Attempts to Gain Your Personal Information

In order to steal money or personal information from you, online criminals would use various types of devious, tricky, mean and duplicitous approaches. As soon as they get hold of the information they need, they will use them to commit fraudulent, ludicrous, illegal and deceitful acts like opening a bank account or using your credit card. There are different types of attempts and you should learn about it to prevent you from getting victimized.

Understanding Fake Charities

Identity Theft

This type of fraudulent act involves the use of someone else’s identity to transact online and steal money. Sometimes they are using it to do business and fool or deceit others.


This type of scam tries to trick you to input your personal information like passwords, credit card numbers and bank account numbers. This scam imitates the login page of a website and sometimes you are not aware that you are being victimized by phishing already. Here’s how scammers do their dirty works:

Someone will contact you from nowhere making you believe that he is from a legitimate business like telephone, bank or internet service provider. They will reach via social media, text message, email or phone call.

You will be asked to provide or confirm your personal information. For instance, the criminals may say that the bank is verifying your records due to a technical problem that has wiped out your personal info from their customer data. Or they can ask you to complete a survey and offer you a prize as a token of appreciation.

Sometimes, you will receive a notification informing you that there has been a suspicious or unauthorized activity on your account. The scammers will inform you that a huge amount of purchase was done in a foreign country and they will ask you if you authorized the transaction. Definitely, you will say no you didn’t, and then they will ask you to confirm your bank details or credit card so the bank or organization can investigate. There are instances where the scammers already have your credit card number and they only need to confirm your identity by giving them the 3 or 4 digit security code found on the back of the card.

Phishing messages are forwarded to you to make it look real, legit and legal, and often mimic the format used by the company the scammer is pretending to embody, that includes the logo and branding. You will be redirected to the fake website that may appear like a real deal, but with a slightly different URL address.


This type of scam occurs when cyber criminals was able to get your personal information by applying technology to penetrate your computer, network or mobile gadgets. Some of the hacking method examples include:

  • Ransomware and malware – the cyber criminals will do some things that will trick you and lead to installing software that will enable them to access your files and monitor your activity on your computer.
  • Exploiting security weaknesses – the weaknesses include using old and easy to decipher passwords, unsecured WIFI, old version of anti-virus software and Bluetooth connections.

Once these cyber criminals was able to penetrate your mobile device or computer they can get all the information they need in doing their criminal acts like change your passwords, limit access to your system and getting your personal information. These information will be used to criminal activities, like identity theft or they get access to your credit card details and bank account.

Have you been Scammed?

Scammers are getting better these days and they are increasing in number, if you are one of their victims or received a scam email you can report them to us at You should inform your family, friends and colleagues to keep them safe. Read our blog SubmitScams and know the latest scams that people report to us and keep yourself protected against them.

If in case you have provided these scammers your passport, bank account details, or other personal information call your bank, financial institution or other agencies right away to inform them.

[bkinfobox backgroundcolor=”#F8F8F8″ ]Attempts to Gain Your Personal Information

Please help us to warn people about internet frauds by reporting them: Submit Scam.


By continuing to use the site, you agree to the use of cookies. more information

The cookie settings on this website are set to "allow cookies" to give you the best browsing experience possible. If you continue to use this website without changing your cookie settings or you click "Accept" below then you are consenting to this.