasn't a huge amount of data, not being covered by roaming fees will cause a user to run up a huge bill very quickly. </p> <p>“I called [T-Mobile] and the girl put me on hold for a while,” he explained.</p> <p>“She said let me check this out and I’ll get back to you. She gets back and says, yeah this is a good bill.</p> <p>“I said, ‘what do you mean it’s a good bill?’ And she says ‘well, this is what you owe’.</p> <p>“I said ‘you’re kidding me … you’re crazy’.”</p> <p>After confirming that his bill was in fact  AU$225,000, Remund hired a lawyer to argue the fact that he was covered for international roaming. </p> <p>His lawyer issued a letter to the president of T-Mobile, and they only received a reply a few days ago. </p> <p>The letter from T-Mobile allegedly said that the service provider was “sorry” for the charges, and that Remund would receive a “credit” to eliminate the entire bill. </p> <p>In an email shared to local media <em>Scripps News Tampa</em>, the mobile phone provider said that customers should always “check the travel features of their plan, such as international data roaming, before departing”.</p> <p>“If a customer is on an older plan that doesn’t include international roaming for data and calling, they’ll need to make sure they’re using aeroplane mode and wi-fi when using data to be certain the device doesn’t connect to an international network.”</p> <p><em style="box-sizing: inherit; margin: 0px; padding: 0px; border: 0px; font-size: 16px; vertical-align: baseline; color: #323338; font-family: Figtree, Roboto, 'Noto Sans Hebrew', 'Noto Kufi Arabic', 'Noto Sans JP', sans-serif; background-color: #ffffff; outline: none !important;">Images: ABC Action News</em></p> <p> </p>

Travel Trouble

Placeholder Content Image

What ‘psychological warfare’ tactics do scammers use, and how can you protect yourself?

