{"id":2943,"date":"2023-11-16T05:35:49","date_gmt":"2023-11-16T05:35:49","guid":{"rendered":"https:\/\/matob.web.id\/random\/?p=2943"},"modified":"2023-11-16T05:35:49","modified_gmt":"2023-11-16T05:35:49","slug":"what-is-a-scam-heres-the-full-explanation","status":"publish","type":"post","link":"https:\/\/matob.web.id\/random\/what-is-a-scam-heres-the-full-explanation\/","title":{"rendered":"What is a Scam? Here&#8217;s the Full Explanation!"},"content":{"rendered":"<p><a href=\"https:\/\/matob.web.id\/random\/tips\/what-is-a-scam-heres-the-full-explanation\/\">Scam<\/a> is a crime that continues to run rampant, especially in the digital era.\u00a0In fact,\u00a0<a href=\"https:\/\/www.pwc.com\/id\/en\/media-centre\/press-release\/2020\/english\/global-economic-crime-rates-remain-high-as-customer-fraud-contin.html\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">13% of fraud victims<\/a>\u00a0reported losses of up to USD 50 million.\u00a0You don&#8217;t want to be one of the victims, do you?<\/p>\n<p>Indeed, what\u00a0<em>is<\/em>\u00a0the meaning of a scam?\u00a0And, is there a way to avoid a scam?\u00a0Don&#8217;t worry.\u00a0You will find all the answers in this article.<\/p>\n<p>In fact, we will also divulge the characteristics of the scammer so that you can avoid this crime.<\/p>\n<p>Can not wait?\u00a0Immediately, let&#8217;s see the discussion!<\/p>\n<h2 id=\"h-apa-itu-scam\"><span id=\"Apa_Itu_Scam\"><strong>What is a Scam?<\/strong><\/span><\/h2>\n<p>A scam is a fraudulent attempt made to get something of value from its victims.\u00a0Perpetrators who do scams are called scammers.<\/p>\n<p>There are 2 things that scammers usually target from their victims, namely:<\/p>\n<ul>\n<li><strong>Money<\/strong>\u00a0\u2013 The victim&#8217;s savings in a bank account or\u00a0e-wallet\u00a0.<\/li>\n<li><strong>Information<\/strong>\u00a0\u2013 Any personal information that can be directly misused for the benefit of the scammer.\u00a0It can be in the form of personal information (name, address, and Family Identification Number), account (username and password), and financial (card number and ATM PIN).<\/li>\n<\/ul>\n<p>Recently, scam cases are becoming more and more common.\u00a0In fact, scam victims in Indonesia reach\u00a0<a href=\"https:\/\/www.indonesia-investments.com\/id\/news\/todays-headlines\/online-scams-in-indonesia-26-of-consumers-become-victim-of-fraud\/item6871\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">26%<\/a>\u00a0, the most in the world.<\/p>\n<p>There are various types of crime modes.\u00a0Scam cases that often occur are scammers disguised as parties who are trusted by the victim so that the victim is willing to provide important information to money.<\/p>\n<p>Not only that, there are many types of scams.\u00a0Want to know more?\u00a0Don&#8217;t worry, we will invite you to understand the various scams so that you can get to know more about this crime.\u00a0Scroll down, yes!<\/p>\n<h2 id=\"h-jenis-jenis-scam\"><span id=\"Jenis-Jenis_Scam\"><strong>Types of Scam<\/strong><\/span><\/h2>\n<p>The following are the types of scams that you should know about:<\/p>\n<h3 id=\"h-1-donation-scam\"><span id=\"1_Donation_Scam\"><strong>1. Donation Scam<\/strong><\/span><\/h3>\n<p>A donation scam is a type of scam that asks for donations, but the money earned is misused for personal gain.\u00a0Donation scam perpetrators are generally quite clever in taking advantage of the compassion and sympathy of the victims.<\/p>\n<p>Take, for example, the recent donation scam on Twitter about animal rescue.<\/p>\n<p>The perpetrator claimed to have found an injured animal.\u00a0Under the pretext of raising donations to cover the cost of veterinary treatment, the aid funds were instead misused for personal purposes.