{"id":2173,"date":"2022-03-09T02:28:33","date_gmt":"2022-03-09T02:28:33","guid":{"rendered":"https:\/\/helpusdefend.com\/?page_id=2173"},"modified":"2022-04-11T23:53:24","modified_gmt":"2022-04-11T23:53:24","slug":"podcast-episode-10-companion","status":"publish","type":"page","link":"https:\/\/helpusdefend.com\/?page_id=2173","title":{"rendered":"Podcast &#8211; Episode 10 Companion"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"2173\" class=\"elementor elementor-2173\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-ec8464e elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"ec8464e\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-410f0dd\" data-id=\"410f0dd\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-1ae6606 elementor-widget elementor-widget-wp-widget-media_audio\" data-id=\"1ae6606\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"wp-widget-media_audio.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h5>Listen to this page! Narrated by Nicole A.<\/h5><audio class=\"wp-audio-shortcode\" id=\"audio-2173-1\" preload=\"none\" style=\"width: 100%;\" controls=\"controls\"><source type=\"audio\/mpeg\" src=\"https:\/\/helpusdefend.com\/wp-content\/uploads\/2022\/03\/Podcast-Episode-10_Companion.mp3?_=1\" \/><source type=\"audio\/mpeg\" src=\"https:\/\/helpusdefend.com\/wp-content\/uploads\/2022\/03\/Podcast-Episode-10_Companion.mp3?_=1\" \/><a href=\"https:\/\/helpusdefend.com\/wp-content\/uploads\/2022\/03\/Podcast-Episode-10_Companion.mp3\">https:\/\/helpusdefend.com\/wp-content\/uploads\/2022\/03\/Podcast-Episode-10_Companion.mp3<\/a><\/audio>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-dbc8068 elementor-widget elementor-widget-text-editor\" data-id=\"dbc8068\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><\/p>\n<p dir=\"ltr\" style=\"line-height: 1.38; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Calibri,sans-serif; color: #0e101a; background-color: transparent; font-weight: 400; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\">Updated: March 8, 2022<\/span><\/p>\n<p dir=\"ltr\" style=\"line-height: 1.38; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Calibri,sans-serif; color: #0e101a; background-color: transparent; font-weight: 400; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\">Written by: Deanna D.&nbsp;<\/span><\/p>\n\n<p><\/p>\n<p dir=\"ltr\" style=\"line-height: 1.38; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Calibri,sans-serif; color: #0e101a; background-color: transparent; font-weight: bold; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\">Episode 10 Background: <\/span><span style=\"font-size: 11pt; font-family: Calibri,sans-serif; color: #0e101a; background-color: transparent; font-weight: 400; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\">An elderly woman encounters a scam artist on her home computer.&nbsp;<\/span><\/p>\n<p dir=\"ltr\" style=\"line-height: 1.38; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Calibri,sans-serif; color: #0e101a; background-color: transparent; font-weight: 400; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\">&nbsp;<\/span><\/p>\n<p dir=\"ltr\" style=\"line-height: 1.38; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Calibri,sans-serif; color: #0e101a; background-color: transparent; font-weight: bold; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\">Scams of Cybercriminals &#8211;<\/span><span style=\"font-size: 11pt; font-family: Calibri,sans-serif; color: #0e101a; background-color: transparent; font-weight: 400; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\"> Cybercriminals are on the prowl for ways to scam people 24 hours a day, 7 days a week. They never stop. Sometimes they even have bots or viruses doing their dirty work for them. These attacks can occur over the phone or in-person and on any device: a smartphone, laptop or tablet; So, beware! In this episode an elderly woman receives a message (which appears to be a legitimate message) on her computer. What she actually viewed may have been an advertisement. Messages like these can be viewed on a wide array of websites.&nbsp; Cybercriminals may use phishing emails, intimidating texts (or advertising), robocalls, too-good-to-be-true online offers, or pop-ups. They also phone their victims, send text messaging and make door-to-door house calls at the homes of seniors. This is not an exhaustive list as new ways to trick people are constantly being (re)invented. The scammer\u2019s goal in this episode is to get Grandma Nancy to install software on her computer which permits the scammer to have unfettered access to her system. This remote access software can allow a scammer to see your clicks, keystrokes and nearly all of your personal information.&nbsp; Clicking on a malware-infected link or attachments can be a surreptitious way that this may happen. In this case, Nancy is just being tricked while chatting on the phone with the scammer, into installing the infected software. The scammer\u2019s play is at&nbsp; Grandma Nancy\u2019s online banking and passwords for a money transfer without her consent.