<p><em><a href="https://theconversation.com/profiles/mike-johnstone-106590">Mike Johnstone</a>, <a href="https://theconversation.com/institutions/edith-cowan-university-720">Edith Cowan University</a> and <a href="https://theconversation.com/profiles/georgia-psaroulis-1513050">Georgia Psaroulis</a>, <a href="https://theconversation.com/institutions/edith-cowan-university-720">Edith Cowan University</a></em></p> <p>Not a day goes by without a headline <a href="https://www.vice.com/en/article/qjvaym/people-share-worst-scam-stories">about a victim being scammed</a> and losing money. We are constantly warned about new scams and staying safe from cybercriminals. Scamwatch has <a href="https://www.scamwatch.gov.au/research-and-resources/tools-resources/online-resources/spot-the-scam-signs">no shortage of resources</a>, too.</p> <p>So why are people still getting scammed, and sometimes spectacularly so?</p> <p>Scammers use sophisticated psychological techniques. They exploit our deepest human vulnerabilities and bypass rational thought to tap into our emotional responses.</p> <p>This “<a href="https://www.thecut.com/article/amazon-scam-call-ftc-arrest-warrants.html">psychological warfare</a>” coerces victims into making impulsive decisions. Sometimes scammers spread their methods around many potential victims to see who is vulnerable. Other times, criminals focus on a specific person.</p> <p>Let’s unpack some of these psychological techniques, and how you can defend against them.</p> <h2>1. Random phone calls</h2> <p>Scammers start with small requests to establish a sense of commitment. After agreeing to these minor requests, we are more likely to comply with larger demands, driven by a desire to act consistently.</p> <p>The call won’t come from a number in your contacts or one you recognise, but the scammer may pretend to be someone you’ve engaged to work on your house, or perhaps one of your children using a friend’s phone to call you.</p> <p>If it is a scammer, maybe keeping you on the phone for a long time gives them an opportunity to find out things about you or people you know. They can use this info either immediately or at a later date.</p> <h2>2. Creating a sense of urgency</h2> <p>Scammers fabricate scenarios that require immediate action, like claiming a bank account is at risk of closure or an offer is about to expire. This tactic aims to prevent victims from assessing the situation logically or seeking advice, pressuring them into rushed decisions.</p> <p>The scammer creates an artificial situation in which you are frightened into doing something you wouldn’t ordinarily do. Scam calls <a href="https://theconversation.com/we-have-filed-a-case-under-your-name-beware-of-tax-scams-theyll-be-everywhere-this-eofy-162171">alleging to be from the Australian Tax Office</a> (ATO) are a great example. You have a debt to pay (apparently) and things will go badly if you don’t pay <em>right now</em>.</p> <p>Scammers play on your emotions to provoke reactions that cloud judgement. They may threaten legal trouble to instil fear, promise high investment returns to exploit greed, or share fabricated distressing stories to elicit sympathy and financial assistance.</p> <h2>3. Building rapport with casual talk</h2> <p>Through extended conversation, scammers build a psychological commitment to their scheme. No one gets very far by just demanding your password, but it’s natural to be friendly with people who are friendly towards us.</p> <p>After staying on the line for long periods of time, the victim also becomes cognitively fatigued. This not only makes the victim more open to suggestions, but also isolates them from friends or family who might recognise and counteract the scam.</p> <h2>4. Help me to help you</h2> <p>In this case, the scammer creates a situation where they help you to solve a real or imaginary problem (that they actually created). They work their “IT magic” and the problem goes away.</p> <p>Later, they ask you for something you wouldn’t normally do, and you do it because of the “social debt”: they helped you first.</p> <p>For example, a hacker might attack a corporate network, causing it to slow down. Then they call you, pretending to be from your organisation, perhaps as a recent hire not yet on the company’s contact list. They “help” you by turning off the attack, leaving you suitably grateful.