scam – IDefendForYou https://www.idefendhome.com Ultimate Protection for Your Digital Life Wed, 09 Jul 2025 23:06:06 +0000 en-US hourly 1 https://wordpress.org/?v=6.8.3 https://idefendforyou.com/wp-content/uploads/cropped-idefend-favicon-32x32.png scam – IDefendForYou https://www.idefendhome.com 32 32 Too Good to Be True? Spotting Scams in Text Messages. https://idefendforyou.com/blog/onlineprivacy/scamandspamtextspotting/ Wed, 09 Jul 2025 23:03:58 +0000 https://idefendforyou.com/?p=14084 What’s the difference between spam and scam messages? How do you spot these? What can you do to avoid them? We’ll break it down for you in this article.

The post Too Good to Be True? Spotting Scams in Text Messages. first appeared on IDefendForYou.

]]>
pexels-cottonbro-5053835
What’s the difference between spam and scam messages? How do you spot these? What can you do to avoid them? We’ll break it down for you in this article.

In this article

Most of us receive a few spam messages from time to time. Some of us get even more. It can be overwhelming, annoying, and sometimes even dangerous when a spam text leads to falling for scams. We’ll help you avoid that.

The Difference Between Scam and Spam 

While this article focuses on avoiding scam texts, it’s important to understand the difference between a “spam” text and a “scam” text. Scam texts are likely a form of spam, but spam doesn’t always denote a scam. 

Where does spam come from?

Before going further, it’s important to realize where spam texts come from. In almost every case, you’re being contacted via a large database of miscellaneous marketing info which has been compiled over time and then sold to advertisers.

This data is gathered and collected bit by bit, typically from online forms, contests or sweepstakes, as well as seemingly innocuous things like social media quizzes or interest polls. Online games, especially free ones, and many mobile apps are also the culprits here. 

In other words, the more times you have given out any of your personal information online, the higher chance you have of finding yourself on one of these lists. In turn, advertisers and marketing affiliates will promote just about any product under the sun by utilizing these lists of marketing data.

The good news is that while it’s annoying, it’s extremely rare that any of these lists contain more than basic information about you, things like:

  • Name
  • Phone number
  • email

Sometimes the lists could have a little more information about you as well, details such as:

  • Age
  • Gender
  • Nationality

So, as you can start to see, just because you are getting these spam messages does not automatically mean that any serious information is compromised (such as your SSN), and is more than likely due to your information being available inside marketing databases.

How do I get rid of spam?

Getting rid of spam entirely is an uphill battle, and the only way to truly be rid of it is to have no online presence, never give out your number, don’t use social media, etc.

Of course, this is impractical for most people, but luckily there are some strategies that you can do to limit the amount of spam messages you’re getting. Here are a few of the most popular and effective solutions:

  • Enable spam detection and filtering on your email and phone.
  • Enroll in an online data removal service.
  • Register your number with the Do Not Call Registry.
  • Stop responding to or answering calls, texts, and emails from sources you don’t recognize.
  • Flag or report these types of calls & messages as spam

Avoiding Scam Texts

As above, scams will often show up in the form of text messages. These will utilize things like scare tactics, pressure, and shock value in order to try and trick you into giving away your money, personal information, or access to your accounts. The good news is that these situations are completely avoidable!

How to spot scams

Pay attention to the telltale signs listed above, but the big key is to never click on anything you don’t recognize, and be especially wary of links in texts. It’s so hard to vet anything on a tiny phone screen, and add that to the fact that links can be masked, it’s not enough to think “Oh, this link looks legitimate, guess I better click on it.”

So, don’t click on the links, great. Now what?

If you get a message claiming it’s from a company, service, or something else, and then it tries to use urgent language to get you to click a link: ignore it! 