&nbsp;<\/span><\/p>\n<p><\/p>\n<p dir=\"ltr\" style=\"line-height: 1.38; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Calibri,sans-serif; color: #0e101a; background-color: transparent; font-weight: bold; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\">Malware &#8211;<\/span><span style=\"font-size: 11pt; font-family: Calibri,sans-serif; color: #0e101a; background-color: transparent; font-weight: 400; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\"> a broad term for any type of malicious software, no matter how it works, its intent or how it\u2019s distributed. A virus is a specific type of malware that self-replicates by inserting its code into other programs. Worms, trojans and the like get on our devices by a criminal tricking us into clicking on a malicious link. The most common scam is phishing emails because they are low risk and get a high return for the criminal. Plus, they are hard to identify. Despite that, they have many of the following features: a generic greeting (Dear Sir\/Madam or Dear User), a request for personal information, a sense of urgency, a threat of action or deactivation, a (fake) website address or link that looks real but is fake, a very long, convoluted email address with a few recognizable words, and poor spelling and\/or grammar in the body of the email. If something seems suspicious, it is fishy. Our guts can tell.<\/span><\/p>\n<p><\/p>\n<p dir=\"ltr\" style=\"line-height: 1.38; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Calibri,sans-serif; color: #0e101a; background-color: transparent; font-weight: bold; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\">Why Senior Citizens?<\/span><span style=\"font-size: 11pt; font-family: Calibri,sans-serif; color: #0e101a; background-color: transparent; font-weight: 400; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\">&nbsp;Seniors are a very common target because of their retirement savings, and they often live alone. Also, some are unaware that there are malicious people out there who target senior citizens specifically for their trusting, polite and friendly nature. Plus, the scammer or con artist believes in common stereotypes. They assume that elderly people are lonely, are unfamiliar with modern technology, and are easy targets for their personal and financial information to be stolen. Unfortunately, a lot of times, these scams go unreported because seniors are humiliated. To make things worse, these crimes are hard to prosecute.&nbsp;<\/span><\/p>\n<p><\/p>\n<p dir=\"ltr\" style=\"line-height: 1.38; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Calibri,sans-serif; color: #0e101a; background-color: transparent; font-weight: bold; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\">Tech or Computer Scam &#8211;<\/span><span style=\"font-size: 11pt; font-family: Calibri,sans-serif; color: #0e101a; background-color: transparent; font-weight: 400; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\"> Currently, one of the most successful fraudulent schemes is tech or computer support scams. Either the senior citizen is called personally by the cybercriminal, or the senior citizen is tricked into calling them. In the first version, senior citizens get a call from someone who promises to work on their computers\/devices or to clear their computers of viruses. To entice the senior, the cybercriminal may offer their so-called service at a senior-citizen discount. The scammers do remote rudimentary work such as installing free security programs, and, probably, the senior never knows about the scam. In other versions, scammers use internet ads and pop-ups to persuade senior citizens to contact them for help. They provide a phone number and ask the victim to call and get their tech problem fixed. Potentially, the scammer will covertly install a program that seeks financial information. The President and CEO of the Better Business Bureau in Illinois says, \u201c<\/span><span style=\"font-size: 11pt; font-family: Calibri,sans-serif; color: #0e101a; background-color: transparent; font-weight: bold; font-style: italic; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\">When an official-looking message pops up on your computer stating it has a virus and asking for your credit card information to repair or asking you to call a number to get help. It is a time-honoured con-artist tradition. The way they get you changes but the result is the same. They want your money. They want your information.