{"id":127,"date":"2025-06-04T20:32:45","date_gmt":"2025-06-04T20:32:45","guid":{"rendered":"https:\/\/fsc.projectfive.co.ck\/?page_id=127"},"modified":"2025-07-01T08:42:51","modified_gmt":"2025-07-01T08:42:51","slug":"scam-reports","status":"publish","type":"page","link":"https:\/\/fsc.projectfive.co.ck\/?page_id=127","title":{"rendered":"Scam Reports"},"content":{"rendered":"<section class=\"bde-section-127-100 bde-section\">\n              \n  \n  \n\t\n\n  <div class=\"section-background-overlay\"><\/div>\n\n\n<div class=\"section-container\"><h1 class=\"bde-heading-127-101 bde-heading\">\nSCAM\n<\/h1><\/div>\n<\/section><section class=\"bde-section-127-102 bde-section\">\n  \n  \n\t\n\n\n\n<div class=\"section-container\"><div class=\"bde-table-of-contents-127-126 bde-table-of-contents\">\n<div class=\"bde-table-of-contents__wrapper\">\n  <header class=\"bde-table-of-contents__header\">\n        <h3 class=\"bde-table-of-contents__title toc-ignore\">SCAM ALERTS<\/h3>\n           <\/header>\n  \n  <div class=\"bde-table-of-contents__list\">\n    <nav id=\"bde-toc\" class=\"toc js-breakdance-toc\" aria-label=\"SCAM ALERTS\">There are no headings in this document.<\/nav>\n  <\/div>\n<\/div>\n\n\n<\/div><div class=\"bde-div-127-106 bde-div\">\n  \n  \n\t\n\n\n\n<div class=\"bde-rich-text-127-103 bde-rich-text breakdance-rich-text-styles\">\n<h4>Tips for recognizing and avoiding phishing emails - COVID-19 scams<\/h4><p>Here are some ways to recognize and avoid phishing emails.<\/p><p>Like other\u00a0<a href=\"https:\/\/us.norton.com\/internetsecurity-online-scams-how-to-protect-against-phishing-scams.html\">types of phishing emails<\/a>, the email messages usually try to lure you into clicking on a link or providing personal information that can be used to commit fraud or identity theft. Here\u2019s some tips to avoid getting tricked.<\/p><ul><li><strong>Beware of online requests for personal information.<\/strong>\u00a0A coronavirus-themed email that seeks personal information like identification\u00a0numbers or login information is a phishing scam. Legitimate government agencies won\u2019t ask for that information. Never respond to the email with your personal data.<\/li><li><strong>Check the email address or link.<\/strong>\u00a0You can inspect a link by hovering your mouse button over the URL to see where it leads. Sometimes, it\u2019s obvious the web address is not legitimate. But keep in mind phishers can create links that closely resemble legitimate addresses. Delete the email.<\/li><li><strong>Watch for spelling and grammatical mistakes.<\/strong>\u00a0If an email includes spelling, punctuation, and grammar errors, it\u2019s likely a sign you\u2019ve received a phishing email. Delete it.<\/li><li><strong>Look for generic greetings.<\/strong>\u00a0Phishing emails are unlikely to use your name. Greetings like \u201cDear sir or madam\u201d signal an email is not legitimate.<\/li><li><strong>Avoid emails that insist you act now.<\/strong>\u00a0Phishing emails often try to create a sense of urgency or demand immediate action. The goal is to get you to click on a link and provide personal information \u2014 right now. Instead, delete the message.<\/li><\/ul>\n<\/div>\n<\/div><\/div>\n<\/section><section class=\"bde-section-127-104 bde-section\">\n  \n  \n\t\n\n\n\n<div class=\"section-container\"><div class=\"bde-div-127-107 bde-div\">\n  \n  \n\t\n\n\n\n<div class=\"bde-rich-text-127-105 bde-rich-text breakdance-rich-text-styles\">\n<h4>Scams and frauds<\/h4><p>Scams and frauds are schemes to deceive somebody into paying money or giving away personal information to criminals.\u00a0 There are many different types of scams and frauds.