What to do with scam messages

So once you’ve decided a message is a scam—or might be a scam—what do you do with it? Here are some things you can do when you have a message that might be spam:

  • Don’t click on it! We’ve already said this but it bears repeating.
  • Look into it. If it’s posing as a business, look that business up and consider contacting them directly.
  • If it’s claiming to be from a service you have (bank, phone provider, software company), you should reach out to that service directly.
  • Report or mark the message as a scam
  • Block the number
  • Ensure your phone’s automatic scam detection settings are enabled

Worried About Falling for Scams? IDefendForYou Can Help!

Fortunately, IDefendForYou members enjoy access to an expert support team who are always happy to help you look at and review suspicious messages, help you adjust your antivirus and detection settings, and even recover from scams or cleaning up your devices if they get infected.

Learn more and get protected today! Try IDefendForYou risk free. Remember, you can always contact our team for deals, offers, and discounts.

The post Too Good to Be True? Spotting Scams in Text Messages. first appeared on IDefendForYou.

]]>
It’s Time for Black Friday Scams Again https://idefendforyou.com/blog/scamwatch/blackfridayscams/ Wed, 27 Nov 2024 17:59:33 +0000 https://idefendforyou.com/?p=9556 Black Friday is just around the corner, and alongside all those tasty deals comes a recipe for scams. Do you know how to spot the danger? Check out our top tips to keep you safe this holiday season.

The post It’s Time for Black Friday Scams Again first appeared on IDefendForYou.

]]>
scamwatch_full_cover

What You Need to Know

Black Friday is just around the corner, and alongside all those tasty deals comes a recipe for scams. Crooks know that would-be deal-hunters will be scouring online storefronts for the lowest prices, and may not have their guard up. They’ll look to pounce on the unsuspecting shopper and serve them up a deal that’s too good to be true.

You may encounter pop-up ads, emails that appear to be legitimate, or even exclusive offers on social media, each one promising a deal that is guaranteed to blow your socks off (or your wallet anyway). Instead of clicking, make sure to do the following:

What You Should Do

  • Double-check the email address. Most scammers will try to imitate well-known sellers such as Amazon, Walmart, or Best Buy. However, these fake emails will be coming from slightly misspelled addresses (like arnazon, wal.mart, etc.).
  • If it sounds too good to be true, it probably is. Yes, even on Black Friday, the day infamous for some of the best deals of the year, this old adage still holds water. While some of these incredible deals may be legitimate, chances are much more likely that they’re not, so we recommend steering clear.
  • Pay attention to count-down timers. Time-sensitive tactics are often employed to make you want to act fast and buy now. Of course, sales like this are counting on you neglecting to think it through and just hoping you make a purchase on instinct. While not an immediate red-flag, timers are not very difficult to make, and are very easy for a scammer to implement.
  • Look for typos, misspelled words, and unusual sentence structure. This one is often a dead giveaway; any serious retailer will have had their Black Friday promos developed long in advance, and will have gone through rounds of proofreading, editing, and design work to flesh out the perfect product pitch. Almost no scammers take the time to go through their wording a second time, and many of them do not speak English natively. Mistakes like these should send you running for the “delete” button.

Think you are being scammed? Call our scam hotline or email us for help:
801-692-6200
scamwatch@invisus.com

The post It’s Time for Black Friday Scams Again first appeared on IDefendForYou.

]]>
What To Do If Your Email Gets Hacked https://idefendforyou.com/blog/onlineprivacy/emailgetshacked/ Mon, 05 Feb 2024 23:10:08 +0000 https://idefendforyou.com/?p=5688 It can happen to anyone, but if you're lucky you can avoid it. Worried you've been hacked? Here's what you can do.

The post What To Do If Your Email Gets Hacked first appeared on IDefendForYou.

]]>
pexels-tdcat-193003
It can happen to anyone, but if you're lucky you can avoid it. Worried you've been hacked? Here's what you can do.

In this article

Email has been around for a few decades now, and practically everyone has one, even if they use it infrequently. Chances are, if you’ve had your address for a few years, you’ve started to see scams, ads, and plenty more unwanted content showing up in your inbox.