<\/p>\n<p>After receiving the donation money, the perpetrator immediately deletes the account to avoid donors who ask for clarity on the money that has been donated.<\/p>\n<h3 id=\"h-2-survey-scam\"><span id=\"2_Survey_Scam\"><strong>2. Survey Scam<\/strong><\/span><\/h3>\n<p>Survey scam is a fraudulent way of imitating official surveys to get the victim&#8217;s personal information.<\/p>\n<p>Generally, scammers will promise prizes as a lure so that victims want to fill out surveys.\u00a0In fact, the company is not currently conducting the survey, and the prizes offered are only to attract the attention of the victims.<\/p>\n<p>For example, to get personal data of victims, scammers take advantage of the pandemic moment to spread\u00a0<a href=\"https:\/\/www.justice.gov\/opa\/pr\/justice-department-warns-about-fake-post-vaccine-survey-scams\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">fake surveys about the effects of vaccines<\/a>\u00a0.<\/p>\n<h3 id=\"h-3-cold-call-scam\"><span id=\"3_Cold_Call_Scam\"><strong>3. Cold Call Scam<\/strong><\/span><\/h3>\n<p>Cold call scam is a fraudulent technique via telephone by pretending to be a certain party, such as the police, companies, and even close relatives.\u00a0Perpetrators will manipulate victims so that they will follow the scammer&#8217;s wishes.<\/p>\n<p>For example, the caller claims to be Customer Service of a bank that offers victims to become priority customers on condition that they pay certain fees.<\/p>\n<h3 id=\"h-4-phising\"><span id=\"4_Phising\"><strong>4. Phishing<\/strong><\/span><\/h3>\n<p>Phishing\u00a0is a type of scam that lures victims into voluntarily providing personal information without them knowing it.<\/p>\n<p>In the case of a fraud that had gone viral, the perpetrator made an advertisement to capture the victim.\u00a0The victim is asked to update the mobile banking application.<\/p>\n<p>After filling in the data and clicking submit, all the victim&#8217;s information is successfully owned by the perpetrator.\u00a0Not only that, in this case the perpetrator sucked up the account balance and even took over the victim&#8217;s Instagram account.<\/p>\n<h3 id=\"h-5-love-scam\"><span id=\"5_Love_Scam\"><strong>5. Love Scam<\/strong><\/span><\/h3>\n<p>A love scam is a fraudulent act in which the perpetrator takes advantage of someone who is looking for a partner.\u00a0Usually, the perpetrator will create a fake identity on the dating app.<\/p>\n<p>These love scammers will play with the victim&#8217;s emotions so that they will do what the perpetrator asks.\u00a0Scammers may send some money to the victim&#8217;s account and ask you to send the money to another account for money laundering.<\/p>\n<p>Even though you are a victim, you still have to deal with trials, which of course cost you time, energy, and costs.<\/p>\n<p>Well, before heading to the characteristics of scammers and tips on how to avoid scammers, let&#8217;s first learn how scammers work.<\/p>\n<h2 id=\"h-cara-kerja-scammer\"><span id=\"Cara_Kerja_Scammer\"><strong>How Scammers Work<\/strong><\/span><\/h2>\n<p>Although there are several types, generally the way scammers work is by taking advantage of the victim&#8217;s negligence.\u00a0So, in launching the action, the scammer will take the following steps:<\/p>\n<ul>\n<li>Scammers target victims according to the scam attempts made.<\/li>\n<li>Scammers communicate directly with victims, or use media such as surveys or advertisements related to victims.<\/li>\n<li>Victims who are careless will follow the instructions given because they consider it a natural thing, not a scam.<\/li>\n<li>The scammer managed to carry out the action and get the victim&#8217;s money or personal information to be used further according to the scammer&#8217;s wishes.