{"id":76522,"date":"2020-01-03T06:41:36","date_gmt":"2020-01-03T14:41:36","guid":{"rendered":"https:\/\/www.intego.com\/mac-security-blog\/?p=76522"},"modified":"2021-05-06T03:53:44","modified_gmt":"2021-05-06T10:53:44","slug":"top-10-online-scams-watch-out-for-these-common-red-flags","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/top-10-online-scams-watch-out-for-these-common-red-flags\/","title":{"rendered":"Top 10 online scams: Watch out for these common red flags"},"content":{"rendered":"<p><img loading=\"lazy\" class=\"aligncenter size-full wp-image-77314\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/04\/Top-Online-Scams.png\" alt=\"Top Online Scams\" width=\"600\" height=\"300\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/04\/Top-Online-Scams.png 600w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/04\/Top-Online-Scams-150x75.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/04\/Top-Online-Scams-300x150.png 300w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/><\/p>\n<p>Scams aren&#8217;t new; they&#8217;ve been around for centuries, even millennia. They are used to bilk unsuspecting people, or to gain information or power.<\/p>\n<p>Nigerian princes want to give you money; Russian women think you&#8217;re cute; investment professionals want to let you in on a hot stock; or you&#8217;ll make a fortune working at home.<\/p>\n<p>With the rise of the Internet, these scams have become more prevalent, especially since scammers can send out millions of emails, casting a wide net in hopes of hooking a handful of people.<\/p>\n<p>Here&#8217;s a list of the top 10\u00a0online scams and what they look like. If you&#8217;re aware of these scams, you&#8217;re a lot less likely\u00a0to fall for them.<\/p>\n<h3>Phishing<\/h3>\n<p><img loading=\"lazy\" class=\"aligncenter size-full wp-image-37579\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/02\/phishing-dangers-business-emails.jpg\" alt=\"Phishing dangers in business\" width=\"600\" height=\"300\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/02\/phishing-dangers-business-emails.jpg 600w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/02\/phishing-dangers-business-emails-150x75.jpg 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/02\/phishing-dangers-business-emails-300x150.jpg 300w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/><\/p>\n<p><strong>Phishing<\/strong> is by far the most common, and potentially the most dangerous scam. You receive an email telling you to log into an account \u2014 a bank account, <a href=\"https:\/\/www.intego.com\/mac-security-blog\/clever-phishing-scam-targets-your-apple-id-and-password\/\" target=\"_blank\" rel=\"noopener noreferrer\">your iCloud account<\/a>, or some other account \u2014 and you end up giving your user name and password to cybercriminals. It&#8217;s important to know <a href=\"https:\/\/www.intego.com\/mac-security-blog\/clever-phishing-scam-targets-your-apple-id-and-password\/\" target=\"_blank\" rel=\"noopener noreferrer\">how to identify phishing attempts<\/a>, so you can avoid getting hooked. And if you do get tricked, <a href=\"https:\/\/www.intego.com\/mac-security-blog\/the-intego-mac-podcast-episode-12-what-to-do-if-youve-been-hacked\/\" target=\"_blank\" rel=\"noopener noreferrer\">this episode<\/a> of the Intego Mac Podcast will help you fix things.<\/p>\n<h3>Fake Antivirus Software<\/h3>\n<p><img loading=\"lazy\" class=\"aligncenter size-full wp-image-31654\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/09\/trojan-600x300.jpeg\" alt=\"Trojan Horse\" width=\"600\" height=\"300\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/09\/trojan-600x300.jpeg 600w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/09\/trojan-600x300-150x75.jpeg 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/09\/trojan-600x300-300x150.jpeg 300w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/><\/p>\n<p><strong>Fake antivirus software<\/strong> is a way of tricking you into installing software that sounds legitimate, but that really is just a Trojan horse that <a href=\"https:\/\/www.intego.com\/mac-security-blog\/watch-out-a-fake-antivirus-blog-is-distributing-proton-malware\/\" target=\"_blank\" rel=\"noopener noreferrer\">lets malicious users take control of your computer<\/a>. The real risk is that this software might be able to record your credentials \u2014 user names and passwords \u2014 potentially accessing your accounts, even your bank account. Make sure that you only download security software from trusted companies, like Intego.<\/p>\n<h3>Text Message Scams<\/h3>\n<p><img loading=\"lazy\" class=\"aligncenter size-full wp-image-76531\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/03\/text-message-scam.jpg\" alt=\"iPhone text message scam\" width=\"480\" height=\"287\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/03\/text-message-scam.jpg 480w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/03\/text-message-scam-150x90.jpg 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/03\/text-message-scam-300x179.jpg 300w\" sizes=\"(max-width: 480px) 100vw, 480px\" \/><\/p>\n<p><strong>Text message scams<\/strong> are another type of phishing, but you may be less likely to react to them when they arrive in your Messages app than when they come via email. <a href=\"https:\/\/www.intego.com\/mac-security-blog\/iphone-scam-alert-this-text-phishes-for-your-apple-id-password\/\" target=\"_blank\" rel=\"noopener noreferrer\">They can purport to come from Apple<\/a>, or from your bank, or a service like PayPal. If you get a text message like this, don&#8217;t click the link. If you get one from your bank, don&#8217;t call the phone number; go to your bank&#8217;s website and find the correct number, then call them. If not, you may give up your bank account details to a scammer, and your balance may be quickly siphoned off.<\/p>\n<h3>Fake Software Updates<\/h3>\n<p><img loading=\"lazy\" class=\"aligncenter size-full wp-image-58528\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/10\/SilverInstaller-Fake-Flash-Player-Update-Header.jpg\" alt=\"Fake Flash Player Update\" width=\"600\" height=\"300\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/10\/SilverInstaller-Fake-Flash-Player-Update-Header.jpg 600w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/10\/SilverInstaller-Fake-Flash-Player-Update-Header-150x75.jpg 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/10\/SilverInstaller-Fake-Flash-Player-Update-Header-300x150.jpg 300w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/><\/p>\n<p><strong>Fake software updates<\/strong> are proliferating. Many of them <a href=\"https:\/\/www.intego.com\/mac-security-blog\/how-to-tell-if-adobe-flash-player-update-is-valid\/\" target=\"_blank\" rel=\"noopener noreferrer\">masquerade as Adobe Flash Player installers<\/a>, because that software is updated so often. But there are others, <a href=\"https:\/\/www.intego.com\/mac-security-blog\/how-to-tell-if-office-for-mac-update-is-valid\/\" target=\"_blank\" rel=\"noopener noreferrer\">including Microsoft Office updates<\/a>. It&#8217;s important to know <a href=\"https:\/\/www.intego.com\/mac-security-blog\/how-to-tell-if-software-and-updates-are-the-real-deal\/\" target=\"_blank\" rel=\"noopener noreferrer\">how to tell what&#8217;s legit and what&#8217;s not<\/a>. As with fake antiviruses, these software updates can compromise your computer, allowing cybercriminals to access all your data.<\/p>\n<h3>Facebook Question and Answer Scams<\/h3>\n<p><img loading=\"lazy\" class=\"aligncenter size-full wp-image-13961\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/04\/facebook-scam.jpg\" alt=\"\" width=\"500\" height=\"182\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/04\/facebook-scam.jpg 500w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/04\/facebook-scam-150x54.jpg 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/04\/facebook-scam-300x109.jpg 300w\" sizes=\"(max-width: 500px) 100vw, 500px\" \/><\/p>\n<p>&nbsp;<\/p>\n<p><strong>Facebook question and answer scams<\/strong>. Sometimes on Facebook, people may randomly ask questions like, What was your first car?, or Who was your best friend as a child? If you&#8217;ve seen Apple&#8217;s security questions, you&#8217;ll notice that these are the same. Don&#8217;t ever answer them. If people can get one or two answers like this, they can get into your account claiming they&#8217;ve forgotten your password. We have <a href=\"https:\/\/www.intego.com\/mac-security-blog\/how-to-choose-and-answer-security-questions\/\" target=\"_blank\" rel=\"noopener noreferrer\">an article about how to choose and answer security questions<\/a>; it&#8217;s worth reading this, and especially watching the movie clip in the article, showing how scammers can use this information.<\/p>\n<h3>Typosquatting<\/h3>\n<p><img loading=\"lazy\" class=\"aligncenter size-full wp-image-51739\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/03\/om-url-typosquatting-malware.jpeg\" alt=\".OM URL Typosquatting Malware\" width=\"600\" height=\"300\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/03\/om-url-typosquatting-malware.jpeg 600w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/03\/om-url-typosquatting-malware-150x75.jpeg 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/03\/om-url-typosquatting-malware-300x150.jpeg 300w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/><\/p>\n<p><strong>Typosquatting<\/strong> is a relatively new phenomenon. It involves tricky website URLs, such as a domain name ending with .om or .cm instead of .com, or a slightly misspelled domain name, such as amozon.com instead of amazon.com. We all make mistakes typing, so it&#8217;s important to be very careful when we enter a URL, because <a href=\"https:\/\/www.intego.com\/mac-security-blog\/type-a-url-wrong-and-you-might-end-up-with-malware-on-your-mac\/\" target=\"_blank\" rel=\"noopener noreferrer\">sites like this can deliver malware to your computer<\/a>.<\/p>\n<h3>Online Tax Filing Scams<\/h3>\n<p><img loading=\"lazy\" class=\"aligncenter wp-image-13403\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/04\/taxes-security-header.jpg\" width=\"535\" height=\"300\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/04\/taxes-security-header.jpg 660w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/04\/taxes-security-header-150x84.jpg 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/04\/taxes-security-header-300x168.jpg 300w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/04\/taxes-security-header-657x368.jpg 657w\" sizes=\"(max-width: 535px) 100vw, 535px\" \/><\/p>\n<p><strong>Online tax filing scams<\/strong> flourish at certain times of the year. They take advantage of the fact that many people pay their taxes at the last minute, and are perhaps stressed at having to pay out what may be a large sum of money. <a href=\"https:\/\/www.intego.com\/mac-security-blog\/7-easy-to-implement-security-tips-for-filing-taxes-online\/\" target=\"_blank\" rel=\"noopener noreferrer\">Make sure that you&#8217;re at the right website<\/a>, not some typosquatter, when you file and\/or pay your taxes. If you use an app to file your taxes, make sure it&#8217;s up to date. And file your taxes early, so you&#8217;re not in a hurry to get it done, and perhaps miss the signs of a bogus website.<\/p>\n<h3>Free Wi-Fi Scams<\/h3>\n<p><img loading=\"lazy\" class=\"aligncenter wp-image-56473\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/08\/mac-security-public-wifi-networks.jpg\" alt=\"Mac Security Public Wi-Fi Networks\" width=\"535\" height=\"300\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/08\/mac-security-public-wifi-networks.jpg 660w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/08\/mac-security-public-wifi-networks-150x84.jpg 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/08\/mac-security-public-wifi-networks-300x168.jpg 300w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/08\/mac-security-public-wifi-networks-657x368.jpg 657w\" sizes=\"(max-width: 535px) 100vw, 535px\" \/><\/p>\n<p><strong>Free wi-fi scams<\/strong> are increasingly common, as we all need to use wi-fi when we&#8217;re not at home or at the office, and our phone contracts may not allow us to use enough data. <a href=\"https:\/\/www.intego.com\/mac-security-blog\/how-to-keep-your-mac-safe-at-universities-and-public-networks\/\" target=\"_blank\" rel=\"noopener noreferrer\">Learn these tips<\/a> to make sure your Mac\u2014and your iPhone\u2014is safe on public networks, <a href=\"https:\/\/www.intego.com\/mac-security-blog\/how-to-remove-wi-fi-networks-from-your-mac-and-ios-device\/\" target=\"_blank\" rel=\"noopener noreferrer\">remove Wi-Fi networks<\/a> you no longer connect to from your Mac and iOS device, and <a href=\"https:\/\/www.intego.com\/mac-security-blog\/the-intego-mac-podcast-episode-15-why-you-should-use-a-vpn\/\" target=\"_blank\" rel=\"noopener noreferrer\">use a VPN<\/a> (like <a href=\"https:\/\/www.cyberghostvpn.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">CyberGhost<\/a>, <a href=\"https:\/\/www.privateinternetaccess.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Private Internet Access<\/a>, or <a href=\"https:\/\/zenmate.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">ZenMate<\/a>) to stay secure.<br \/>\n<iframe loading=\"lazy\" src=\"https:\/\/fireside.fm\/player\/v2\/GegHgcrH+LdKz_YA2?theme=dark\" width=\"740\" height=\"200\" frameborder=\"0\" scrolling=\"no\"><\/iframe><\/p>\n<h3>Online Shopping Scams<\/h3>\n<p><img loading=\"lazy\" class=\"aligncenter wp-image-34387\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/12\/online-shopping-tips.jpg\" alt=\"shopping online scams\" width=\"537\" height=\"300\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/12\/online-shopping-tips.jpg 600w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/12\/online-shopping-tips-150x83.jpg 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/12\/online-shopping-tips-300x167.jpg 300w\" sizes=\"(max-width: 537px) 100vw, 537px\" \/><\/p>\n<p><strong>Online shopping scams<\/strong> are another way to separate you from your money, generally while making you think you&#8217;re getting a bargain. They are <a href=\"https:\/\/www.intego.com\/mac-security-blog\/6-cyber-security-tips-for-holiday-shopping-online\" target=\"_blank\" rel=\"noopener noreferrer\">very common around the holiday period<\/a>, but can occur all year round. Sometimes you&#8217;ll encounter fake websites, other times you may get scammed by people offering to sell you something directly, rather than on, say, eBay or Amazon, so you can &#8220;save money.&#8221; Remember that these big e-commerce sites generally guarantee your transactions, so don&#8217;t try to shave a bit of money off your purchase and end up with nothing.<\/p>\n<p><em>Related article:<\/em><\/p>\n<blockquote class=\"wp-embedded-content\" data-secret=\"xE3uTPVyyM\"><p><a href=\"https:\/\/www.intego.com\/mac-security-blog\/caution-black-friday-deals-may-be-bad-for-your-security\/\">Caution! These Black Friday &#8220;deals&#8221; may be bad for your security<\/a><\/p><\/blockquote>\n<p><iframe class=\"wp-embedded-content\" sandbox=\"allow-scripts\" security=\"restricted\" style=\"position: absolute; clip: rect(1px, 1px, 1px, 1px);\" title=\"&#8220;Caution! These Black Friday &#8220;deals&#8221; may be bad for your security&#8221; &#8212; The Mac Security Blog\" src=\"https:\/\/www.intego.com\/mac-security-blog\/caution-black-friday-deals-may-be-bad-for-your-security\/embed\/#?secret=xE3uTPVyyM\" data-secret=\"xE3uTPVyyM\" width=\"500\" height=\"282\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\"><\/iframe><\/p>\n<h3>Online Dating Scams<\/h3>\n<p><img loading=\"lazy\" class=\"aligncenter size-full wp-image-69370\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/08\/online-dating-security.jpg\" alt=\"How Online Daters Can Stay Safe from the Dangers of the Web\" width=\"600\" height=\"300\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/08\/online-dating-security.jpg 600w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/08\/online-dating-security-150x75.jpg 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/08\/online-dating-security-300x150.jpg 300w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/><\/p>\n<p><strong>Online dating scams<\/strong>. Here&#8217;s an email I got this morning: &#8220;Dear kirk, My name is Ann, and finally I decided to write to you. I&#8217;m from Russia, but now I live in the USA \ud83d\ude42 I saw you photos on Facebook and can&#8217;t get you out from my head. You look cute and at the same time very sexy and smart, just like my type. Wanna talk to you, what about you?&#8221; I get a few of these every week. They are obviously bogus. But not all <a href=\"https:\/\/www.datingadvice.com\/online-dating\/intego-keeps-online-daters-safe-from-the-dangers-of-the-web\" target=\"_blank\" rel=\"noopener noreferrer\">online dating scams<\/a> are that blatant; some can be very subtle. Be aware that scammers work best by <a href=\"https:\/\/uk.match.com\/pages\/advice\/dating-advice\/online-dating-advice\/how-spot-scammer\" target=\"_blank\" rel=\"noopener noreferrer\">exploiting your heart, not your head<\/a>.<\/p>\n<p>With all these threats, you might think it&#8217;s best to lock your computer in a safe and never connect to the Internet. But we can&#8217;t do that, much of our life depends on Internet services. For this reason, it&#8217;s important to be vigilant, and always ask the question: is this too good to be true? If so, it&#8217;s probably a scam.<\/p>\n<h3>Fake News and Articles<\/h3>\n<p>While in some contexts the term <strong>fake news<\/strong> can refer to journalism with a political bias with which one may disagree, there are also literal fake news sites that impersonate real news sources. These fake news sites are often used in conjunction with spam to either deceptively advertise products or to try to convince victims to fall for scams. Check out our featured article detailing how you can tell apart legitimate and fraudulent articles online:<\/p>\n<blockquote class=\"wp-embedded-content\" data-secret=\"AVq1AbOneC\"><p><a href=\"https:\/\/www.intego.com\/mac-security-blog\/how-to-tell-if-an-online-article-is-real-fake-or-a-scam\/\">How to tell if an online article is real, fake or a scam<\/a><\/p><\/blockquote>\n<p><iframe class=\"wp-embedded-content\" sandbox=\"allow-scripts\" security=\"restricted\" style=\"position: absolute; clip: rect(1px, 1px, 1px, 1px);\" title=\"&#8220;How to tell if an online article is real, fake or a scam&#8221; &#8212; The Mac Security Blog\" src=\"https:\/\/www.intego.com\/mac-security-blog\/how-to-tell-if-an-online-article-is-real-fake-or-a-scam\/embed\/#?secret=AVq1AbOneC\" data-secret=\"AVq1AbOneC\" width=\"500\" height=\"282\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\"><\/iframe><\/p>\n<h3>How else can I stay protected?<\/h3>\n<p><a href=\"https:\/\/www.intego.com\/mac-protection-bundle\" target=\"_blank\" rel=\"noopener noreferrer\"><img loading=\"lazy\" class=\"alignright wp-image-54214 size-medium\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/06\/X9-Mac-Antivirus-Launch-300x150.png\" alt=\"\" width=\"300\" height=\"150\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/06\/X9-Mac-Antivirus-Launch-300x150.png 300w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/06\/X9-Mac-Antivirus-Launch-150x75.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/06\/X9-Mac-Antivirus-Launch.png 600w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/a>It&#8217;s crucial to take a layered approach to security, which should include using tools like a <a href=\"https:\/\/www.intego.com\/mac-security-blog\/why-your-antivirus-needs-real-time-scanning\/\" target=\"_blank\" rel=\"noopener noreferrer\">top-rated antivirus with real-time scanning<\/a>, a <a href=\"https:\/\/www.intego.com\/mac-security-blog\/why-you-need-an-outbound-firewall\/\" target=\"_blank\" rel=\"noopener noreferrer\">two-way firewall<\/a>, a <a href=\"https:\/\/www.intego.com\/mac-security-blog\/a-laymans-guide-to-ransomware-protection\/\" target=\"_blank\" rel=\"noopener noreferrer\">robust backup solution<\/a>, a <a href=\"https:\/\/www.intego.com\/mac-security-blog\/the-best-mac-cleanup-tips-for-digital-spring-cleaning\/\" target=\"_blank\" rel=\"noopener noreferrer\">disk cleanup utility<\/a> to ensure you always have enough free space to install security updates, and <a href=\"https:\/\/www.intego.com\/mac-security-blog\/whats-the-difference-between-macos-parental-controls-and-intego-contentbarrier\/\" target=\"_blank\" rel=\"noopener noreferrer\">parental control software<\/a>\u00a0to protect your kids. All of these, by the way, are included in <strong>Mac Premium Bundle X9<\/strong>; you can get a free trial <a href=\"https:\/\/www.intego.com\/mac-protection-bundle\" target=\"_blank\" rel=\"noopener noreferrer\">here<\/a>, no strings attached.<\/p>\n<p>Of course, cybercriminals are always trying to find new ways to deceive, attack, or infect their victims. That&#8217;s why it&#8217;s important to stay up-to-date on all the latest developments in online safety.<\/p>\n<p>&nbsp;<\/p>\n<h3>How can I learn more?<\/h3>\n<p><a href=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/04\/intego-podcast-artwork-400.jpg\" target=\"_blank\" rel=\"noopener noreferrer\"><img src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/04\/intego-podcast-artwork-400.jpg\" alt=\"\" width=\"80\"  class=\"alignleft\" \/><\/a>Each week on the <a href=\"https:\/\/podcast.intego.com\/\" target=\"_blank\" rel=\"noopener\"><strong>Intego Mac Podcast<\/strong><\/a>, Intego&#8217;s Mac security experts discuss the latest Apple news, security and privacy stories, and offer practical advice on getting the most out of your Apple devices. Be sure to <a href=\"https:\/\/podcasts.apple.com\/us\/podcast\/intego-mac-podcast\/id1293834627\" rel=\"noopener\"><strong>follow the podcast<\/strong><\/a> to make sure you don\u2019t miss any episodes.<\/p>\n<p>You can also subscribe to our <strong>e-mail newsletter<\/strong> and keep an eye here on <a href=\"https:\/\/www.intego.com\/mac-security-blog\"><strong>Mac Security Blog<\/strong><\/a> for the latest Apple security and privacy news. And don&#8217;t forget to follow Intego on your favorite social media channels: <a href=\"https:\/\/www.facebook.com\/Intego\" target=\"_blank\" rel=\"noopener noreferrer\">Facebook<\/a>, <a href=\"https:\/\/www.instagram.com\/intego_security\/\" target=\"_blank\" rel=\"noopener noreferrer\">Instagram<\/a>, <a href=\"https:\/\/twitter.com\/IntegoSecurity\" target=\"_blank\" rel=\"noopener noreferrer\">Twitter<\/a>, and <a href=\"https:\/\/www.youtube.com\/user\/IntegoVideo?sub_confirmation=1\" target=\"_blank\" rel=\"noopener noreferrer\">YouTube<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Scams aren&#8217;t new; they&#8217;ve been around for centuries, even millennia. They are used to bilk unsuspecting people, or to gain information or power. Nigerian princes want to give you money; Russian women think you&#8217;re cute; investment professionals want to let you in on a hot stock; or you&#8217;ll make a fortune working at home. With [&hellip;]<\/p>\n","protected":false},"author":46,"featured_media":77329,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[151,13],"tags":[4039,116],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"Scams aren&#039;t new; they&#039;ve been around for centuries, even millennia. They are used to bilk unsuspecting people, or to gain information or power. Nigerian\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/top-10-online-scams-watch-out-for-these-common-red-flags\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Top 10 online scams: Watch out for these common red flags - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"Scams aren&#039;t new; they&#039;ve been around for centuries, even millennia. They are used to bilk unsuspecting people, or to gain information or power. Nigerian\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/top-10-online-scams-watch-out-for-these-common-red-flags\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2020-01-03T14:41:36+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-05-06T10:53:44+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/04\/Online-Scams-Featured.png\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"260\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Kirk McElhearn\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/top-10-online-scams-watch-out-for-these-common-red-flags\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/04\/Online-Scams-Featured.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/04\/Online-Scams-Featured.png\",\"width\":400,\"height\":260,\"caption\":\"Online Scams\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/top-10-online-scams-watch-out-for-these-common-red-flags\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/top-10-online-scams-watch-out-for-these-common-red-flags\/\",\"name\":\"Top 10 online scams: Watch out for these common red flags - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/top-10-online-scams-watch-out-for-these-common-red-flags\/#primaryimage\"},\"datePublished\":\"2020-01-03T14:41:36+00:00\",\"dateModified\":\"2021-05-06T10:53:44+00:00\",\"description\":\"Scams aren't new; they've been around for centuries, even millennia. They are used to bilk unsuspecting people, or to gain information or power. Nigerian\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/top-10-online-scams-watch-out-for-these-common-red-flags\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/top-10-online-scams-watch-out-for-these-common-red-flags\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/top-10-online-scams-watch-out-for-these-common-red-flags\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Top 10 online scams: Watch out for these common red flags\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/top-10-online-scams-watch-out-for-these-common-red-flags\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/top-10-online-scams-watch-out-for-these-common-red-flags\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/a27d67016ab454807cd0c055fc28bb09\"},\"headline\":\"Top 10 online scams: Watch out for these common red flags\",\"datePublished\":\"2020-01-03T14:41:36+00:00\",\"dateModified\":\"2021-05-06T10:53:44+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/top-10-online-scams-watch-out-for-these-common-red-flags\/#webpage\"},\"wordCount\":1379,\"commentCount\":1,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/top-10-online-scams-watch-out-for-these-common-red-flags\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/04\/Online-Scams-Featured.png\",\"keywords\":[\"Online Scams\",\"Scam\"],\"articleSection\":[\"Recommended\",\"Security &amp; Privacy\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/top-10-online-scams-watch-out-for-these-common-red-flags\/#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/a27d67016ab454807cd0c055fc28bb09\",\"name\":\"Kirk McElhearn\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/9ffd73df6063179d7cdcb79109ff0a2d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/9ffd73df6063179d7cdcb79109ff0a2d?s=96&d=mm&r=g\",\"caption\":\"Kirk McElhearn\"},\"description\":\"Kirk McElhearn has been writing about Apple product and computer security for more than 25 years. His blog, Kirkville, links to his work. He is co-host of the Intego Mac Podcast, as well as several other podcasts, and is a regular contributor to The Mac Security Blog, TidBITS, and several other websites and publications. Kirk has written more than two dozen books, including Take Control books about Apple's media apps, Scrivener, and LaunchBar. Follow him on Bluesky at @kirkville.com.\",\"sameAs\":[\"http:\/\/www.kirkville.com\"],\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/kirk-mcelhearn\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"Scams aren't new; they've been around for centuries, even millennia. They are used to bilk unsuspecting people, or to gain information or power. Nigerian","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/top-10-online-scams-watch-out-for-these-common-red-flags\/","og_locale":"en_US","og_type":"article","og_title":"Top 10 online scams: Watch out for these common red flags - The Mac Security Blog","og_description":"Scams aren't new; they've been around for centuries, even millennia. They are used to bilk unsuspecting people, or to gain information or power. Nigerian","og_url":"https:\/\/www.intego.com\/mac-security-blog\/top-10-online-scams-watch-out-for-these-common-red-flags\/","og_site_name":"The Mac Security Blog","article_published_time":"2020-01-03T14:41:36+00:00","article_modified_time":"2021-05-06T10:53:44+00:00","og_image":[{"width":400,"height":260,"url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/04\/Online-Scams-Featured.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_misc":{"Written by":"Kirk McElhearn","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/top-10-online-scams-watch-out-for-these-common-red-flags\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/04\/Online-Scams-Featured.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/04\/Online-Scams-Featured.png","width":400,"height":260,"caption":"Online Scams"},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/top-10-online-scams-watch-out-for-these-common-red-flags\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/top-10-online-scams-watch-out-for-these-common-red-flags\/","name":"Top 10 online scams: Watch out for these common red flags - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/top-10-online-scams-watch-out-for-these-common-red-flags\/#primaryimage"},"datePublished":"2020-01-03T14:41:36+00:00","dateModified":"2021-05-06T10:53:44+00:00","description":"Scams aren't new; they've been around for centuries, even millennia. They are used to bilk unsuspecting people, or to gain information or power. Nigerian","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/top-10-online-scams-watch-out-for-these-common-red-flags\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/top-10-online-scams-watch-out-for-these-common-red-flags\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/top-10-online-scams-watch-out-for-these-common-red-flags\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"Top 10 online scams: Watch out for these common red flags"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/top-10-online-scams-watch-out-for-these-common-red-flags\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/top-10-online-scams-watch-out-for-these-common-red-flags\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/a27d67016ab454807cd0c055fc28bb09"},"headline":"Top 10 online scams: Watch out for these common red flags","datePublished":"2020-01-03T14:41:36+00:00","dateModified":"2021-05-06T10:53:44+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/top-10-online-scams-watch-out-for-these-common-red-flags\/#webpage"},"wordCount":1379,"commentCount":1,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/top-10-online-scams-watch-out-for-these-common-red-flags\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/04\/Online-Scams-Featured.png","keywords":["Online Scams","Scam"],"articleSection":["Recommended","Security &amp; Privacy"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intego.com\/mac-security-blog\/top-10-online-scams-watch-out-for-these-common-red-flags\/#respond"]}]},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/a27d67016ab454807cd0c055fc28bb09","name":"Kirk McElhearn","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/9ffd73df6063179d7cdcb79109ff0a2d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9ffd73df6063179d7cdcb79109ff0a2d?s=96&d=mm&r=g","caption":"Kirk McElhearn"},"description":"Kirk McElhearn has been writing about Apple product and computer security for more than 25 years. His blog, Kirkville, links to his work. He is co-host of the Intego Mac Podcast, as well as several other podcasts, and is a regular contributor to The Mac Security Blog, TidBITS, and several other websites and publications. Kirk has written more than two dozen books, including Take Control books about Apple's media apps, Scrivener, and LaunchBar. Follow him on Bluesky at @kirkville.com.","sameAs":["http:\/\/www.kirkville.com"],"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/kirk-mcelhearn\/"}]}},"jetpack_featured_media_url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/04\/Online-Scams-Featured.png","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-jUe","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/76522"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/46"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=76522"}],"version-history":[{"count":22,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/76522\/revisions"}],"predecessor-version":[{"id":93741,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/76522\/revisions\/93741"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media\/77329"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=76522"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=76522"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=76522"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}