</p> <p>Perhaps a week later, they call again and ask for sensitive information, such as the CEO’s password. You <em>know</em> company policy is to not divulge it, but the scammer will ask if you remember them (of course you do) and come up with an excuse for why they really need this password.</p> <p>The balance of the social debt says you will help them.</p> <h2>5. Appealing to authority</h2> <p>By posing as line managers, officials from government agencies, banks, or other authoritative bodies, scammers exploit our natural tendency to obey authority.</p> <p>Such scams operate at varying levels of sophistication. The simple version: your manager messages you with an <em>urgent</em> request to purchase some gift cards and send through their numbers.</p> <p>The complex version: your manager calls and asks to urgently transfer a large sum of money to an account you don’t recognise. You do this because <a href="https://www.wsj.com/articles/fraudsters-use-ai-to-mimic-ceos-voice-in-unusual-cybercrime-case-11567157402">it sounds exactly</a> like your manager on the phone – but the scammer <a href="https://www.forbes.com/sites/thomasbrewster/2021/10/14/huge-bank-fraud-uses-deep-fake-voice-tech-to-steal-millions/?sh=1329b80e7559">is using a voice deepfake</a>. In a recent major case in Hong Kong, such a scam even involved a <a href="https://edition.cnn.com/2024/02/04/asia/deepfake-cfo-scam-hong-kong-intl-hnk/index.html">deepfake video call</a>.</p> <p>This is deeply challenging because artificial intelligence tools, such as Microsoft’s VALL-E, can create <a href="https://arstechnica.com/information-technology/2023/01/microsofts-new-ai-can-simulate-anyones-voice-with-3-seconds-of-audio/">a voice deepfake</a> using just three seconds of sampled audio from a real person.</p> <h2>How can you defend against a scam?</h2> <p>First and foremost, <strong>verify identity</strong>. Find another way to contact the person to verify who they are. For example, you can call a generic number for the business and ask to be connected.</p> <p>In the face of rampant voice deepfakes, it can be helpful to <strong>agree on a “safe word” with your family members</strong>. If they call from an unrecognised number and you don’t hear the safe word just hang up.</p> <p>Watch out for <strong>pressure tactics</strong>. If the conversation is moving too fast, remember that someone else’s problem is not yours to solve. Stop and run the problem past a colleague or family member for a sanity check. A legitimate business will have no problem with you doing this.</p> <p>Lastly, if you are not sure about even the slightest detail, the simplest thing is to hang up or not respond. If you really owe a tax debt, the ATO will write to you.<!-- Below is The Conversation's page counter tag. Please DO NOT REMOVE. --><img style="border: none !important; box-shadow: none !important; margin: 0 !important; max-height: 1px !important; max-width: 1px !important; min-height: 1px !important; min-width: 1px !important; opacity: 0 !important; outline: none !important; padding: 0 !important;" src="https://counter.theconversation.com/content/223959/count.gif?distributor=republish-lightbox-basic" alt="The Conversation" width="1" height="1" /><!-- End of code. If you don't see any code above, please get new code from the Advanced tab after you click the republish button. The page counter does not collect any personal data. More info: https://theconversation.com/republishing-guidelines --></p> <p><a href="https://theconversation.com/profiles/mike-johnstone-106590"><em>Mike Johnstone</em></a><em>, Security Researcher, Associate Professor in Resilient Systems, <a href="https://theconversation.com/institutions/edith-cowan-university-720">Edith Cowan University</a> and <a href="https://theconversation.com/profiles/georgia-psaroulis-1513050">Georgia Psaroulis</a>, Postdoctoral research fellow, <a href="https://theconversation.com/institutions/edith-cowan-university-720">Edith Cowan University</a></em></p> <p><em>Image credits: Shutterstock</em></p> <p><em>This article is republished from <a href="https://theconversation.com">The Conversation</a> under a Creative Commons license. Read the <a href="https://theconversation.com/what-psychological-warfare-tactics-do-scammers-use-and-how-can-you-protect-yourself-223959">original article</a>.</em></p>