<\/li>\n<\/ul>\n<p>After knowing how scam actors work, now let&#8217;s look at the complete explanation of the characteristics of scammers that you should be aware of.<\/p>\n<h2 id=\"h-ciri-ciri-scammer\"><span id=\"Ciri-ciri_Scammer\"><strong>Features of Scammers<\/strong><\/span><\/h2>\n<p>As a precautionary measure, you need to know what are the characteristics of the following scammers:<\/p>\n<h3 id=\"h-1-berpura-pura-menjadi-pihak-yang-anda-kenal\"><span id=\"1_Berpura-pura_Menjadi_Pihak_yang_Anda_Kenal\"><strong>1.\u00a0<\/strong><strong>Pretend To Be Someone You Know<\/strong><\/span><\/h3>\n<p>Scammers will try to build your trust by pretending to be authorities, well-known companies, co-workers, and even relatives.\u00a0That way, victims who are not careful will be easily tricked.<\/p>\n<h3 id=\"h-2-menawarkan-hadiah-menarik\"><span id=\"2_Menawarkan_Hadiah_Menarik\"><strong>2. Offer Attractive Prizes<\/strong><\/span><\/h3>\n<p>The characteristics of scammers that are often encountered are offering super tempting prizes.\u00a0For example, stating someone won a lottery which ultimately asks that person to send some money.<\/p>\n<h3 id=\"h-3-meminta-data-yang-sensitif\"><span id=\"3_Meminta_Data_yang_Sensitif\"><strong>3. Requesting Sensitive Data<\/strong><\/span><\/h3>\n<p>Generally, scammers will attempt to request sensitive data.\u00a0Because this data can be used for online loan verification processes, taking over accounts, and draining account balances.<\/p>\n<p>A trusted company or organization of course already has complete data about you.\u00a0So, you should be wary if you are asked to provide sensitive data such as credit card numbers or bank account PINs.\u00a0It could be an act of fraud!<\/p>\n<h3 id=\"h-4-memberi-instruksi-agar-anda-bertindak-cepat\"><span id=\"4_Memberi_Instruksi_Agar_Anda_Bertindak_Cepat\"><strong>4. Instructing You to Act Quickly<\/strong><\/span><\/h3>\n<p>Scammers are good at playing with the emotions of their potential victims by setting tight deadlines. Whether it&#8217;s when they have to send a sum of money, or when they ask for complete personal information.<\/p>\n<p>This is what makes scamming victims feel panicked and can&#8217;t think long enough to follow every whim of the fraudster.<\/p>\n<h3 id=\"h-5-mengharuskan-anda-melakukan-pembayaran\"><span id=\"5_Mengharuskan_Anda_Melakukan_Pembayaran\"><strong>5. Requires You to Make Payments<\/strong><\/span><\/h3>\n<p>The last characteristic of a scammer is asking you to pay a certain amount of money.<\/p>\n<p>You will be given instructions to transfer money to the perpetrator&#8217;s personal account for various reasons.\u00a0It can be on the pretext of paying for postage, taxes, and much more.<\/p>\n<p>Therefore, from now on, observe the characteristics of scammers to be more careful with this crime!<\/p>\n<h2 id=\"h-6-tips-cara-menghindari-scam\"><span id=\"6_Tips_Cara_Menghindari_Scam\"><strong>6 Tips on How to Avoid Scam<\/strong><\/span><\/h2>\n<p>Scams can happen to anyone, including you.\u00a0In order not to become a victim of a scam, try applying some of these tips on how to avoid the following scams:<\/p>\n<h3 id=\"h-1-pastikan-kredibilitas-pihak-yang-menghubungi-anda\"><span id=\"1_Pastikan_Kredibilitas_Pihak_yang_Menghubungi_Anda\"><strong>1. Ensure the Credibility of the Party Contacting You<\/strong><\/span><\/h3>\n<p>You can take this verification step according to the platform where you received information that has the potential to be a scam, including:<\/p>\n<ul>\n<li><strong>Telephone<\/strong>\u00a0\u2013 If you get a call from a person claiming to be a representative of a company or organization, make sure first whether the contact contacting you is official or not.<\/li>\n<li><strong>Email<\/strong>\u00a0\u2013 Not only see the sender&#8217;s name, but also make sure the sender&#8217;s email address is an official email.