<\/span><span style=\"font-size: 11pt; font-family: Calibri,sans-serif; color: #0e101a; background-color: transparent; font-weight: 400; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\">\u201d<\/span><\/p>\n<p><\/p>\n<p dir=\"ltr\" style=\"line-height: 1.38; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Calibri,sans-serif; color: #0e101a; background-color: transparent; font-weight: bold; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\">Different Types of Scams &#8211; <\/span><span style=\"font-size: 11pt; font-family: Calibri,sans-serif; color: #0e101a; background-color: transparent; font-weight: 400; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\">Many schemes against seniors are performed over email, the phone or in person. They may take the form of alleged credit card offers, charity donation requests, home improvement offers, investment opportunities, banking and wire transfers, insurance offers, health products, sweepstakes and contests, to name a few. The list is always growing. Perpetrators are always evolving and changing their methodology with advancing technology and new ideas.&nbsp;&nbsp;<\/span><\/p>\n<p><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f76bf06 elementor-widget elementor-widget-image\" data-id=\"f76bf06\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"783\" height=\"449\" src=\"https:\/\/helpusdefend.com\/wp-content\/uploads\/2022\/03\/infected-computer.jpg\" class=\"attachment-large size-large wp-image-2175\" alt=\"\" srcset=\"https:\/\/helpusdefend.com\/wp-content\/uploads\/2022\/03\/infected-computer.jpg 783w, https:\/\/helpusdefend.com\/wp-content\/uploads\/2022\/03\/infected-computer-300x172.jpg 300w, https:\/\/helpusdefend.com\/wp-content\/uploads\/2022\/03\/infected-computer-768x440.jpg 768w, https:\/\/helpusdefend.com\/wp-content\/uploads\/2022\/03\/infected-computer-255x146.jpg 255w, https:\/\/helpusdefend.com\/wp-content\/uploads\/2022\/03\/infected-computer-50x29.jpg 50w, https:\/\/helpusdefend.com\/wp-content\/uploads\/2022\/03\/infected-computer-131x75.jpg 131w\" sizes=\"(max-width:767px) 530px, (max-width:783px) 100vw, 783px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-7aeac61 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"7aeac61\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-1a08cba\" data-id=\"1a08cba\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-c9d4979 elementor-widget elementor-widget-text-editor\" data-id=\"c9d4979\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-size: 11pt; font-family: Calibri,sans-serif; color: #0e101a; background-color: transparent; font-weight: bold; font-style: normal; font-variant: normal; text-decoration: underline; -webkit-text-decoration-skip: none; text-decoration-skip-ink: none; vertical-align: baseline; white-space: pre-wrap;\">Prevention Tips<\/span><\/p><p dir=\"ltr\" style=\"line-height: 1.38; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Calibri,sans-serif; color: #0e101a; background-color: transparent; font-weight: 400; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\">Seniors need to understand security measures on various platforms. Understanding privacy settings and the basic user instructions of social media sites or email is important because it may allow seniors to use the technology safely.<\/span><\/p><p>\u00a0<\/p><p dir=\"ltr\" style=\"line-height: 1.38; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Calibri,sans-serif; color: #0e101a; background-color: transparent; font-weight: 400; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\">For most, when we see an unknown number that starts with \u201c888\u201d or an alphanumeric call display or an unknown area code pops up, we let it go to voicemail or we ignore it altogether. If the senior citizen picks up the phone sometimes the caller is persistent, and it is hard to hang up on them because the senior does not want to be rude.\u00a0<\/span><\/p><p>\u00a0<\/p><p dir=\"ltr\" style=\"line-height: 1.38; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Calibri,sans-serif; color: #0e101a; background-color: transparent; font-weight: 400; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\">Seniors should be encouraged to set up and use their contact list. This will help the senior distinguish family and friends from nuisance calls, telemarketers or robocalls. Senior citizens need to know about common scams and the typical language a scammer may use. Keep in mind, only a fraudulent business will request personal financial information via a phone call, text message or email. No government agency or real business would ever ask for a person&#8217;s financial information by phone, text or email.\u00a0<\/span><\/p><p>\u00a0<\/p><p dir=\"ltr\" style=\"line-height: 1.38; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Calibri,sans-serif; color: #0e101a; background-color: transparent; font-weight: 400; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\">Cybercriminals use a variety of methods to get seniors to fall for their schemes. Be aware of the following tactics:<\/span><\/p><ul style=\"margin-top: 0; margin-bottom: 0; padding-inline-start: 48px;\"><li dir=\"ltr\" style=\"list-style-type: disc; font-size: 11pt; font-family: Calibri,sans-serif; color: #0e101a; background-color: transparent; font-weight: 400; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre; margin-left: 18pt;\" aria-level=\"1\"><span style=\"font-size: 11pt; font-family: Calibri,sans-serif; color: #0e101a; background-color: transparent; font-weight: 400; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\">Being <\/span><span style=\"font-size: 11pt; font-family: Calibri,sans-serif; color: #0e101a; background-color: transparent; font-weight: bold; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\">friendly <\/span><span style=\"font-size: 11pt; font-family: Calibri,sans-serif; color: #0e101a; background-color: transparent; font-weight: 400; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\">so that the victim feels like the perpetrator is on their side<\/span><\/li><li dir=\"ltr\" style=\"list-style-type: disc; font-size: 11pt; font-family: Calibri,sans-serif; color: #0e101a; background-color: transparent; font-weight: 400; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre; margin-left: 18pt;\" aria-level=\"1\"><span style=\"font-size: 11pt; font-family: Calibri,sans-serif; color: #0e101a; background-color: transparent; font-weight: 400; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\">Offering senior discounts, prizes, or once in a lifetime investment opportunity with extraordinary returns<\/span><\/li><li dir=\"ltr\" style=\"list-style-type: disc; font-size: 11pt; font-family: Calibri,sans-serif; color: #0e101a; background-color: transparent; font-weight: 400; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre; margin-left: 18pt;\" aria-level=\"1\"><span style=\"font-size: 11pt; font-family: Calibri,sans-serif; color: #0e101a; background-color: transparent; font-weight: 400; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\">Instilling fear of legal <\/span><span style=\"font-size: 11pt; font-family: Calibri,sans-serif; color: #0e101a; background-color: transparent; font-weight: bold; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\">consequences<\/span><\/li><li dir=\"ltr\" style=\"list-style-type: disc; font-size: 11pt; font-family: Calibri,sans-serif; color: #0e101a; background-color: transparent; font-weight: 400; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre; margin-left: 18pt;\" aria-level=\"1\"><span style=\"font-size: 11pt; font-family: Calibri,sans-serif; color: #0e101a; background-color: transparent; font-weight: 400; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\">Giving a sense of <\/span><span style=\"font-size: 11pt; font-family: Calibri,sans-serif; color: #0e101a; background-color: transparent; font-weight: bold; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\">urgency <\/span><span style=\"font-size: 11pt; font-family: Calibri,sans-serif; color: #0e101a; background-color: transparent; font-weight: 400; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\">so people cannot think or act logically<\/span><\/li><li dir=\"ltr\" style=\"list-style-type: disc; font-size: 11pt; font-family: Calibri,sans-serif; color: #0e101a; background-color: transparent; font-weight: 400; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre; margin-left: 18pt;\" aria-level=\"1\"><span style=\"font-size: 11pt; font-family: Calibri,sans-serif; color: #0e101a; background-color: transparent; font-weight: 400; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\">Appearing to be helpful to gain someone\u2019s <\/span><span style=\"font-size: 11pt; font-family: Calibri,sans-serif; color: #0e101a; background-color: transparent; font-weight: bold; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\">trust\u00a0<\/span><\/li><li dir=\"ltr\" style=\"list-style-type: disc; font-size: 11pt; font-family: Calibri,sans-serif; color: #0e101a; background-color: transparent; font-weight: 400; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre; margin-left: 18pt;\" aria-level=\"1\"><span style=\"font-size: 11pt; font-family: Calibri,sans-serif; color: #0e101a; background-color: transparent; font-weight: 400; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\">Using <\/span><span style=\"font-size: 11pt; font-family: Calibri,sans-serif; color: #0e101a; background-color: transparent; font-weight: bold; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\">emotions <\/span><span style=\"font-size: 11pt; font-family: Calibri,sans-serif; color: #0e101a; background-color: transparent; font-weight: 400; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\">because it makes people more interested in buying products or services<\/span><\/li><li dir=\"ltr\" style=\"list-style-type: disc; font-size: 11pt; font-family: Calibri,sans-serif; color: #0e101a; background-color: transparent; font-weight: 400; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre; margin-left: 18pt;\" aria-level=\"1\"><span style=\"font-size: 11pt; font-family: Calibri,sans-serif; color: #0e101a; background-color: transparent; font-weight: bold; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\">Pretending<\/span><span style=\"font-size: 11pt; font-family: Calibri,sans-serif; color: #0e101a; background-color: transparent; font-weight: 400; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\"> they are a family member, bank or charity to seem legit<\/span><\/li><\/ul><p dir=\"ltr\" style=\"line-height: 