\u00a0<\/p><p>Websites like the\u00a0<a href=\"http:\/\/www.fbi.gov\/scams-safety\/fraud\">Federal Bureau of Investigations<\/a>\u00a0or the\u00a0<a href=\"https:\/\/www.consumerprotection.govt.nz\/general-help\/scamwatch\">New Zealand Consumer Affairs<\/a>\u00a0give further explanation and details about different types of scams.<\/p><p>Some indicators which may alert you to a scam or fraud are:<\/p><ul><li><u>Unsolicited Contact<\/u>\u00a0- the con-artist will contact you first with the intention of pitching some type of opportunity to you or attempting to coax personal details, such as your bank account details.<\/li><\/ul><ul><li><u>High Pressure Sales Techniques<\/u>\u00a0\u2013 the fraudster will try and create the situation where you make impulsive decisions without adequately considering the facts and risks.<\/li><\/ul><ul><li><u>Limited Opportunities<\/u>\u00a0\u2013 some scams work by making you feel that you are getting a special deal or joining an elite group of people with specialised information.\u00a0 This can be used to appeal to our innate sense of greed and vanity, or to force quick decision making on the part of the victim.<\/li><\/ul><ul><li><u>Personal Information Required<\/u>\u00a0\u2013 there are few legitimate business situations which require you to provide details such as Personal Identification Numbers (PIN), passwords, credit card details etc.\u00a0 Fraudsters sometimes pose as banks and credit card providers in the hopes of getting information to steal your identity and commit further frauds.<\/li><\/ul><ul><li><u>Guarantees, High Returns, No Risks<\/u>\u00a0\u2013 most scams use promises of high returns, little or no risks and guarantees of riches, to dupe people into parting with their money.\u00a0 In truth, in most financial circumstances the higher the return the higher the risks and there never can be a guarantee that it will not fail.<\/li><\/ul><ul><li><u>Keep it Secret<\/u>\u00a0 - as part of a number of fraudulent schemes you will be told to refrain from telling others of the proposed arrangement.\u00a0 This is often seen in lottery scams even though your winning ticket was supposedly issued to you as part of a promotional exercise.\u00a0 This is to stop you from approaching others or researching the facts and discovering that it is a fraud.<\/li><\/ul><ul><li><u>Spelling and Grammatical Mistakes<\/u>\u00a0\u2013 some fraudsters will deliberately provide material such as letters or emails which are poorly written.\u00a0 This is to make the victim think that he or she is superior or cleverer than the fraudster and therefore less likely to be defrauded by them.<\/li><\/ul><ul><li><u>Huge Rewards Offered But Payments Required First<\/u>\u00a0\u2013 a number of schemes offer huge financial rewards to \u201chook\u201d the victim.\u00a0 The fraudster will then come up with a number of obstacles which, before the riches can be obtained, require the victim to pay money to overcome.\u00a0 The fraudster will claim that this is to pay taxes, freight charges, bribes for foreign officials etc and at first may be for quite small amounts.\u00a0 It is human nature that once some payments have been made by us it is harder for us to walk away from something.\u00a0 These fees will increase until the victim finally realises that no riches will be paid to them as they do not exist.<\/li><\/ul><p>Remember the old adage that 'if it seems to be too good to be true, it probably is'.\u00a0 Consider carefully what you are getting into, do not be rushed and do your own independent research.\u00a0 Sometimes just putting a name of a person or business into a computer search engine with the word scam after it, can find postings from fraudsters previous victims to alert you.<\/p><p><strong>If you think you are being approached by a fraudster, or have fallen victim to a scam, contact the Police immediately.