Kolanaki,
@Kolanaki@yiffit.net avatar

This isn’t a scam is, it? 🤔

IntentionallyAnon,

Wapo claims that the email being from official chase means it’s not a scam but scammers can spoof emails.

sibloure,

Not sure how paying for an item online using Zelle is in itself a scam. The scam would only come later if the stranger had requested your bank info, or you reply to a dodgy email, etc, but so far nothing untrustworthy had happened yet? I don’t think that was a good question.

marco,
@marco@beehaw.org avatar

Obviously one can use Zelle legitimately, but somebody requesting online payment and then sending somebody else to get the goods is like 95% a scam. I think the more common Zelle scam is that they fake a Zelle email that only looks like they paid you.

mugthol,

I’ve been nearly scammed like this myself. If you sell something and somebody wants to pay you via an external site (no simple transfer) without being interested in the product, it is an extremely red flag

Erdrick,

This reminds me of the site to see if your email address had been pwned or not.
Well, if you looked yourself up, I’ve got some bad news for you….

BCsven,

Pwned is legit though. its just databases of breaches.

Erdrick,

Thanks!

renard_roux,

You’re wrong on this one, as the other comment noted.

Have I Been Pwned has a database of leaked credentials, with notes on where the data originated, when said site was hacked, etc. It is an incredibly good resource to see if any site you use has leaked your data in a breach, and how compromising that data is (legible or unsalted passwords, credit card information, etc.).

It is a tool used to react intelligently to data breaches. You input your email address, and it tells you if your email address is present in any leaked data sets. If so, you go change that password as fast as you can.

For your comment to make any sense, giving someone your email address means you’ve been “Pwned”. I guess you don’t subscribe to a lot of newsletters, then? How does entering your email address give anyone an advantage, apart from the knowledge that it exists? 🤔

The exact same feature is baked into Chrome’s password manager, 1password, and many others. Does that mean that users of those services have been “Pwned”? 😐

Erdrick,

I stand corrected, with thanks!

renard_roux,

You’re so welcome! 😃

It’s one of those tools more people ought to use (like password managers), because it not only exposes real threats, it also opens your eyes to the fact that you really should be a lot more paranoid about you data than most people are.

Running my main email through it just now, this is the list of sites that have managed to lose my data. Many of these included passwords in various states of undress. These particular breaches span from 2013 to 2023. Each company name is followed by the information contained in the breach:

  • 123RF — Email addresses, IP addresses, Names, Passwords, Phone numbers, Physical addresses, Usernames
  • 500px — Dates of birth, Email addresses, Genders, Geographic locations, Names, Passwords, Usernames
  • 8tracks — Email addresses, Passwords
  • Adobe — Email addresses, Password hints, Passwords, Usernames
  • Bitly — Email addresses, Passwords, Usernames
  • CafePress — Email addresses, Names, Passwords, Phone numbers, Physical addresses
  • Data Enrichment Exposure From People Data Labs — Email addresses, Employers, Geographic locations, Job titles, Names, Phone numbers, Social media profiles
  • Deezer — Dates of birth, Email addresses, Genders, Geographic locations, IP addresses, Names, Spoken languages, Usernames
  • Dropbox — Email addresses, Passwords
  • Gravatar — Email addresses, Names, Usernames
  • Kickstarter — Email addresses, Passwords
  • LinkedIn — Email addresses, Passwords, Education levels, Email addresses, Genders, Geographic locations, Job titles, Names, Social media profiles
  • MyFitnessPal — Email addresses, IP addresses, Passwords, Usernames
  • Plex — Email addresses, IP addresses, Passwords, Usernames
  • TheTVDB.com — Email addresses, Passwords, Usernames
  • tumblr — Email addresses, Passwords
  • Twitter — Email addresses, Names, Social media profiles, Usernames

Because I use unique passwords for everything (long time 1password user, recently switched to Bitwarden which is free and works and syncs great on/between my Mac and Android phone), I’m not particularly worried about any of these, and all the passwords have since been changed.

But look at all the other shit that’s in there 😳 DOB, IP, country, usernames associated with my email, education level, gender, social media accounts, phone numbers, home address. Even if you’re not paranoid, do you really want everyone with a Tor browser and a cheap VPN to have access to that shit if they want to get to know you? 🤢

That’s why I wanted to point out that HIBP is one of the good guys; no need for people to get bad vibes about a tool they might actually have an interest in using 😊

Erdrick,

Yeah I really called it wrong on my initial comment.
I took a look at my pwned history and it looks like we share a lot of sites.
Quite concerning and now I am at least using a password manager.
I am still on LastPass but am considering others.
It simply “works” in my case though, and I’m not sure how easy it would be to change to a new one so with them I stay.
It sucks that they made it into a “pay to play” if you want full cross platform access, but I use my gaming PC for so few sites that it isn’t a huge deal to just lock my LasPass to iOS.

