Not all online scams are trying to install adware, spyware, or other malware onto your device. Often scams aren’t a virus burrowing into your hard drive but a fake lover taking root in your heart. If you ever used online dating or other types of social media services, or you might someday, make sure to protect your heart and your bank account from catfishing.
Catfishing is fraud or abuse where someone creates a false online
What are the catfishing red flags to watch for?
Catfishers can be very sneaking and can be very convincing.
If you meet someone through a dating site or social media, proceed with caution. Watch for the common signs that the person you’re interacting with may not be who they say they are.
The person seems too good to be true – If the new love interest appears to be attractive, rich, with a fancy job, it may all be fake. Many catfishers claim to have a job that has them constantly on the road, as it can be an easy cover for why they can’t meet you in person.
They move fast – Pushing the relationship forward unusually fast is an often-used technique; if this is happening, pump the breaks. Be wary about sharing very personal details too quickly (especially about issues that might garner your sympathy) or professing their feelings to you way too early.
Their story has holes – Watch for inconsistencies in their story. Do details about their job, hobbies, or family seem to change frequently? Liars tend to make mistakes or forget what they said previously. Check out how they write — for example, do they come across as a native English speaker, but their writing is full of mistakes? This could be a huge red flag that they aren’t who they say they are.
The individual has a minimal presence on social media – Check the individual out on social media and see how many friends and photos they have. If the account appears new, it could signal that they created the account just for a fake persona.
They seem to have everything in common with you – If they seem to agree with everything you say or suggest they have everything in common with you, this could be another sign that they are lying to establish common ground and build an artificial sense of trust.
What can I do to avoid being catfished?
You can do several things to protect yourself and validate whether the individual is real or possibly a catfisher.
- Ask to do a video chat via Skype, Google Duo, Zoom, or some other video chat services. If excuses start, you can bet they are catfishers – and you won’t hear from them again.
- Meet them in person. Nothing provides validation than seeing someone face to face.
- Do a Google reverse image search against the online photo they show on a dating site. You may find the same image on multiple online profiles with different names.
- Check out their online photos. Are they primarily selfies or studio shots, but none have other friends in them, show no family, or have no real context, like a vacation. That can big sign that this is a con job.
The best strategies to avoid being catfished are being skeptical, using the techniques above to confirm the person you are connecting with, is who they say they are, and just being cautious.
By entering your email address you agree to receive emails from EveryDayCyber. We'll respect your privacy and you can unsubscribe at any time.
What is a Drive By Download?
A "drive by download" is a cyber attack where visiting a website or hovering over an Ad causes malware to infect your computer or device.
What is the Dark Web?
The dark web is the part of the world wide web that is hardest to reach because it lies at the center of the onion or the bottom portion of the proverbial submerged iceberg.
Piggybacking in Plain English: 6 Ways to Keep Your Neighbors from Stealing Your Wi-Fi
Stopping piggybacking all boils down to vigilance and protecting your Wi-Fi with a good VPN, antivirus software, firewall, and security patches.
What to do if your email Is hacked
Identity theft and bank account or credit card fraud are both possible consequences of a stolen email. If you suspect that your email has been hacked, act quickly to limit the harm. Here are 9 steps to take back control of your email if you have been hacked.
What is Whaling?
Whale phishing is a targeted spear-phishing attack in which cybercriminals impersonate the high-level executives of an organization to send messages to lower-level company administrators in a position to do the acts being requested by the criminals on two things they want most -- money and data.
What is a Potentially Unwanted Program (PUP)?
PUPs refer to programs, applications and other software downloaded onto computers or mobile devices that may have an adverse impact on user privacy or security. The term “potentially unwanted program” was coined by McAfee to distinguish the program from malware.