\u00a0<\/strong><\/p>\n<\/div>\n<\/div><\/div>\n<\/section><section class=\"bde-section-127-112 bde-section\">\n              \n  \n  \n\t\n\n  <div class=\"section-background-overlay\"><\/div>\n\n\n<div class=\"section-container\"><h1 class=\"bde-heading-127-113 bde-heading\">\nBUSINESS EMAIL COMPROMISE\n<\/h1><\/div>\n<\/section><section class=\"bde-section-127-115 bde-section\">\n  \n  \n\t\n\n\n\n<div class=\"section-container\"><div class=\"bde-rich-text-127-116 bde-rich-text breakdance-rich-text-styles\">\n<p>The crime phenomenon of so-called \u201c<strong>Business Email Compromise\u201d (BEC)<\/strong>\u00a0poses a serious threat to businesses\/companies and individuals on a global scale. The phenomenon is also known and labelled as \u201cEmail-Scam\u201d or \u201cCEO-Fraud\u201d and is one of the most prominent cyber threats nowadays. \u00a0<\/p>\n<\/div><div class=\"bde-grid-127-117 bde-grid\">\n  \n  \n\t\n\n\n\n<img decoding=\"async\" class=\"bde-image2-127-118 bde-image2\" src=\"https:\/\/fsc.projectfive.co.ck\/wp-content\/uploads\/2025\/06\/1.jpg\" loading=\"lazy\" srcset=\"https:\/\/fsc.projectfive.co.ck\/wp-content\/uploads\/2025\/06\/1.jpg 1920w, https:\/\/fsc.projectfive.co.ck\/wp-content\/uploads\/2025\/06\/1-300x169.jpg 300w, https:\/\/fsc.projectfive.co.ck\/wp-content\/uploads\/2025\/06\/1-1024x576.jpg 1024w, https:\/\/fsc.projectfive.co.ck\/wp-content\/uploads\/2025\/06\/1-768x432.jpg 768w, https:\/\/fsc.projectfive.co.ck\/wp-content\/uploads\/2025\/06\/1-1536x864.jpg 1536w\" sizes=\"(max-width: 1920px) 100vw, 1920px\"><img decoding=\"async\" class=\"bde-image2-127-119 bde-image2\" src=\"https:\/\/fsc.projectfive.co.ck\/wp-content\/uploads\/2025\/06\/2.jpg\" loading=\"lazy\" srcset=\"https:\/\/fsc.projectfive.co.ck\/wp-content\/uploads\/2025\/06\/2.jpg 1920w, https:\/\/fsc.projectfive.co.ck\/wp-content\/uploads\/2025\/06\/2-300x169.jpg 300w, https:\/\/fsc.projectfive.co.ck\/wp-content\/uploads\/2025\/06\/2-1024x576.jpg 1024w, https:\/\/fsc.projectfive.co.ck\/wp-content\/uploads\/2025\/06\/2-768x432.jpg 768w, https:\/\/fsc.projectfive.co.ck\/wp-content\/uploads\/2025\/06\/2-1536x864.jpg 1536w\" sizes=\"(max-width: 1920px) 100vw, 1920px\"><img decoding=\"async\" class=\"bde-image2-127-120 bde-image2\" src=\"https:\/\/fsc.projectfive.co.ck\/wp-content\/uploads\/2025\/06\/3.jpg\" loading=\"lazy\" srcset=\"https:\/\/fsc.projectfive.co.ck\/wp-content\/uploads\/2025\/06\/3.jpg 1920w, https:\/\/fsc.projectfive.co.ck\/wp-content\/uploads\/2025\/06\/3-300x169.jpg 300w, https:\/\/fsc.projectfive.co.ck\/wp-content\/uploads\/2025\/06\/3-1024x576.jpg 1024w, https:\/\/fsc.projectfive.co.ck\/wp-content\/uploads\/2025\/06\/3-768x432.jpg 768w, https:\/\/fsc.projectfive.co.ck\/wp-content\/uploads\/2025\/06\/3-1536x864.jpg 1536w\" sizes=\"(max-width: 1920px) 100vw, 1920px\"><img decoding=\"async\" class=\"bde-image2-127-121 bde-image2\" src=\"https:\/\/fsc.projectfive.co.ck\/wp-content\/uploads\/2025\/06\/4.jpg\" loading=\"lazy\" srcset=\"https:\/\/fsc.projectfive.co.ck\/wp-content\/uploads\/2025\/06\/4.jpg 1920w, https:\/\/fsc.projectfive.co.ck\/wp-content\/uploads\/2025\/06\/4-300x169.jpg 300w, https:\/\/fsc.projectfive.co.ck\/wp-content\/uploads\/2025\/06\/4-1024x576.jpg 1024w, https:\/\/fsc.projectfive.co.ck\/wp-content\/uploads\/2025\/06\/4-768x432.jpg 768w, https:\/\/fsc.projectfive.co.ck\/wp-content\/uploads\/2025\/06\/4-1536x864.jpg 1536w\" sizes=\"(max-width: 1920px) 100vw, 1920px\"><img decoding=\"async\" class=\"bde-image2-127-122 bde-image2\" src=\"https:\/\/fsc.projectfive.co.ck\/wp-content\/uploads\/2025\/06\/5.jpg\" loading=\"lazy\" srcset=\"https:\/\/fsc.projectfive.co.ck\/wp-content\/uploads\/2025\/06\/5.jpg 