ExLisper,

This looks complicated. I will just DM you my account number, address and credit card details, ok?

confusedwiseman,

I didn’t click the link, it felt scammy. Did I pass?

balls_expert,

This is not a good article

To know if an email is a scam I would check the domain of the link it’s sending, which this doesn’t provide

Also you shouldn’t trust the sender address of an email, you can spoof that

mooncabbage,

I guessed things were scams that were not and I got “trusting tabby” which made no sense. How am I trusting if I thought they were scams and knew safer ways to handle those things? This article seems set up extremely poorly and without more context to some of the questions, they are impossible to answer.

argv_minus_one,

Psh. That last one could easily be a scam. Maybe scammers haven’t tried the fake class action settlement website angle yet, but they will, and I have no intention of being their first victim.

boogetyboo,
@boogetyboo@aussie.zone avatar

Half the emails in my junk inbox are ‘class action settlement’ emails, so it’s definitely an angle they’re trying (presumably with some success)

Rentlar,

Yeah even if the last one is not a scam, it is a scam to me, even if I knew about it. I’d go and apply on the official website rather than from the email itself.

jemorgan,

Yeah, but the point is that if you open a web browser and look that settlement up, you’ll find a ton of authoritative sources that link back to that URL.

The point of this wasn’t to see if you could tell if each thing was likely to be a scam in the context that you would genuinely run into them.

If my grandma approached me with the class action website and asked if I was a scam, I’d tell her “it looks really suspicious, let’s see if we can find anything from a credible source that will link to this website.” Which is exactly what the article tells you to do. Of course nobody could just magically know if a screenshot of a webpage is scam just by looking at it.

The other options all either give you enough information in the screenshot to be able to Google a couple things and say “it’s a scam” confidently (class action, geek squad), or they’re full of super blatant red flags (Zelle bike).

heyfluxay,
@heyfluxay@artemis.camp avatar

I just assume everything is a scam now 🫠

AbidingOhmsLaw,

Nice try, scammer.

CanadaPlus,

Damn, I got the antivirus one wrong because it wasn’t clear I didn’t buy the thing in this scenario.

Quatity_Control,

Yep. It relies on information not present in the example. It’s intended for most people to get wrong.

Similarly the Facebook one genuinely looks like a scam unless you know of the Facebook case.

outer_spec,
@outer_spec@lemmy.studio avatar

It’s intended for most people to get wrong.

So what you’re saying is… …this article is a scam?

Quatity_Control,

While yes, that’s an accurate quip, it actually does highlight a deeper issue in the industry. If everyone passes your scam test, they don’t need to buy your scam test.

Additionally, scam emails aren’t 50/50 yes/no pass/fail. It’s more a combination of red flags to gauge how risky the email is to click on links, reply to, download attachments from, etcetera.

Currently the scam testing industry has no way to rate an individuals ability other than how many scam emails they did or didn’t click on. That is a false metric. It incites scam testers to trick people to justify their value to the customer.

CanadaPlus,

Maybe a better way would be to stick with pentesters. The real trick is if they can actually scam someone.

Quatity_Control,

I mean, they are two different aspects of security. Pen testers are important, but they can’t help you if an employee clicks on the wrong link.

CanadaPlus,

Isn’t social engineering a part of what they do? The goal would be to train employees to look out for both pentesters and real scammers.

CanadaPlus,

I actually got that one, because I know settlements are a thing and I knew to search it.

jemorgan, (edited )

You (and half the people in this thread) are totally missing the point here.

No where does the article say that you’re supposed to be able to tell if it’s a scam or not just by looking at it. In fact, in multiple places it says that you’ve got to Google use a credible source to externally verify some information to determine that some of the examples are scams.

The point of the article is to teach people how to recognize scams, it would be totally useless if it imposed the constraint that you can’t look for context. If you’re actually trying to recognize scams IRL, you should be doing exactly what the article says and looking for authoritative corroboration of any information in the potential scam.

Quatity_Control,

In the phishing Awareness course I wrote and sell, I do advocate to confirm that domains, phone numbers and other contact details, logos, are correct with the official website.

I don’t advocate that when they receive a bill for something they know they didn’t buy, they should go to Google.

And with googles current state, I could easily buy a domain and buy ads to put it at the top of search results. Googling the answer isn’t actually the answer. Verifying against known legit sources is.

It’s a shit test, which more than half of the people in this thread got right, yourself excepted.

jemorgan,

I’m the CEO of an anti-phishing training corporation that services multiple Fortune 500 companies and has a yearly revenue of over 10m USD (I can also share unverified credentials to make myself seem more credible).

Someone could potentially build a website that makes their phishing attempt seem more credible, and maybe they could get that website ranked highly on Google (even though that is far from straightforward for a website presenting fraudulent information to do), but that’s a total red herring. The article didn’t recommend that people Google for a single random website that confirms the questionable information, the recommendation was that you should check multiple authoritative sources.

You are absolutely wrong. Not surprising that you’re (ostensibly) able to scam the technologically illiterate with such bad information, a little ironic that your scam involves getting them to think that you’re teaching them how to avoid scams.

Quatity_Control,

You’re just pointing out that you are overqualified for this test.

At its root, it is a TEST. Not many TESTs allow you to Google for answers and supporting information. Unless specified any TEST provides in the question the information to determine the answer. By not providing all the information and not informing you to utilise any source available to obtain extra ESSENTIAL infirmation, it’s a bad test. Intended to trick you.

You and I both know if we create a test phishing email with no mistakes, it’s not a failure if people click on it. It’s a failure on our part for creating a BAD TEST. Same concept.

jemorgan,

At its root, it is a TEST

No, at its root, this is an educational article meant to teach about recognizing internet scams. It includes a quiz designed to help you determine your natural reaction to many popular scams, along with information about best practices for how to identify them.

This differs from a test, which is designed to quantify your current knowledge on a topic. Sure, the article used a quiz as a teaching aid, but the results of the quiz aren’t the point and don’t matter. Which makes it super weird how you and others are getting so butthurt about thinking you deserved a perfect score, but we’re robbed by an unfair test.

Unless specified any TEST provides in the question the information to determine the answer

This is a foolish assumption outside of the context of academic examinations. There’s no reason to assume that’s a requirement on an online quiz, where many of the explanations of the answers specifically tell you that the best way to identify some scams is to verify information with authoritative sources.

You and I both know if we create a test phishing email with no mistakes, it’s not a failure if people click on it. It’s a failure on our part for creating a BAD TEST.

The best test phishing emails realistically emulate actual phishing emails. Intentionally adding errors only serves to train employees to catch bad phishing attacks. Regardless, I’m not sure what your point is, since every one of the scam examples here does contain either verifiably false information, or obvious scam indicators.

Quatity_Control,

“Learn more about how to keep yourself safe by testing your instincts below and guessing whether each instance is a scam, using real-life examples.”

Distinctly not saying to research online and verify information.

As for tests outside academia, such as this one, even a bone headed dunce understands tests test the knowledge and ability you have, and not what you google online. To the point that if a test allows you to use other sources, that is always specifically stated. So that normal, reasonable people do not treat it as a normal, reasonable test, and complete it with their inherent knowledge and ability. I’m sorry you missed this valuable and important life lesson in learning. Explaining in the answers that you should have known to use outside sources is exactly as I have stated; a bad test.

“The best test phishing emails realistically emulate actual phishing emails. Intentionally adding errors only serves to train employees to catch bad phishing attacks.”

I’m glad as a CEO you don’t actually produce any content for your company. Emulating phishing emails means including the errors that are in phishing emails. Those are the ways you train people to recognise a phishing email. If you don’t include the errors then the only true verification of a genuine/phishing email is verifying with the purported sender by another communication channel. Not at all an effective policy, I’m sure you would agree.

No one’s butt hurt here. Treating a genuine email with caution and wariness is inherent good phishing awareness behaviour. If you can pull your vacuous head out of your voluminous arse for a moment, you will realise that once again, this is a bad test, a bad quiz, not an effective teaching tool, and just plain old click bait. Disparaging it is an appropriate response, and a fucktard such as yourself, with your vaunted claims of related professional acumen, trying to defend it is reprehensible.

jemorgan,

Not gonna read all that lol you are a goofy little guy aren’t ya.

Quatity_Control,

Yeah, choose ignorance. We’ll both be happier.

jemorgan,

You’ve thoroughly demonstrated yourself to be entirely devoid of any real knowledge or experience in this area, and yet you’re continuing to pontificate. You’re clearly enjoying the sensation of having an audience to which you can monologue from a place of ignorance ad nauseam, and I’m depriving you of that. Trust me, you may not be intelligent enough to tell, but I’m doing you a favor. Like averting my eyes when the mentally ill transient defecates himself on the streets. He may not know it, but it’s a mercy not to observe someone in such a state.

Please, feel free to continue. And I’ll continue doing you the kindness of allowing you the uninterrupted company of the only person ignorant enough to think any of your unfounded claims are intelligent.

Quatity_Control,

Indeed, by pretending to ignore what I wrote but devoting time to putting in a reply, having no basis for your mistaken assumptions and following up with insults that only relate to your own behaviour, I’m finally comfortable calling you out as unfit to be CEO of your own skid marks. Couldn’t even troll your own turds.

jemorgan,

The correct thing to do if you got that email would be to try to verify the information that it presents. Is Geek Squad Academy a real thing? How much does their antivirus cost?

Which is exactly what the article says to do, and what you should have done before answering the question. Of course the getting the questions right doesn’t matter, but the question and explanation are an excellent example of what they’re trying to teach.

Also, the grammar was just a little bit funky in that email. Could just be that the geek squad email writer has funky grammar, but it’s definitely a red flag that should make you want to double check the info in the email.

Fafner,
@Fafner@yiffit.net avatar

If you clicked that link then, no, you are not smarter than a scammer.

veloxy,

I feel like this link is a scam itself lol

doomkernel,

So every question was a scam or not quite a scam. Sure.

  • All
  • Subscribed
  • Moderated
  • Favorites
  • random
  • uselessserver093
  • [email protected]
  • Food
  • aaaaaaacccccccce
  • test
  • CafeMeta
  • testmag
  • MUD
  • RhythmGameZone
  • RSS
  • dabs
  • SuperSentai
  • oklahoma
  • Socialism
  • KbinCafe
  • TheResearchGuardian
  • KamenRider
  • feritale
  • All magazines