海角精品黑料

Common tactics or triggers that attackers leverage

Tactic or Trigger

What it means
Your emotions

A desire to help. Fear. Curiosity. Disappointment. Urgency. Hope. Attackers and marketers use these because they work.

Watch for emotional trigger words like 鈥淯rgent鈥, 鈥淐ongratulations鈥, 鈥淎ct Now鈥 - if you spot them, pause, take a deep breath, and then assess if it鈥檚 legitimate, spam, or scam before you interact.

Compromised accounts

Attackers regularly trick people into handing over their passwords and 2FA credentials. They then use those to access the accounts, harvest emails, and/or email our community.

People are much more likely to reply back to a message or email that comes from a legitimate email address, like one from @mcgill.ca.

Spoofing

If it鈥檚 available online, it can be copied and used for phishing!

Attackers can fake names, the 海角精品黑料 logos, or even recreate entire websites - to trick you into trusting them.

Behavioral analysis

Just like marketers, attackers study what people will click on, their habits, and interests.

They count on you interacting with their phishing attempt before you have a chance to think about the red flags.

Back to top

It's (almost always) a trap: Common Scams

By learning how to spot these scams, you鈥檒l protect yourself and others by warning them if you hear them mention one.

Unfortunately, for each legitimate service or need, there are scammers who run their own fraudulent versions. If you are unsure whether something not listed on this page could be a scam, visit the 鈥檚 A-Z index of scams. Alternatively, an internet search will often reveal reports of the same or similar scams.

Common Scams

Description or real-life examples
Fake websites

Attackers create fake,聽authentic-looking websites to steal your login credentials聽and personal or聽financial information. They spoof Microsoft, Google job pages, or career sites for major corporations. They can even create , and more!

Gift card purchase scams

Gift cards are popular with scammers because聽they鈥檙e incredibly hard to track. A popular tactic is sending a short email that spoofs聽someone you know, asking for 鈥渁 favor鈥 to buy gift cards for them.

If anyone attempts to arrange payment for goods or services using gift cards, it鈥檚 likely a scam. .

Charities/fundraising scams Whether it be a tragic event, someone鈥檚 real or alleged health issue, or anything that might trigger a desire to contribute, scammers will leverage it. Before donating, always check who you鈥檙e donating to. In addition to fake charities, scammers also use to steal your money. .
Job opportunities

Attackers pose as recruiters on LinkedIn, social media, and even use compromised email accounts to send out job offers that sound too good to be true. Try and spot the red flags in this real example:

鈥淭his opportunity should be done at leisure time, taking at most 1 to 2 hours per day, 2 to 3 times a week, and earning 1,200 CAD biweekly. It鈥檚 a flexible opportunity where you determine your working time.鈥

Learn more.

Back to top

Common Scams Description or real-life examples
HR-related emails

Benefits, employment policy changes, vacation allocation, bonuses, pay increase: emails with HR topics are effective hooks attackers use. Often, they鈥檒l come with an attachment for you to download or you鈥檒l be prompted to sign/login to a fake site.

Example:

鈥淢cgill Human Resource requests your signature on Mcgill Employees Benefit Enrollement.pdf Follow the secured link below to review and sign.鈥

Tax scams

Scammers pose as representatives from government agencies and claim your SIN has been compromised, you owe taxes, or you're under investigation for a financial crime. They鈥檒l threaten arrest, fines, or deportation if you don鈥檛 respond immediately and send payment through gift cards, Bitcoin, or money transfer services.

Benefit scams You鈥檒l usually spot聽these as posts or messages on social media, online ads, and occasionally emails. Whether spoofed or completely fake, they promise you money in some form 鈥 inheritance, bequests, government benefits, or grants are all common examples.
Purchase order scams

Watch out for these:

  • A fake invoice for a popular service.
  • An email subject filled with codes and numbers, including a聽file attachment and a notice that payment is required.
  • An email claiming payment is overdue for a purchase, with a long email thread attached.
  • A confirmation of a transaction you never made.

Back to top

Common Scams

Description or real-life examples
Sign this document

One of the most popular and successful phishing scams involves attackers using聽spoofed DocuSign, Adobe Sign, and other templates that usually look somewhat legitimate.

Example:

鈥満=蔷泛诹 shared a document with you: contract_agreement.pdf
September 25, Signature Required

Open

This secure folder only works for the recipient in mcgill.ca.鈥

IT-related scary alerts that you need to act on as soon as possible (ASAP)

海角精品黑料 IT Services (and Microsoft) will never send out an email warning that something bad will happen if you don鈥檛 take immediate action. When in doubt, look for an announcement on the IT Services site.

Example:

鈥淒ue to new updates on our server, your email account will stop receiving emails if not verified within 24hrs starting from today
To keep your account with us, kindly verify below"

Link

Investment opportunities Common scams include cryptocurrency schemes, fake business or franchise offers, guaranteed investments and multi-level marketing. These scams often promise unusually high returns but result in victims losing their money. Investment scams can also be combined with other types of fraud, such as romance scams. .
Posts on social media

Social media is a scammer鈥檚 paradise. They make their own accounts 鈥 often stealing content from other people or compromise other accounts.

Their goal: profit, however they can.聽聽You鈥檒l find any scam mentioned here on social media, plus many more, including and romance scams.

Tip: Avoid clicking links on social media, even from people you know, and avoid accepting friend requests from anyone you don鈥檛 know.

Back to top

Common Scams

Description or real-life examples
Online marketplace ads

Whether you鈥檙e a buyer or a seller, you can be the target of these scams. From services to purchase prices that seem like you鈥檝e scored a deal, scammers use all sorts of tactics to take your money or your stuff.聽.

Bonus scam to watch for: .

Scan this to pay

QR codes: Convenient to scan and save you from typing 鈥 but attackers can generate their own to redirect you to malicious sites. These sites may be designed to steal your login credentials or trick you into making a payment, like for parking.

And just like that 鈥 boom - they have your money and your credit card information.聽

.

Immigration scams Common scams include cryptocurrency schemes, fake business or franchise offers, guaranteed investments and multi-level marketing. These scams often promise unusually high returns but result in victims losing their money. Investment scams can also be combined with other types of fraud, such as romance scams. .
Fake fraud alerts (credit cards, banking, other financial accounts)

Scammers impersonate banks, law enforcement, companies, and credit agencies. They may use fake caller IDs, online information to seem credible.

These scams often involve fake transactions, adding fraudulent payees, or convincing you to transfer or 鈥渞ecover鈥 your money.

If you get one of these calls: hang up, call your financial provider using the number on the back of your card, and never send money or share sensitive information.

Law enforcement / extortion scams

Whether it鈥檚 a threat against you or a loved one, an accusation of illegal activity, or an urgent plea for money, come in may forms.

These range from mass email 鈥測our computer has been hacked鈥 scams to 鈥".

Back to top

Back to top