1920w, https:\/\/fsc.projectfive.co.ck\/wp-content\/uploads\/2025\/06\/5-300x169.jpg 300w, https:\/\/fsc.projectfive.co.ck\/wp-content\/uploads\/2025\/06\/5-1024x576.jpg 1024w, https:\/\/fsc.projectfive.co.ck\/wp-content\/uploads\/2025\/06\/5-768x432.jpg 768w, https:\/\/fsc.projectfive.co.ck\/wp-content\/uploads\/2025\/06\/5-1536x864.jpg 1536w\" sizes=\"(max-width: 1920px) 100vw, 1920px\"><img decoding=\"async\" class=\"bde-image2-127-123 bde-image2\" src=\"https:\/\/fsc.projectfive.co.ck\/wp-content\/uploads\/2025\/06\/6.jpg\" loading=\"lazy\" srcset=\"https:\/\/fsc.projectfive.co.ck\/wp-content\/uploads\/2025\/06\/6.jpg 1920w, https:\/\/fsc.projectfive.co.ck\/wp-content\/uploads\/2025\/06\/6-300x169.jpg 300w, https:\/\/fsc.projectfive.co.ck\/wp-content\/uploads\/2025\/06\/6-1024x576.jpg 1024w, https:\/\/fsc.projectfive.co.ck\/wp-content\/uploads\/2025\/06\/6-768x432.jpg 768w, https:\/\/fsc.projectfive.co.ck\/wp-content\/uploads\/2025\/06\/6-1536x864.jpg 1536w\" sizes=\"(max-width: 1920px) 100vw, 1920px\"><img decoding=\"async\" class=\"bde-image2-127-124 bde-image2\" src=\"https:\/\/fsc.projectfive.co.ck\/wp-content\/uploads\/2025\/06\/8.jpg\" loading=\"lazy\" srcset=\"https:\/\/fsc.projectfive.co.ck\/wp-content\/uploads\/2025\/06\/8.jpg 1920w, https:\/\/fsc.projectfive.co.ck\/wp-content\/uploads\/2025\/06\/8-300x169.jpg 300w, https:\/\/fsc.projectfive.co.ck\/wp-content\/uploads\/2025\/06\/8-1024x576.jpg 1024w, https:\/\/fsc.projectfive.co.ck\/wp-content\/uploads\/2025\/06\/8-768x432.jpg 768w, https:\/\/fsc.projectfive.co.ck\/wp-content\/uploads\/2025\/06\/8-1536x864.jpg 1536w\" sizes=\"(max-width: 1920px) 100vw, 1920px\"><img decoding=\"async\" class=\"bde-image2-127-125 bde-image2\" src=\"https:\/\/fsc.projectfive.co.ck\/wp-content\/uploads\/2025\/06\/9.jpg\" loading=\"lazy\" srcset=\"https:\/\/fsc.projectfive.co.ck\/wp-content\/uploads\/2025\/06\/9.jpg 1920w, https:\/\/fsc.projectfive.co.ck\/wp-content\/uploads\/2025\/06\/9-300x169.jpg 300w, https:\/\/fsc.projectfive.co.ck\/wp-content\/uploads\/2025\/06\/9-1024x576.jpg 1024w, https:\/\/fsc.projectfive.co.ck\/wp-content\/uploads\/2025\/06\/9-768x432.jpg 768w, https:\/\/fsc.projectfive.co.ck\/wp-content\/uploads\/2025\/06\/9-1536x864.jpg 1536w\" sizes=\"(max-width: 1920px) 100vw, 1920px\">\n<\/div><\/div>\n<\/section>","protected":false},"excerpt":{"rendered":"<p>SCAM SCAM ALERTS There are no headings in this document. Tips for recognizing and avoiding phishing emails &#8211; COVID-19 scamsHere are some ways to recognize and avoid phishing emails.Like other\u00a0types of phishing emails, the email messages usually try to lure you into clicking on a link or providing personal information that can be used to [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_breakdance_hide_in_design_set":false,"_breakdance_tags":"","footnotes":""},"class_list":["post-127","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/fsc.projectfive.co.ck\/index.php?rest_route=\/wp\/v2\/pages\/127","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/fsc.projectfive.co.ck\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/fsc.projectfive.co.ck\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/fsc.projectfive.co.ck\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/fsc.projectfive.co.ck\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=127"}],"version-history":[{"count":15,"href":"https:\/\/fsc.projectfive.co.ck\/index.php?rest_route=\/wp\/v2\/pages\/127\/revisions"}],"predecessor-version":[{"id":499,"href":"https:\/\/fsc.projectfive.co.ck\/index.php?rest_route=\/wp\/v2\/pages\/127\/revisions\/499"}],"wp:attachment":[{"href":"https:\/\/fsc.projectfive.co.ck\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=127"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}