Here are some basic tips to help you spot scammers online:
Strange email addresses and messages
Be careful with emails and messages: check the sender's address and the content of the message. If anything seems suspicious, it's best to delete the message or refuse to open the attachment.
Don't click on suspicious links: Scammers can send you emails or messages with links to fake websites to get access to your personal information. Never click on suspicious links or enter your personal information on such websites.
Requesting personal information through open channels
Never give out your identity: scammers can request your personal information via email or social media. Never respond to such requests, especially if they seem suspicious.
Address sites with typos
Check website addresses - scammers could set up fake websites that look just like the real thing to gain access to your personal information. Check the URL carefully before entering your personal details on a web page.
Use reliable software: Scammers can use malware to gain access to your computer or device. Install anti-virus software and update it regularly to protect your device from malware.
Lack of reviews, ratings
Look for reviews and ratings: if you are going to make an online purchase or use a service, look for reviews and ratings of that vendor or service. If there are a lot of negative reviews, it could be a sign that something is wrong.
Request money transfers, via suspicious payment systems
Be careful when requesting money: If you are asked to transfer money or provide a credit card in exchange for a product or service, be careful. It is best to choose trustworthy payment systems or use payment cards with a dispute option in case of problems.
No two-factor authentication
Use two-factor authentication: Two-factor authentication can help protect your credentials, even if attackers have stolen your password. Enable this feature on all your online accounts where possible.
No data encryption
Scammers will often redirect users to sites without https encryption protocols so that in a harmless transaction or real purchase you give them your bank card details or personal information that can be used for blackmail.