You’ve probably also heard of emails getting hacked, and you may have even seen a few of these before—you get a message from your “friend” telling you they need a random amount of money, ASAP, and you’re their only hope. But what if you’re on the other end, and someone else on your contact list gets an email from “you” requesting a similar favor. What do you do then?

Email security

First off, let’s address some basic email security habits that everyone should have. If you haven’t been hacked and there’s something here you’re not doing, consider this your wake up call.

  1. Have a strong password. In today’s digital world, running about with weak and simple passwords is like leaving your car unlocked with your cash-stuffed wallet inside. If you want to anonymously test the strength of your passwords or need help coming up with stronger passwords, check out our guide to passwords.
  2. Consider two-factor authentications (2FA). Another step beyond having a password is setting up 2FA. This means you have to provide a special, one-time code in addition to your password in order to log into and access your email. It may not be right for every use case, but it’s generally a good idea. This can also be known as Multi-factor Authentication (MFA).
  3. Create “better” security questions. You’ve probably had to set up some security questions before: “What street did you grow up on?”, “What’s your mother’s maiden name?”. While these are a nice idea and their original intent was to help a user lock down their account—after all, who else would know these answers besides, well, you? The problem is that since the advent of social media, it’s often pretty easy for a hacker to either guess or do a couple minutes of research to find the answers to these secure questions. A “better” way to answer these questions is by choosing an answer that is meaningful to you but may not even have anything to do with the question itself. For example, answering “What’s your favorite drink?” with “Harry Potter”.
  4. Don’t open unexpected emails. The final tip is crucial to preventing not only your email from getting hacked, but infecting your computer or phone with viruses. Even if you have a rock-solid password, 2FA enabled, and an active virus shield, the moment you click on a strange email, follow the links inside, or try to open an attachment on it, none of that prior protection matters. The best thing you can do is to never even open these emails and instead delete or mark them as spam.

What happens when your email is hacked?

If your email hasn’t been compromised that you know of, but want to know some of the warning signs to watch for, or are simply curious and want to take a couple minutes to learn more about it, this next section is for you.

Typically, the main reason a scammer or hacker wants access to your email address is to use it to try and spread malware or propagate scams to your contact list. Once they have access to your account, they will immediately begin using it to send out malicious emails to every saved address in your contacts. The thinking is that a person is more likely to click on and entertain a suspicious email if it’s coming from their “friend”.

The sad truth is that many people don’t take the time to consider who is actually sending the emails they click on. A lot of users will notice their friend’s email address and assume they are the one who’s sent them a request for a gift card, wire transfer, or link to a compromising video. It’s always better to check with that person (if you actually know them well enough to receive unsolicited emails from them), and verify if they actually did send you that. Otherwise, this should raise a huge red flag.

How does your Email get Hacked?

While it’s technically possible that a hacker could head over to gmail.com, type in a random address and then guess a password, this just isn’t an efficient way for a scammer to operate. More commonly, they will acquire these email addresses either from a hacked website, newsletter, or other kinds of compromised databases.

Once they’ve obtained a list of, say, a few thousand email addresses this way, a hacker might decide to use these themself or put them up for sale on the dark web for other scammers to purchase. Just the addresses themselves without a password aren’t terribly valuable, and so most people who collect these lists are looking to start spamming malicious emails in the hopes that a fraction of the recipients open up and fall for the traps they’ve laid within.

What’s more dangerous, however, is if someone does get both your email address and the password. At this point, unless you’re lucky, they’ll immediately change the password and you’ll find yourself locked out of your account. If this happens, it’s too late to protect your account proactively and you’ll instead need to take some steps to try and recover your account.

What to do if your Email gets Hacked

If you’re lucky and the hacker didn’t change your password but you’ve received reports of people getting scammy emails from your address, you should immediately call your IDefendForYou Advisor team at 801-724-6211.

If you’ve found yourself on the receiving end of a hacked email account, following these steps is the best way to reclaim your data and get back up and running again.

