Not all online scams are trying to install adware, spyware, or other malware onto your device. Often scams aren’t a virus burrowing into your hard drive but a fake lover taking root in your heart. If you ever used online dating or other types of social media services, or you might someday, make sure to protect your heart and your bank account from catfishing.
Catfishing is fraud or abuse where someone creates a false online
What are the catfishing red flags to watch for?
Catfishers can be very sneaking and can be very convincing.
If you meet someone through a dating site or social media, proceed with caution. Watch for the common signs that the person you’re interacting with may not be who they say they are.
The person seems too good to be true – If the new love interest appears to be attractive, rich, with a fancy job, it may all be fake. Many catfishers claim to have a job that has them constantly on the road, as it can be an easy cover for why they can’t meet you in person.
They move fast – Pushing the relationship forward unusually fast is an often-used technique; if this is happening, pump the breaks. Be wary about sharing very personal details too quickly (especially about issues that might garner your sympathy) or professing their feelings to you way too early.
Their story has holes – Watch for inconsistencies in their story. Do details about their job, hobbies, or family seem to change frequently? Liars tend to make mistakes or forget what they said previously. Check out how they write — for example, do they come across as a native English speaker, but their writing is full of mistakes? This could be a huge red flag that they aren’t who they say they are.
The individual has a minimal presence on social media – Check the individual out on social media and see how many friends and photos they have. If the account appears new, it could signal that they created the account just for a fake persona.
They seem to have everything in common with you – If they seem to agree with everything you say or suggest they have everything in common with you, this could be another sign that they are lying to establish common ground and build an artificial sense of trust.
What can I do to avoid being catfished?
You can do several things to protect yourself and validate whether the individual is real or possibly a catfisher.
- Ask to do a video chat via Skype, Google Duo, Zoom, or some other video chat services. If excuses start, you can bet they are catfishers – and you won’t hear from them again.
- Meet them in person. Nothing provides validation than seeing someone face to face.
- Do a Google reverse image search against the online photo they show on a dating site. You may find the same image on multiple online profiles with different names.
- Check out their online photos. Are they primarily selfies or studio shots, but none have other friends in them, show no family, or have no real context, like a vacation. That can big sign that this is a con job.
The best strategies to avoid being catfished are being skeptical, using the techniques above to confirm the person you are connecting with, is who they say they are, and just being cautious.
By entering your email address you agree to receive emails from EveryDayCyber. We'll respect your privacy and you can unsubscribe at any time.
What is a Botnet and How to Protect Your Business from One?
A botnet is a network of computers that work as a collective to infiltrate your device. Here's how to protect your business from botnets.
14 Ways to Secure Your Home Wireless Network
Many homeowners are just unaware of the security threats that a wireless network might provide if not adequately safeguarded by a secure Wi-Fi network. We would never leave our house's front door unlocked. So you should do the same and never leave your Wi-Fi networks unprotected since it exposes you to the same or even worse threats.
What is a Remote Access Trojan (RAT)?
A remote access Trojan is a software used by hackers to gain unauthorized access and remote control on a user’s computer or mobile device, including mouse and keyboard manipulation.
What is a DDoS (Distributed Denial of Service) Attack?
DDoS attack or Distributed Denial of Service, is a coordinated attack intended to crash and make unavailable targeted websites and online systems by overwhelming them with data.
Why should you use a Password Manager?
How many passwords do you have? Did you know the average Internet user has 100 passwords. That's a lot of passwords to remember on a daily basis. How do manage all those password effectively - a password manager.
What is Spear Phishing?
Spear phishing is a targeted cyberattack to steal your information. You should be aware of the dangers of this and how to address them.