Imagine this: it’s Saturday morning, you wake up peacefully, still in your pajamas, and suddenly they ring the doorbell. When you open the door, you find someone who tells you: “You won a truck!”. Sounds incredible, doesn’t it? But there is a detail: to deliver it to you, they first need validate your identity. They ask you document your data credit card title deed of your home and more personal information.
Now think about it: Would you give all that to a stranger? Sounds ridiculous, right? No one in their right mind would hand over that amount of money. information in exchange for a promise That seems too good to be true.
And yet, In the digital world, this happens every day. We answer calls, open messages, fill out forms and follow links that promise us prizes, benefits or urgent solutions, handing over sensitive data without even stopping to think for a minute.
The good news is that avoid these scams it’s more easier than you think. It is only necessary understand how cybercriminals operate y adjust some habits to be one step ahead.
Online purchases and rentals: the traps that are repeated incessantly
Dates like Hot Sale, CyberMonday Christmas (among others) are fertile ground for cybercriminals. But they don’t stop there: they also take advantage of specific situations.
Do you remember, for example, a few years ago, when the figurines from the last Soccer World Cup were missing? Or when vehicle covers were scarce? These contexts were used at the time by cybercriminals to create their pretexts and defraud many people. And let’s not forget that in summer season (as we are living at the moment in Argentina) the inevitable ones are beginning to re-emerge temporary rental scams.
How does deception work? They publish irresistible offers, such as very attractive properties at too low prices. They ask for an upfront payment, and when it’s time to enjoy your purchase or rental, you discover they’re gone along with your money.
To avoid falling into these traps, some time ago I developed the PPI method (Profile, Price and Information) with the idea of being able to identify in a simple and easy way if we are facing a possible scam:
Profile
- Check how long ago was it created (example: on Instagram we can go to the first post and the last, observing both dates to give us an idea of activity).
- Check if they are comments enabled or disabled and if you have consistent activity on sales platforms or social networks.
- Los new profileswith closed comments, and/or with little activity are risk indicators and require special attention.
Precio
- Compare the prices with other options available on the market. If the offer seems too good to be trueit could be a scam.
Information
- Request more information: photos, videos and additional details about the product or service.
- If possible, I asked for a video call to confirm authenticity.
- Cybercriminals often avoid this type of interactionwhich can be a clear warning sign.
Social networks and banks: the art of appearing legitimate
A message on Instagram that says you won a prize, an advertisement on Facebook with house raffles, or a profile that imitates that of your bank. Scammers have perfected the art of appearing legitimate. They use logos, colors and names that generate trust to steal sensitive data.
The goal? Make you enter information in cloned pages or guide you in a whatsapp chat for you to deliver your bank details.
Always remember: banks do not ask for sensitive information through social networks or direct messages. If something doesn’t work for you, check the official channels.
The PICO method: your anti-scam radar
Detecting a scam is easier if you know the four keys to the scam. PEAK method: Pretext, Impostor, Context and Opportunity.
- Pretext: They contact you with a pretext that generates emotion or urgency: “You won a prize” or “There is a problem with your account”, for example. I like to say that, “When emotion turns on, reason turns off”. And cybercriminals know it.
- Impostor: they pretend to be one known entity or why someone trustworthylike your bank or a friend (the latter is widely used after the theft of WhatsApp accounts).
- Context: They use current situations to sound believable, such as promotions, popular giveaways and many times they also take advantage of something that is happening at that moment, such as the payment of an Anses bonus, economic measures or data leaks.
- Chance: they offer you a unique and incredible opportunity but with the condition of act fast: “Click now”, “Download this App” or “Confirm your data now”. The more they rush you, the less they will let you think.
Reviewing: Pretext, Impostor, Context and Opportunity are four constants that are always present in all types of scams.
Cut off the cybercriminal
Cybercriminals depend on technology to operate. If we cut the middle (mail, social networks or telephone) and we do not share data with them, avoiding suspicious links and always verifying on official sites, we make it impossible for them to act.
With simple safety habits, we not only protect ourselves, but we also contribute to a safer digital world. So the next time you are faced with a suspicious situation, remember: think, verify and cut off the cybercriminal.