  1. Report the hacking to your email provider. Most of the major providers have a way to do this from the sign-in screen.
  2. Scan your computer/phone for viruses and malware. If you have [our service], one of our techs will have your back on this one.
  3. Change your security questions and make them better. Better questions equal better security. If you’ve ever done one of those social media posts about “your first car, your high school mascot, etc.” you may have unknowingly given out answers to your security questions. Try using answers only you would know and never share them.
  4. Change your password and make it stronger. If you use this same password or email to log into other websites, you should also change it there.
  5. Let friends and family know you got hacked. If you suspect any malicious or scammy emails have been sent from your account, letting people know you got hacked and not to open anything weird from you is a good idea.
  6. Check your email settings. Pay especially close attention to the automatic forwarding settings to make sure nobody else is snooping in your inbox.
  7. Activate monitoring. If you’re worried that any of your sensitive personal data might be compromised (things like personal IDs, SSN, DOB), having active dark web monitoring and identity theft protection in place will give you peace of mind.
  8. Pay attention to any 2FA you’ve set up. As stated above, if you start seeing texts on your phone or messages through another email account with access and verification codes you didn’t request, report it to your email provider right away.

Final Thoughts

Nobody wants to wake up to a hacked email account, but unfortunately identity theft, hacking, and scams have risen exponentially over the last few years. For most of us, identity theft, ransomware, and hacking is no longer only something we’ll hear about on the news, or that doesn’t happen to us.

Having active protection in place is no longer something only business owners and global corporations need to be concerned with, as more and more individuals, families, and small businesses are falling prey to cybercrime daily. We believe that everyone deserves the peace of mind that comes with knowing your information is safeguarded, and you have steps in place for the day that identity theft comes knocking at your door.

The post What To Do If Your Email Gets Hacked first appeared on IDefendForYou.

]]>
Don’t Take the Free Crypto Money https://idefendforyou.com/blog/identityandfinancial/donttakefreecrypto/ Mon, 15 Nov 2021 17:20:36 +0000 https://idefendforyou.com/?p=5840 Free crypto? Sounds nice...until you realize the price is handing over your personal data and privacy.

The post Don’t Take the Free Crypto Money first appeared on IDefendForYou.

]]>
worldcoinorb
Free crypto? Sounds nice...until you realize the price is handing over your personal data and privacy.

In this article

Beware of the Orb and its all-seeing eye! Worldcoin and its Orb recently emerged onto the cryptocurrency scene and are backed by some major players in the crypto investment market. The company is trying hard to position itself as a global, socially aware organization developing a common good for everyone on the planet. It’s developing a “collectively owned digital currency that will be distributed to as many people as possible.”

Sounds nice, right?

How the orb works

Before WorldCoin and their offer of free crypto money reaches you, there are huge security and privacy risks you should be aware of. Here’s what you need to know: They’ve created a neat-looking, shiny sphere—called an Orb—with a camera in it. You stand in front of the Orb and allow it to scan your retina and your face. The Orb produces a unique identifier, a code, based on your retina. Once you have your personal identifier, you can use it to claim some “free” WorldCoin (WDC) cryptocurrency.

Any red flags going off for you yet?

In the world of high tech (Google, Facebook, Twitter, etc), if it’s free, then YOU are the product. They are capturing data about you and selling it for profit. It couldn’t be clearer in this case.

WorldCoin wants to quickly ramp up and capture their first billion retinas and facial scans using the Orb. They are hiring “Orb Operators,” where you can “earn your share of Worldcoin by giving it away” to people in your community. How nice! And the coolest part is that you get to walk around with the Orb in your hands… Yikes.

That’s a lot of orbs!

The company says they’ve lined up manufacturing for more than 50,000 Orbs a year. Already more than 130,000 people have given up detailed mapping of their retinas and faces. The privacy implications are frightening.

What’s the risk?

So, what’s the play here? It’s pretty simple actually. They are literally printing a bunch of cryptocurrencies out of thin air and giving it away in exchange for scanning our retinas and our faces. In the process, they will collect the world’s largest database of retina and facial recognition data, along with your other personal information.