Money & Banking

Placeholder Content Image

8 places you should never keep your phone

<p><strong>In your pocket</strong></p> <p>Keeping your phone in your pocket seems logical, but you could be doing more harm than good. According to Dr Lilly Friedman, this is actually the worst place to store your phone. “When phones are on, connected to a wireless network, and placed in a pocket, the radiation is two to seven times higher than if it were placed in a purse or holster,” she says. </p> <p>There is a correlation between radiation from a mobile phone and tumour growth, she adds. Plus, radiation can change the structure of DNA and affect male fertility, according to Dr Friedman. The World Health Organization’s International Agency for Research on Cancer also found that mobile phone radiation is additionally carcinogenic to humans. Merely sitting on your phone could cause health issues such as sciatica or back problems.</p> <p><strong>In your bra</strong></p> <p>Some research and case studies show that keeping your phone in your bra could be linked to breast cancer due to the radiations and vibrations from the phone. That said, there is not enough evidence to establish a definite relationship between the two. Still, keeping your phone in your bra, especially a sports bra, is a bad idea due to the skin-irritating bacteria it could harbour, Muscle &amp; Fitness reports.</p> <p><strong>In your bed or under your pillow</strong></p> <p>Sleeping with your phone is a bad idea for a few reasons. First, keeping your phone under your pillow could build up heat and present a potential fire hazard, especially if your phone is charging or has a defect. It’s also known that the LED light from phone screens can disrupt melatonin production and circadian rhythms, hurting your sleep quality, according to the National Sleep Foundation.</p> <p>And, of course, there’s also radiation to consider. The amounts of radio frequency radiation mobile phones give off are the same ones emitted from microwaves. There is also concern about the safety of mobile phone use with respect to cancer and brain tumours, per the American Cancer Society.</p> <p><strong>Plugged in</strong></p> <p>Keeping your phone plugged in when it has a full battery causes damage to the battery itself, according to pcmag.com. It’s not that your phone ‘overloads’ with power, but heat build-ups from stacking things on top of your phone or keeping it under your pillow, making your phone hotter and damaging your battery.</p> <p><strong>Close to your face</strong></p> <p>Keeping your phone close to your face means bacteria transfers to and from your phone, making your skin and phone dirtier. This combination leads to more acne, skin irritation and even wrinkles, according to Allure. Try using ear pods instead to keep the surface of your phone at a distance from your face.</p> <p><strong>In your glovebox</strong></p> <p>Extreme temperatures are the worst conditions for your phone. So keeping your device in your car’s glovebox during the extremely hot or cold months of the year could lead to problems. According to Time, excess heat can cause everything from data loss or corruption to battery leakage. The cold weather presents just as many issues for your device. In cold temperatures, many smartphones shut off, have display problems, shortened battery life and in rare cases screen shattering.</p> <p><strong>On your beach towel </strong></p> <p>Notice a theme here? The extreme sun and heat at the beach is a recipe for phone disaster. Protect your device after you finish taking beautiful beach pictures. Hot and sunny conditions could, again, cause your phone to overheat – and getting sand in your phone won’t help either.</p> <p><strong>Anywhere in the bathroom</strong></p> <p>Although phones could arguably be the new newspaper, it’s not a good idea to take yours into the bathroom. Even if you keep your device on a counter or away from the toilet, anything within a metre of a flushing toilet could mean bacteria or viruses in the air end up on your phone, according to a study published in Applied and Environmental Microbiology. </p> <p>“The detection of bacteria and viruses falling out onto surfaces in bathrooms after flushing indicated that they remain airborne long enough to settle on surfaces throughout the bathroom,” wrote the study authors.</p> <p><em>Image credits: Getty Images</em></p> <p><em>This article originally appeared on <a href="https://www.readersdigest.co.nz/healthsmart/8-places-you-should-never-keep-your-phone" target="_blank" rel="noopener">Reader's Digest</a>. </em></p>