1.38; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Calibri,sans-serif; color: #0e101a; background-color: transparent; font-weight: 400; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\">Common Scams:<\/span><\/p><ul style=\"margin-top: 0; margin-bottom: 0; padding-inline-start: 48px;\"><li dir=\"ltr\" style=\"list-style-type: disc; font-size: 11pt; font-family: Calibri,sans-serif; color: #0e101a; background-color: transparent; font-weight: 400; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre;\" aria-level=\"1\"><span style=\"font-size: 11pt; font-family: Calibri,sans-serif; color: #0e101a; background-color: transparent; font-weight: 400; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\">Charity Donation Requests \u2013 scammer approaches the victim and indicates they are collecting donations for a worthy cause and end up exploiting people\u2019s goodwill<\/span><\/li><li dir=\"ltr\" style=\"list-style-type: disc; font-size: 11pt; font-family: Calibri,sans-serif; color: #0e101a; background-color: transparent; font-weight: 400; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre;\" aria-level=\"1\"><span style=\"font-size: 11pt; font-family: Calibri,sans-serif; color: #0e101a; background-color: transparent; font-weight: 400; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\">Investment Opportunities \u2013 scammer acts as a financial advisor and gains the victim&#8217;s trust than once they have the victim\u2019s financial information the criminal takes the senior\u2019s money and runs<\/span><\/li><li dir=\"ltr\" style=\"list-style-type: disc; font-size: 11pt; font-family: Calibri,sans-serif; color: #0e101a; background-color: transparent; font-weight: 400; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre;\" aria-level=\"1\"><span style=\"font-size: 11pt; font-family: Calibri,sans-serif; color: #0e101a; background-color: transparent; font-weight: 400; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\">Health Products or Cures \u2013 scammer convinces a victim that a certain health care product needs to be paid for upfront and then they will receive the items in the mail later<\/span><\/li><li dir=\"ltr\" style=\"list-style-type: disc; font-size: 11pt; font-family: Calibri,sans-serif; color: #0e101a; background-color: transparent; font-weight: 400; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre;\" aria-level=\"1\"><span style=\"font-size: 11pt; font-family: Calibri,sans-serif; color: #0e101a; background-color: transparent; font-weight: 400; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\">Lotteries, Sweepstakes and Contests \u2013 scammer tells the victim they have won a large prize, but they need to first pay for taxes and fees to claim the prize<\/span><\/li><\/ul><p dir=\"ltr\" style=\"line-height: 1.38; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Calibri,sans-serif; color: #0e101a; background-color: transparent; font-weight: 400; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\">The above are only a few scams and tactics that criminals use. The methods are always changing and evolving. So, it is important for everyone to remain up to date.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d4aceec elementor-widget elementor-widget-video\" data-id=\"d4aceec\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;youtube_url&quot;:&quot;https:\\\/\\\/www.youtube.com\\\/watch?v=SsYA7rMCpHk&quot;,&quot;video_type&quot;:&quot;youtube&quot;,&quot;controls&quot;:&quot;yes&quot;}\" data-widget_type=\"video.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-wrapper elementor-open-inline\">\n\t\t\t<div class=\"elementor-video\"><\/div>\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Updated: March 8, 2022 Written by: Deanna D.&nbsp; Episode 10 Background: An elderly woman encounters a scam artist on her home computer.&nbsp; &nbsp; Scams of Cybercriminals<span class=\"excerpt-hellip\"> [\u2026]<\/span><\/p>\n","protected":false},"author":5,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"wp_social_preview_title":"","wp_social_preview_description":"","wp_social_preview_image":0,"footnotes":""},"class_list":["post-2173","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/helpusdefend.com\/index.php?rest_route=\/wp\/v2\/pages\/2173","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/helpusdefend.com\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/helpusdefend.com\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/helpusdefend.com\/index.php?rest_route=\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/helpusdefend.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=2173"}],"version-history":[{"count":13,"href":"https:\/\/helpusdefend.com\/index.php?rest_route=\/wp\/v2\/pages\/2173\/revisions"}],"predecessor-version":[{"id":2362,"href":"https:\/\/helpusdefend.com\/index.php?rest_route=\/wp\/v2\/pages\/2173\/revisions\/2362"}],"wp:attachment":[{"href":"https:\/\/helpusdefend.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=2173"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}