Romance Scams

By Trilogy Financial
August 1, 2023
Share on:

A romance scam, also known as an online dating scam, is when a person gets tricked into believing they’re in a romantic relationship with someone they met online, when in fact their other half is a cybercriminal using a fake identity to gain enough trust to ask — or blackmail — them for money.

Oftentimes, a romance scammer starts on dating sites or apps. But scammers have increasingly started finding targets on social media, too.

After connecting with someone through a fake profile, the scammer will strike up a conversation and start building a relationship by regularly chatting with them. Once they start to trust the romance scammer and believe they have a truthful relationship, the cybercriminal will make up a story, ask them for money, and vanish.

Types of Romance Scams

Some of the most common internet dating scams include:       

Fake Dating Sites: Scam dating sites claim to be legitimate but are actually filled with scammers or underpopulated. These websites are created to mine your information.

Photo Scams: Scammers will convince their target to send their personal information in exchange for intimate photos.

Military Romance Scams: The scammer will pose as a military member, likely deployed. They build trust by using military jargon and titles, then ask for money to cover military-related expenses, such as flights home.

Intimate Activity Scams: The scammer connects with their target on multiple social media websites. Once they become closer, the scammer convinces them to undress and then threatens them with the recordings.

Code Verification Scams: Scammers will send a fake verification code through email or text, posing to be a dating app or website. Once clicked on, it will ask for their personal information, including Social Security number and credit cards.

Inheritance Scams: Scammers will make their target believe they need to get married in order to get their inheritance. In this case, they will ask them to help pay for something like airfare.

Malware Scams: Malware is also common on dating sites. In this case, the recipient will interact with a scammer who sends them a website that looks legitimate; however, it's a page that includes malware.

Tips To Avoid Losing Money To a Romance Scam

  • Protect yourself and older loved ones by raising awareness. Although this can be an uncomfortable topic, make sure you, your family and your friends are familiar with romance scams. The more you know about these scams, the better prepared you are to prevent being a victim.
  • Check in on older loved ones. Scammers are seeking to target those living alone or grieving the loss of a spouse as they are more vulnerable.
  • Limit what you share online.Scammers can use details shared on social media and dating sites to better understand and target you.
  • Do your research.Research the individual’s photo and profile using online searches to see if the image, name or other details have been used elsewhere.
  • Go slowly and ask lots of questions.Don’t let the individual rush you to leave a dating service or social media site to communicate directly.
  • Listen to your gut.If the individual seems too good to be true, talk to someone you trust.
  • Don’t overshare personal information.Requests for inappropriate photos or financial information could later be used to extort you.
  • Be suspicious if you haven’t met in person.If the individual promises to meet in person, but consistently comes up with an excuse for cancelling, be suspicious.
  • Don’t send money.Never send money to anyone you have only communicated with online or by phone.

Think you’ve been scammed?

  1. Stop communicating with the individual immediately.
  2. Talk to someone you trust and describe what’s going on.
  3. Report the incident to local law enforcement.
  4. Submit a fraud complaint with the Federal Trade Commission.

Dating scams can have devastating consequences on individuals seeking love and companionship online. It's crucial to be aware of the red flags and take necessary precautions to protect yourself from falling victim to these fraudulent schemes. Even if it’s too late to recoup losses, details may help others from becoming a victim.

 

You may also like:

By
June Adams
May 10, 2021

Weak passwords can compromise the best security tools and controls. With a never-ending list of applications and services that users and consumers access, people may have dozens of passwords to maintain at any given time. Often, the temptation to use familiar terms such as pet names, favorite teams or the names of children or friends can cause risk since much of those details can be discovered by a simple examination of social media.

Creating strong passwords offers greater security for minimal effort. Weak passwords can compromise the best security tools and controls. With a never-ending list of applications and services that users and consumers access, people may have dozens of passwords to maintain at any given time. Often, the temptation to use familiar terms such as pet names, favorite teams or the names of children or friends can
cause risk since much of those details can be discovered by a simple examination of social media.

Under Lock and Key
You can buy a small padlock for less than a dollar—but you should not count on it to protect anything of value. A thief could probably pick a cheap lock without much effort, or simply break it. And yet, many people use similarly flimsy passwords to “lock up” their most valuable assets, including money and confidential information. Fortunately, everyone can learn how to make and manage stronger passwords. It is an easy way to strengthen security both at work and at home.