Technology

Placeholder Content Image

How to protect yourself from cyber-scammers over the festive period

<p><em><a href="https://theconversation.com/profiles/rachael-medhurst-1408437">Rachael Medhurst</a>, <a href="https://theconversation.com/institutions/university-of-south-wales-1586">University of South Wales</a></em></p> <p>The festive season is a time for joy, family and festive cheer. However, it’s also a prime target for cybercriminals. As online shopping ramps up, so does the risk of falling prey to cyber-attacks. That’s why it’s crucial to be extra vigilant about your <a href="https://blog.tctg.co.uk/12-cyber-security-tips-of-christmas">cybersecurity</a> during this time.</p> <p>Here are some essential tips to safeguard yourself and your data during the festive period:</p> <h2>Phishing</h2> <p>Phishing is when criminals use scam emails, text messages or phone calls to trick their victims. Their <a href="https://www.ncsc.gov.uk/collection/phishing-scams">goal</a> is often to make you visit a certain website, which may download a virus on to your computer, or steal bank details or other personal data.</p> <p>This type of scam tends to <a href="https://www.egress.com/blog/phishing/holiday-phishing-scam-guide">increase</a> at this time due to the amount of people having bought or received new gadgets and technology.</p> <p>Look out for there being no direct reference to your name in any communications, with wording such as “Dear Sir/Madam” or other terms such as “valued customer” being used instead. Grammar and spelling mistakes are also often present.</p> <p>Be wary of any suspicious links or attachments within emails too, and don’t click them. It’s better to contact the company directly to check if the message is genuine. You can also <a href="https://www.ncsc.gov.uk/collection/phishing-scams">report</a> suspicious messages and phishing scams to the government’s National Cyber Security Centre.</p> <h2>Shopping safely online</h2> <p>The convenience of online shopping is undeniable, especially during the festive season. However, it’s crucial to prioritise your security when buying online.</p> <p>Before entering your personal and financial information on any website, ensure it’s legitimate and secure. Look for the “https” in the address bar and a <a href="https://theconversation.com/the-vast-majority-of-us-have-no-idea-what-the-padlock-icon-on-our-internet-browser-is-and-its-putting-us-at-risk-216581">padlock</a> icon, which indicates a secure and encrypted connection.</p> <p>When creating passwords for online shopping accounts, use strong, unique combinations of letters, numbers and symbols. Avoid using the same password for multiple accounts, as a breach on one site could compromise all your others.</p> <p>As with shopping in the real world, be cautious when encountering offers that are significantly below usual prices or which make extravagant promises. Always conduct thorough research on the seller and product before making a purchase. If a deal seems too good to be true, it probably is.</p> <p>And if you are out shopping in towns or city centres, there will often be a large number of public wifi options available to you. However, criminals can intercept the data that is transferred across such open and unsecured wifi. So, avoid using public wifi where possible, especially when conducting any financial transactions.</p> <h2>Social media</h2> <p>While social media platforms provide people with a means to keep in touch with family and friends over the festive period, they are often a goldmine for <a href="https://www.which.co.uk/consumer-rights/advice/how-to-spot-a-social-media-scam-aMtwF3u1XKGt">scams</a> and malware (software designed to disrupt, damage or gain unauthorised access to a computer). In the spirit of the festive season, people often share an abundance of personal information on social media, often without considering the potential consequences.</p> <p>This trove of data can make people vulnerable to cyber-attacks. Scammers can exploit this information to gain unauthorised access to social media accounts, steal personal information, or even commit identity theft. To protect yourself, be mindful of what you share.</p> <p>Be wary when interacting with posts and direct messages, especially if they contain suspicious links or attachments. Before clicking on anything, hover over the link to verify its destination. If it shows a website you don’t recognise or seems unrelated to the message, do not click on it. If you receive a message from someone you know but the content seems strange or out of character, contact them directly through a trusted channel to verify its authenticity.</p> <p>Likewise, be wary of messages containing urgent requests for money or personal information from businesses. Genuine organisations will never solicit sensitive details through social media.</p> <p>There are many buy and sell platforms available on social media. But while such platforms can be a great place to find a unique gift, it is also important to remember that not all sellers may be legitimate. So, it’s vital that you don’t share your bank details. If the seller sends a link to purchase the item, do not use it. When meeting to collect an item, it’s generally safer to use cash rather than transferring funds electronically.</p> <figure><iframe src="https://www.youtube.com/embed/aO858HyFbKI?wmode=transparent&amp;start=0" width="440" height="260" frameborder="0" allowfullscreen="allowfullscreen"></iframe><figcaption><span class="caption">Advice for staying safe online.</span></figcaption></figure> <h2>Package delivery scams</h2> <p>As well as being a time for giving and receiving gifts, the festive season is also ripe for cybercriminals to exploit the excitement surrounding <a href="https://www.citizensadvice.org.uk/about-us/about-us1/media/press-releases/scams-linked-to-parcel-deliveries-come-top-in-2023/">package deliveries</a>.</p> <p>Scammers often pose as legitimate delivery companies, sending emails or text messages claiming that a delivery attempt was unsuccessful or requiring additional fees for processing, or even customs clearance. Typically, these messages contain links or phone numbers that, when clicked or called, lead to fake websites or automated phone systems designed to collect personal information or payments.</p> <p>To protect yourself, always verify the legitimacy of any delivery notifications you receive. Check the sender’s email address or phone number against the official contact information for the delivery company. If the information doesn’t match or seems suspicious, don’t click any links or provide personal details.</p> <p>Legitimate delivery companies will never ask for upfront payment or sensitive information through unsolicited messages or calls.</p> <p>Remember, cybercriminals are skilled at manipulating the festive spirit to their advantage. Stay vigilant, exercise caution, and don’t let your excitement for gifts and deliveries compromise your cybersecurity.<!-- Below is The Conversation's page counter tag. Please DO NOT REMOVE. --><img style="border: none !important; box-shadow: none !important; margin: 0 !important; max-height: 1px !important; max-width: 1px !important; min-height: 1px !important; min-width: 1px !important; opacity: 0 !important; outline: none !important; padding: 0 !important;" src="https://counter.theconversation.com/content/218294/count.gif?distributor=republish-lightbox-basic" alt="The Conversation" width="1" height="1" /><!-- End of code. If you don't see any code above, please get new code from the Advanced tab after you click the republish button. The page counter does not collect any personal data. More info: https://theconversation.com/republishing-guidelines --></p> <p><a href="https://theconversation.com/profiles/rachael-medhurst-1408437"><em>Rachael Medhurst</em></a><em>, Course Leader and Senior Lecturer in Cyber Security NCSA, <a href="https://theconversation.com/institutions/university-of-south-wales-1586">University of South Wales</a></em></p> <p><em>Image credits: Getty Images </em></p> <p><em>This article is republished from <a href="https://theconversation.com">The Conversation</a> under a Creative Commons license. Read the <a href="https://theconversation.com/how-to-protect-yourself-from-cyber-scammers-over-the-festive-period-218294">original article</a>.</em></p>

Money & Banking

Placeholder Content Image

How risky is it to give card details over the phone and how do I reduce the chance of fraud?

<p><em><a href="https://theconversation.com/profiles/paul-haskell-dowland-382903">Paul Haskell-Dowland</a>, <a href="https://theconversation.com/institutions/edith-cowan-university-720">Edith Cowan University</a> and <a href="https://theconversation.com/profiles/ismini-vasileiou-1031778">Ismini Vasileiou</a>, <a href="https://theconversation.com/institutions/de-montfort-university-1254">De Montfort University</a></em></p> <p>Paying for things digitally is so common, most of us think nothing of swiping or tapping our card, or using mobile payments. While doing so is second nature, we may be more reluctant to provide card details over the phone.</p> <p>Merchants are allowed to ask us for credit card details over the phone – this is perfectly legal. But there are minimum standards they must comply with and safeguards to protect consumer data.</p> <p>So is giving your card details over the phone any more risky than other transactions and how can you minimise the risks?</p> <h2>How is my card data protected?</h2> <p>For a merchant to process card transactions, they are expected to comply with the <a href="https://docs-prv.pcisecuritystandards.org/PCI%20DSS/Standard/PCI-DSS-v4_0.pdf">Payment Card Industry Data Security Standard</a>. This is a set of security requirements designed to protect cardholder data and the trillions of dollars of transactions each year.</p> <p>Compliance involves various security measures (such as encryption and access controls) together with strong governance and regular security assessments.</p> <p>If the information stored by the merchant is accessed by an unauthorised party, encryption ensures it is not readable. That means stealing the data would not let the criminals use the card details. Meanwhile, access controls ensure only authorised individuals have access to cardholder data.</p> <p>Though all companies processing cards are expected to meet the compliance standards, only those processing large volumes are subject to mandatory regular audits. Should a subsequent data leak or misuse occur that can be attributed to a compliance failure, a <a href="https://www.csoonline.com/article/569591/pci-dss-explained-requirements-fines-and-steps-to-compliance.html">company can be penalised</a> at levels that can escalate into millions of dollars.</p> <p>These requirements apply to all card transactions, whether in person, online or over the phone. Phone transactions are likely to involve a human collecting the card details and either entering them into computer systems, or processing the payment through paper forms. The payment card Security Standards Council has <a href="https://docs-prv.pcisecuritystandards.org/Guidance%20Document/Telephone-Based%20Payments/Protecting_Telephone_Based_Payment_Card_Data_v3-0_nov_2018.pdf">detailed guides for best practice</a>:</p> <blockquote> <p>A policy should be in place to ensure that payment card data is protected against unauthorised viewing, copying, or scanning, in particular on desks.</p> </blockquote> <p>Although these measures can help to protect your card data, there are still risks in case the details are misplaced or the person on the phone aren’t who they say they are.</p> <h2>Basic tips for safe credit card use over the phone</h2> <p>If you provide card details over the phone, there are steps you can take to minimise the chance you’ll become the victim of fraud, or get your details leaked.</p> <p><strong>1. Verify the caller</strong></p> <p>If you didn’t initiate the call, hang up and call the company directly using details you’ve verified yourself. Scammers will often masquerade as a well-known company (for example, an online retailer or a courier) and convince you a payment failed or payment is needed to release a delivery.</p> <p>Before you provide any information, confirm the caller is legitimate and the purpose of the call is genuine.</p> <p><strong>2. Be sceptical</strong></p> <p>If you are being offered a deal that’s too good to be true, have concerns about the person you’re dealing with, or just feel something is not quite right, hang up. You can always call them back later if the caller turns out to be legitimate.</p> <p><strong>3. Use secure payment methods</strong></p> <p>If you’ve previously paid the company with other (more secure) methods, ask to use that same method.</p> <p><strong>4. Keep records</strong></p> <p>Make sure you record details of the company, the representative you are speaking to and the amount being charged. You should also ask for an order or transaction reference. Don’t forget to ask for the receipt to be sent to you.</p> <p>Check the transaction against your card matches the receipt – use your banking app, don’t wait for the statement to come through.</p> <h2>Virtual credit cards</h2> <p>In addition to the safeguards mentioned above, a <a href="https://www.forbes.com/advisor/credit-cards/virtual-credit-card-numbers-guide/">virtual credit card</a> can help reduce the risk of card fraud.</p> <p>You probably already have a form of virtual card if you’ve added a credit card to your phone for mobile payments. Depending on the financial institution, you can create a new credit card number linked to your physical card.</p> <p>Some banks extend this functionality to allow you to generate unique card numbers and/or CVV numbers (the three digits at the back of your card). With this approach you can easily separate transactions and cancel a virtual card/number if you have any concerns.</p> <h2>What to do if you think your card details have been compromised or stolen?</h2> <p>It’s important not to panic, but quick action is essential:</p> <ul> <li> <p>call your bank and get the card blocked so you won’t lose any more money. Depending on your situation, you can also block/cancel the card through your banking app or website</p> </li> <li> <p>report the issue to the police or other relevant body</p> </li> <li> <p>monitor your account(s) for any unusual transactions</p> </li> <li> <p>explore card settings in your banking app or website – many providers allow you to limit transactions based on value, restrict transaction types or enable alerts</p> </li> <li> <p>you may want to consider registering for <a href="https://theconversation.com/your-credit-report-is-a-key-part-of-your-privacy-heres-how-to-find-and-check-it-116999">credit monitoring services</a> and to enable fraud alerts.</p> </li> </ul> <h2>So, should I give my card details over the phone?</h2> <p>If you want to minimise risk, it’s best to avoid giving card details over the phone if you can. Providing your card details via a website still has risks, but at least it removes the human element.</p> <p>The best solution currently available is to use virtual cards – if anything goes wrong you can cancel just that unique card identity, rather than your entire card.<img style="border: none !important; box-shadow: none !important; margin: 0 !important; max-height: 1px !important; max-width: 1px !important; min-height: 1px !important; min-width: 1px !important; opacity: 0 !important; outline: none !important; padding: 0 !important;" src="https://counter.theconversation.com/content/216833/count.gif?distributor=republish-lightbox-basic" alt="The Conversation" width="1" height="1" /></p> <p><em><a href="https://theconversation.com/profiles/paul-haskell-dowland-382903">Paul Haskell-Dowland</a>, Professor of Cyber Security Practice, <a href="https://theconversation.com/institutions/edith-cowan-university-720">Edith Cowan University</a> and <a href="https://theconversation.com/profiles/ismini-vasileiou-1031778">Ismini Vasileiou</a>, Associate Professor, <a href="https://theconversation.com/institutions/de-montfort-university-1254">De Montfort University</a></em></p> <p><em>Image credits: Getty Images</em></p> <p><em>This article is republished from </em><a style="font-style: italic;" href="https://theconversation.com">The Conversation</a><em> under a Creative Commons license. Read the </em><a style="font-style: italic;" href="https://theconversation.com/how-risky-is-it-to-give-card-details-over-the-phone-and-how-do-i-reduce-the-chance-of-fraud-216833">original article</a><em>.</em></p>