With that data, WorldCoin will be able to create one of the most powerful artificial intelligence (AI) facial recognition system on the planet. Combined with your crypto investments, they’ll be loaded with data worth billions. The company claims it will only keep our biometric data long enough to train its AI system and promises to keep all your information private.

We’ve heard that one before.

Don’t take the free money

So, are you in? Would you take the “free” money?

Would you give up your identity and your biometric data to claim some free crypto?

Please don’t!

Technology keeps advancing

Technology is moving at lightning speed and will only evolve faster with the emergence of blockchain, AI and 5G. More and more companies and technologies will emerge that track our location, our purchasing habits, our investments, our bank accounts, our social lives, our entertainment and more. Worldcoin’s biometric data gathering Orb is just another example of what you should watch out for.

Always protect your data and privacy

If you are looking to invest and speculate on cryptocurrencies, the number one rule you need to remember is to protect your data and your privacy. Do not fall for clever campaigns to give away free money or free cryptos in exchange for your personal information.

Avoid the Orb. Don’t give up your identity. Keep your retina and your face to yourself.

The post Don’t Take the Free Crypto Money first appeared on IDefendForYou.

]]>
Tax Season or Open Season? https://idefendforyou.com/blog/identityandfinancial/taxoropenseason/ Mon, 01 Feb 2021 19:01:36 +0000 https://idefendforyou.com/?p=5120 Millions of Americans will likely not get their tax refunds this year — not because they don’t deserve them, but because identity thieves will have already filed tax returns under their names.

The post Tax Season or Open Season? first appeared on IDefendForYou.

]]>
article_tax_1040-scaled
Millions of Americans will likely not get their tax refunds this year — not because they don’t deserve them, but because identity thieves will have already filed tax returns under their names.

In this article

Did you know all a scammer needs to steal your identity and your tax refund is your name and your Social Security Number? Did you know you could spend 5-8 months fighting the IRS over it and could be audited in the
process?

Yikes!

Our Tips For Tax Safety

Here are some tips to keep your tax refund in your bank account this year, hassle free.

  1. File your tax returns early. Tax refund fraud only works if the thief files a bogus tax return in your name before you submit your actual tax returns. By filing early, you can ensure the IRS sees your return before a thief sends the fake one.
  2. Look for IRS notices. Watch for a letter from the IRS stating that more than one tax return was filed with your SSN. Also watch for an IRS notice indicating you received wages from an employer unknown to you. Either of these notices could be a sign that a thief has attempted to file a fraudulent return in your name. (Remember, the IRS only sends notices by mail. If you receive a random email notice or phone call from the IRS, it’s likely a scam. Don’t click on links or open attachments in these types of scam emails!)
  3. Lock up your Social Security card. Tax-return theft always involves a stolen SSN. Keep it locked up in a safe place!
  4. Reduce credit card solicitations. Even if you aren’t interested in that credit card solicitation, a thief might be. He could plan to get a credit card in your name as a first step toward obtaining your SSN and date of birth. Be sure to shred unwanted credit solicitations and get your name off the marketing lists for pre-approved credit offers. (Instructions for getting off junk mail marketing lists are found in your online IDefendForYou account.)
  5. Keep on top of data breach notices. Watch for letters or emails from companies and organizations notifying you that your personal information may have been compromised in a data breach incident. If you receive a notification like this, be sure to closely watch for identity theft or credit fraud alerts and other suspicious identity theft activity. Not every data breach involving your personal information will result in identity theft, but it’s vital that you stay vigilant.
  6. Shred bank and tax documents you no longer need. Thinking like a thief helps you reduce your risk of identity theft. Consider your tax documents, receipts and bank statements as potential trapdoors that allow entrance into your personal life. Lock up what you need to keep, and shred the rest.

How to Get Fraud Protection

If at any time you believe you may be a victim of federal or state tax return fraud, get help immediately. If you need a good ID theft protection service that covers tax return fraud, check out IDefendForYou that include monitoring and expert support for this type of fraud and much more.

The post Tax Season or Open Season? first appeared on IDefendForYou.

]]>