What Makes a Password ‘Strong’?
Let’s say you need to create a new password that’s at least 12 characters long, and includes numerals, symbols, and upper- and lowercase letters. You think of a word you can remember, capitalize the first
letter, add a digit, and end with an exclamation point. The result: Strawberry1!

Unfortunately, hackers have sophisticated password-breaking tools that can easily defeat passwords based on dictionary words (like “strawberry”) and common patterns, such as capitalizing the first letter.
Increasing a password’s complexity, randomness, and length can make it more resistant to hackers’ tools. For example, an eight-character password could be guessed by an attacker in less than a day, but a 12-character password would take two weeks. A 20-character password would take 21 centuries. You can learn more about creating strong passwords in your organization’s security awareness training. Your organization may also have guidelines or a password policy in place.

Why Uniqueness Matters
Many people reuse passwords across multiple accounts, and attackers take advantage of this risky behavior. If an attacker obtains one password—even a strong one—they can often use it to access other valuable accounts.

Here is a real-life example: Ten years ago, Alice joined an online gardening forum. She also created an online payment account and used the same password. She soon forgot about the gardening forum, but someone accessed her payments account years later and stole a large sum of money.

Alice did not realize the gardening forum had been hacked, and that users’ login credentials had been
leaked online. An attacker probably tried reusing Alice’s leaked password on popular sites—and
eventually got lucky.

Guarding Your Passwords & PINS. Passwords and PINS protect sensitive data and it's critical to keep them safe. Try these best practices to stay protected.

1. Do not write them down – Many make the mistake of writing passwords on post-it notes and
leaving them in plain sight. Even if you hide your password, someone could still find it. Similarly, do
not store your login information in a file on your computer, even if you encrypt that file.
2. Do not share passwords – You cannot be sure someone else will keep your credentials safe. At
work, you could be held responsible for anything that happens when someone is logged in as you.
3. Do not save login details in your browser – Some browsers store this information in unsafe
ways, and another person could access your accounts if they get your device.
4. Use a password manager – These tools can securely store and manage your passwords and
generate strong new passwords. Some can also alert you if a password may have been
compromised.
5. Never reuse passwords – Create a unique, strong password for each account or device. This
way, a single hacked account does not endanger other accounts.
6. Create complex, long passwords – Passwords based on dictionary words, pets’ names, or other
personal information can be guessed by attackers.

 

 

 

By Trilogy Financial
April 15, 2020

When is the “end” of this Coronavirus season? Do we return to “normal” at the end of the summer? I have no idea. However, I do know that when it happens, I will have already given intentional thought to my plan to return because there are some lessons learned and best practices to hold on to during this period of being at home with my family and work. Here are just a few I’d thought I share:

Be Present. Being more present has always been a pursuit of mine. And amidst a shelter-in environment, I’ve been more present without the back and forth to the office. When we are present, we thrive. When we are present, we are listening to our clients. When we are present, we are having more fun with our family. Compare it to being in the zone in athletics. We are solely focused on the conversation or task at hand, making us ultimately more effective as leaders and parents. Be present.

Be Proactive. Even though none of us anticipated the spread of this virus, there have still been plenty of opportunities to be proactive. Despite the uncertainty, a forward-thinking strategy creates freedom and reassurance. Having the flexibility to make anticipated adjustments and then course correct from there helps us weather the difficult days and be ahead over the long-term. This relates to our financial strategy and our day-to-day structure with kids at home. Have a plan, discuss it, and see it to completion. That might result in a strategy to invest in the market with dollar-cost averaging or decide to double recipes so you don’t have to cook as much. Either way, be proactive in life and at work.

Keep Up Good Habits. I have enjoyed the opportunity to connect over Zoom. I’m still improving my ability to read the emotion through the technology but with the effectiveness of virtual meetings, could I plan to only have Zoom meetings on Friday and stay at home? This would give me a few more hours to spend with my family. I don’t think my clients would disagree with that. Give it some thought. Have there been practices at home that should continue? Read for 20 minutes in the middle of the day? Exercise at lunch?

I’ve been grateful for this time and yet I know, this has created immense difficulty for most people. Through my numerous conversations with clients and friends, I’ve been encouraged by the attitude and fortitude these times require. Here’s to having a plan before we return to normal again.

“The most powerful weapon against stress is our ability to choose one thought over another. Train your mind to see the good in this day.” –Marc & Angel Chernoff

 

The opinions voiced in this material are for general information only and are not intended to provide specific advice or recommendations for any individual. To determine what is appropriate for you, consult a qualified professional.

Get Started on Your Financial Life Plan Today