Money & Banking

Placeholder Content Image

1 in 6 older adults fall victim to impersonation scams

<p>More older adults are likely to fall victim to scams than are currently recognised according to new US research. The problems are global. </p> <div class="copy"> <p>A research team from Rush University Medical Center in Chicago, US, says older Americans who aren’t cognitively impeded, are also at risk.  </p> <p>In their study <a href="https://10.1001/jamanetworkopen.2023.35319" target="_blank" rel="noreferrer noopener">published</a> today in <em>JAMA Network Open</em>, the group reports on a behavioural experiment where they targeted 644 adults aged 64-104 in Rush’s Memory and Aging Project – a local scheme that draws on participants from metropolitan Chicago to participate in research – with a pitch mimicking a real-world impersonation scam. </p> <p>The study’s fictitious ‘US Retirement Protection Task Force’ pitched itself to participants as a government social security initiative.  </p> <p>This USRPTF told participants via either post, email or a telephone call there’d been irregular activity on their Medicare or social security file and the inquiry was a routine account security check. As part of this, the fake agency asked participants to call a telephone hotline or login to a provided website to provide their details.  </p> <p>Over two-thirds of the study failed to respond to any attempts to obtain information by the phoney scheme.  </p> <p>The remainder were evenly split by either responding to requests for contact, but expressing scepticism at the authenticity of the USRPTF, or by responding and engaging with the request for information.  </p> <p>Those who were engaged with the request for information, but expressed doubts, were also those with the highest cognitive performance, and lowest proportion of dementia. They were also the most financially literate participants, while those who provided their details had the lowest literacy. </p> <p>Those who provided details were also found to have the lowest scam awareness of all participants.  </p> <p>Among this group, 1 in 10 willingly provided personal information and 1 in 5 provided details of their social security number.  </p> <p>“If extrapolated to a population level, these numbers are astounding and suggest that a very large number of older adults are at risk of victimisation,” the authors say. </p> <p>They also note that, given the use of a fictitious US government organisation name, the number of people vulnerable to well-organised scams is likely much higher.  </p> <p>Last year, the US National Council on Aging reported 92,371 older Americans were defrauded of a total of US$1.7 billion. Most were victims of government department impersonation, sweepstakes and robocall scams. Often such scams will simply demand payment while ‘spoofing’ the phone number of a government agency to add the veil of legitimacy. </p> <p>It’s a similar story around the world. This year, the Australian Competition and Consumer Commission found Australians lost a record $3.1 billion last year, mostly via phone scams. Australians over 65 years of age accounted for a quarter of losses and reports.  </p> <p>The UK’s Action Fraud initiative found Britons lost about ₤2.35 billion in the 2020/21 financial year, with those aged 50-69 most susceptible to falling victim.  </p> <div> <p align="center"> </p> <p><em>Image credits: Getty Images</em></p> <p><em><a href="https://cosmosmagazine.com/people/society/1-in-6-older-adults-fall-victim-to-impersonation-scams/">This article</a> was originally published on <a href="https://cosmosmagazine.com">Cosmos Magazine</a> and was written by <a href="null">Cosmos</a>. </em></p> </div> </div>

Legal

Placeholder Content Image

Hilarious reason dad couldn't be fooled by online scam

<p>One savvy dad has outwitted a scammer who posed as his daughter, after the scammer made one hilarious error. </p> <p>Ian Whitworth, a dad from Sydney, took to his LinkedIn page to share the message a scammer texted him in a classic phishing scam that targets parents. </p> <p>He shared the photo of what he thought was the "funniest phishing text any parent has ever received".</p> <p>The text read, "Hey dad, dropped my phone in the sink while doing the dishes. Its unresponsive this is my new number for now just text me here x."</p> <p>Despite the terrible grammar and punctuation that would immediately alert anyone to the possibility of a scam, it was something else that caught the dad's attention. </p> <p>Instead, Whitworth said it was the fact his daughter would never do the chore mentioned by the scammers.</p> <p>Still, he thought it was worth sharing a photo of the text in a bid to warn others, which he uploaded along with the comment, "Cybersecurity update. I just got this."</p> <p>"Perhaps the funniest phishing txt any parent has ever received. 'Doing the dishes', yeah, for sure."</p> <p>In a reply to one of the people who commented on his post, Whitworth joked that his daughter "at age four emerged from my parents' kitchen with a shocked look on her face. 'What's pop doing?'. He was washing up in the sink."</p> <p>Another commenter wrote, "Haha! There is NO WAY this is from my son or daughter, that's for sure."</p> <p>Another commenter said the giveaway that it wasn't from his own child was that they didn't immediately ask for money, to which Whitworth replied, "Ha, yeah, the phishers are like the seven step ladder of confidence before the money issue gets raised. Actual kids: MONEY NOW."</p> <p>According to the federal government's Scamwatch website run by the Australian Competition and Consumer Commission (ACCC), the "Friends/Family Hi Mum" impersonation scam was common.</p> <p>"Scammers send messages pretending to be a family member or a friend desperate for money," it said.</p> <p>"They say they have a new phone and they need you to pay money to help them out of a crisis."</p> <p>Scamwatch warns: "Don't assume a person you are dealing with is who they say they are" and offers the following advice.</p> <p>"If someone you know sends a message to say they have a new phone number, try to call them on the existing number you have for them, or message them on the new number with a question only they would know the answer to," it said.</p> <p>"That way you will know if they are who they say they are."</p> <p><em>Image credits: Getty Images / LinkedIn</em></p>

