.. / Techniques
[un] known contribution

You can face one/several of these techniques:

Phishing

Phishing is when attackers send malicious emails designed to trick people into falling for a scam.

Advanced fee fraud

A scammer requests fees upfront or personal information in return for goods, services, money or rewards that they never supply.

Lottery sweepstakes and comptetion scams

These scams try to trick you into giving money upfront or your personal details in order to receive the prize.

Online dating

Scammers create fake profiles on legitimate dating websites and try to enter into a relationship with you so they can get a hold of your money and personal details

Banking credit and online account

Scammers send emails, text messages or make a call that appear to be from your bank, a financial institution or an online payment service

Online shopping

Phishing websites look like legitimate sites that are designed to trick you into giving personal and financial information

Job and employment

These scams involve offers to work from home or set up and invest in a business opportunity, promising a job, high salary or large investment return following initial upfront payments.

Golden opportunity and gambling

Scams often begin with an unexpected phone call or email from a scammer offering a not-to-be-missed high return or guaranteed investment in shares, real estate, options or foreign currency trading.

Charity

Involve scammers collecting money by pretending to work for a legitimate cause or charity, or a fictitious one they have created.

Browser-in-the-Browser

An attack is a novel phishing technique that replicates pop-up windows used for SSO in an effort to steal login credentials. It works like this[:] The cybercriminals register a website using the classic phishing technique of making a clone of a legitimate website

Social Engineering

Term used for a broad range of malicious activities accomplished through human interactions

Fake file extension

Hackers can fake file extensions by abusing a special Unicode character, forcing text to be displayed in reverse order.

Tricking SEO

Scamming SEO in order to make own phishing website placed in first positions of search results

Impersonation

Digital impersonation is a form of identity theft for committing fraud or cheating of another person’s identity in which someone pretends to be someone else by assuming that person’s identity, typically in order to access resources or obtain credit and other benefits in that person’s name and fame.

QR code scam

QR code scams take advantage of the fact that the human eye can’t ‘read’ a QR code — so we need to trust that the code is taking us to the right URL or doing what it’s supposed to do.


References on how to protect yourself from scamming: