Below are a examples of common scams and phishing attempts. If you have received one like this, most likely it is a scam- an attempt to steal personal information, account numbers, money, or attempt ransom and extortion.
The Post office does not send texts and emails about packages, they will send a postcard or you will be told to login to your USPS account.
Most subscription servicxes do not send text messages or emails that do not have branding and have complex email addresses..
This is an attempt to steal info by pretending to be a bail bonds service . It gets a loving grandparent to click on link and transfer funds and personal information. The text may have personal information because it has been skimmed from social media sites.
Personal messages like this would not come using Outllok general email.
Do you even have a PNC account. The scammers are hoping that 1% of the recipients of this text will click on it and actually enter their real PNC login credentials.
Fake requests to hire you in a professsional capacity.
USPS package problems are not reported via text message. Do you even have a package that you were expecting. Always go to the real site from a Google Search, do not use the link you have been given in the text messag.
This is not from Amazon . They just hope that 50% of America has a Amazon account and that 1% of the recipients will open the message and type in personal and account related information.
Apple does not send text messages. The scammers hope that you will click on the link and they will be able to take over your Apple account, when you give them the password in error.
These messages are fake. You will not receive a text message from Toll by Plate or EZ Pass. You do not owe any money. Look at phone number it is coming from and the jibberish link that they are sending you to.
USPS does not send out such messages. Everyone likes to get mail and packages, The hope is that you will click on the link because you were expecting a package.
Job offer- the most dangerous Phishing expedition. You give away too much of your personal information in error or you actually travel to the job site and get kidnapped / enslaved. Sometimes you think it is a legitimate job , but you are actually acting as a mule , helping to transfer illegal cargo or stolen items.
Do Not Be Scared, Do Not Be Victimized, Be Informed...
The Best Protection is a little education and a little patience. Do not react to threats. No one from the government is going to arrest you and gift cards can not be used to pay a tax bill. When in doubt, show the text to a trusted friend or family member or send to us.
Here is an educational Video about The Common Social Secuity Fraud messages that people recieve via email, text, and phone call
People are calling you and texting you , claiming to be from the IRS. The IRS never calls or texts. Everything goes through the US amil or your IRS account. They will not threaten you with arrest.
Education Video about Scam Alerts
Here is an example of a common toll text that is a scam. If you login, it will collect information from you . Even clicking on the links or making the calls provides valuable personal information they can sell.
Things to notice: it is not the real email address or their website that is referenced.
A legitimate business does not threaten you with criminal prosecution
Online romantic schemes—also called romance scams—are fraudulent relationships initiated through dating websites, social media, or messaging apps. Scammers build emotional connections with their victims to gain trust and eventually exploit them for money, gifts, or personal information. They often pose as attractive professionals (e.g., soldiers, doctors, businesspeople) with elaborate but fake backstories.
Protect yourself by never aiding in the transfer of funds and using techniques that can detect the fraud early.
Here is a link to a summary document, Romantic Scams- Explanation & Detection
Learn more about how to protect yourself through our educational materials and public presentations.
Fake PayPal Invoice
You get an email claiming that you have purchased something or that you have receved a refund from a purchase. It causes you to call the number provided or click on the link in either pamic or hope.
The Scammers then hack your computer and/or request personal data from you that they use to steal your money as they sell the information to other criminals for future use.
Be Careful Applying for Jobs on the Internet
When you apply for positions, there are several ways that you can be victimized.
You provide your personal information, which is then abused for fraudulent purposes.
You do secure a " job" where you are tricked to aid in fraudulent illegal activities, such as Money Laundering or other criminal activities.
You secure a job that you travel for but find yourself kidnapped or become victim of human traficking.
You need to verify the true existance of the entreprise, that the compensation is reasonable, and that private information is not required before common practices.
Just as with Fishing, you use a lure to attract your Target
Phishing is a common method used by cybercriminals to trick individuals into sharing sensitive information such as passwords, credit card numbers, or Social Security numbers. Phishing usually happens via email, but it can also occur through text messages (smishing), phone calls (vishing), and fake websites.
Email Phishing: The most common form where attackers send fraudulent emails that look legitimate, often impersonating trusted organizations like banks, delivery services, or government agencies. These emails contain links to fake websites or attachments with malware.
Spear Phishing: A targeted form of phishing aimed at specific individuals, often containing personal information to make the message seem more convincing.
Smishing: Phishing through text messages. Smishing attempts may include links to fake websites or request that the user replies with personal information.
Vishing: Phishing through phone calls. Attackers might impersonate support representatives, bank officials, or government agents to convince the victim to reveal information or make payments.
Clone Phishing: Cybercriminals copy a legitimate email and replace any links or attachments with malicious versions, then send it to the victim, often appearing to come from a known contact.
Educational Articles About Protecting Yourself from Fraud and Scams