Legal

Placeholder Content Image

Why you need to stop charging your phone overnight

<p><strong>You charge your phone all night </strong></p> <p>Waking up to a fully charged phone may seem like a great way to start the day, but leaving your device plugged in overnight is a bad idea. When a phone has reached 100 per cent charge, it will continue to get trickle charges to keep it topped up at 100 percent. </p> <p>These extra charges keep the battery working non-stop. In fact, it’s better not to fully charge lithium-ion batteries because high voltage stresses the battery and wears it out over time, according to technology company Cadex.</p> <p><strong>You use vibrations for notifications</strong></p> <p>Your phone, like any other tool or device, ages and loses effectiveness the more you use it, says David Steele, the Director of Business Development for EverydayPhone. So little extras, like vibrating notifications, are habits that make your phone’s job harder. </p> <p>“The issue with these habits essentially boils down to having your phone constantly running at full capacity when it’s unnecessary,” Steele says. “Just like us, a phone needs a break to avoid burning out.”</p> <p><strong>You keep apps open that you're not using</strong></p> <p>Unused apps can eat up the battery life of smartphones, according to Andrew Moore-Crispin, the Director of Content at Ting Mobile. “If you open an app once and never use it again, the app might still run in the background,” he says.</p> <p>Swiping out of apps you aren’t using or no longer need is an easy solution. Moore-Crispin says doing so extends the battery life of your phone while also freeing up valuable storage space, too.</p> <p><strong>You allow unnecessary permissions</strong></p> <p>Ride-sharing apps need your location to pick you up, but other apps might not need this permission. Moore-Crispin suggests you be picky about which apps you grant such permissions to and take away permissions you deem unnecessary.</p> <p><strong>You have one of these apps</strong></p> <p>The apps that drain your battery the most are Snapchat, Google Maps, Netflix, Amazon, and Facebook, according to AdWeek. The Guardian found that uninstalling the Facebook mobile app from Android phones saves people up to 20 percent of their battery life. </p> <p>If you also get rid of the FB Messenger app, other app load times could speed up by 15 per cent, per the Guardian. The reason Facebook particularly kills battery life is because it keeps running in the background – even when you’re not using it, Business Insider reports.</p> <p><strong>Your screen is always extremely bright </strong></p> <p>Gone are the days of tiny phone screens, but before you give the thumbs up emoji, understand how the bigger screens of today can be a phone battery’s worst enemy, according to Moore-Crispin. Make sure you turn on adaptive brightness in the display menu. </p> <p>This change means your phone will automatically adjust the screen brightness to match your environment. As a bonus, set the brightness level to the lowest possible and lower your screen’s timeout, which is what determines how long it stays lit before fading when it goes idle.</p> <p><strong>You keep your phone out at the beach</strong></p> <p>Extreme heat or extreme cold temperatures and other weather conditions can shorten the life of your phone. According to Time, excess heat can cause everything from data loss or corruption to battery leakage. Cold weather presents just as many issues. In cold temperatures, some smartphones shut off, have display problems, or run out of battery; in rare cases screens may shatter.</p> <p><strong>You keep your phone in your bed or under your pillow </strong></p> <p>Tucking your phone under your pillow when you sleep is another way to shorten its life, thanks to heat build-up.</p> <p><strong>You don't keep your software up to date</strong></p> <p>utting off device updates does more harm than good for your phone. iPhone and Android makers push updates to make your user experience better and so that your phone functions properly. These updates come with extra benefits, too. In fact, if your device has a weak battery or other issues, these software updates could remedy them, Popular Science reports. Make sure to keep up with app-specific updates as well.</p> <p><em>Image credits: Getty Images</em></p> <p><em>This article originally appeared on <a href="https://www.readersdigest.co.nz/home-tipsscience-technology/why-you-need-to-stop-charging-your-phone-overnight" target="_blank" rel="noopener">Reader's Digest</a>. </em></p>

Technology