\u00a0The trick, check the\u00a0email\u00a0domain used.\u00a0For example, Niagahoster uses the email address @niagahoster.co.id, according to the website&#8217;s domain, namely niagahoster.co.id.<\/li>\n<li><strong>Social media<\/strong>\u00a0\u2013 Make sure the social media account of the party contacting you is verified which is marked with a blue tick.\u00a0Or, you can also confirm the contact on the official website of the party who contacted you.\u00a0If the information is not the same, you should remain vigilant.<\/li>\n<\/ul>\n<h3 id=\"h-2-jangan-mudah-tergiur\"><span id=\"2_Jangan_Mudah_Tergiur\"><strong>2. Don&#8217;t be easily tempted<\/strong><\/span><\/h3>\n<p>Getting a windfall is certainly everyone&#8217;s desire.\u00a0However, if someone offers a bombastic gift or tends to be unreasonable, you should be suspicious.\u00a0Especially if in the end the party asks for money in advance for various reasons.\u00a0Be careful, ok!<\/p>\n<p>For that, don&#8217;t be easily tempted by offers that promise big profits.\u00a0Usually, this is just a scammer&#8217;s trick.<\/p>\n<h3 id=\"h-3-hati-hati-saat-akan-membagikan-informasi-personal\"><span id=\"3_Hati-Hati_Saat_Akan_Membagikan_Informasi_Personal\"><strong>3. Be careful when sharing personal information<\/strong><\/span><\/h3>\n<p>One of the goals of the scam is to get the victim&#8217;s personal information.\u00a0Later, this information can be misused for various negative things.\u00a0For example, fraud in your name, buying and selling data, to making online loans using your identity.<\/p>\n<p>Therefore, you need to be careful when sharing personal information.\u00a0Tips, only provide your personal information on official and trusted websites or platforms.<\/p>\n<h3 id=\"h-4-tidak-asal-klik-link-yang-diterima\"><span id=\"4_Tidak_Asal_Klik_Link_yang_Diterima\"><strong>4. Don&#8217;t Just Click the Link Received<\/strong><\/span><\/h3>\n<p>There are many ways that scammers use to carry out their actions.\u00a0One of them is by providing a link that directs the victim to a prepared scam website.<\/p>\n<p>So, first make sure the link you receive is safe.\u00a0The trick, hover over the link without being clicked.\u00a0Later, the URL information of the link will appear.\u00a0If the link doesn&#8217;t lead to the official website, don&#8217;t click on the link.<\/p>\n<h3 id=\"h-5-aktifkan-2-factor-authenticator\"><span id=\"5_Aktifkan_2-Factor_Authenticator\"><strong>5. Activate 2-Factor Authenticator<\/strong><\/span><\/h3>\n<p>Two-Factor Authentication (2FA) is a\u00a0cyber crime\u00a0security method\u00a0that allows websites to verify users with a unique code generated in real-time.\u00a0Generally, it will be sent to the registered email or mobile number.\u00a0So, only the person concerned will receive it.<\/p>\n<p>So, if you want to ensure the security of your account, always enable 2FA, yes.\u00a0Because, if a scammer has found your username and password but cannot enter the 2FA code, the scammer will not be able to continue the login process.<\/p>\n<h3 id=\"h-6-buat-password-yang-unik\"><span id=\"6_Buat_Password_yang_Unik\"><strong>6. Create a Unique Password<\/strong><\/span><\/h3>\n<p>If you are still creating a password that contains your date of birth, you should change it now.\u00a0The reason is, passwords such as date of birth or phone number are very easy to guess.\u00a0As a result, it doesn&#8217;t take long for scammers to guess the password to log into your account.<\/p>\n<p>Tips, create a password with a combination of numbers, letters, and symbols.\u00a0Well, if you have trouble remembering your password, you can use the help of\u00a0a password manager\u00a0like LastPass or NordPass.<\/p>\n<h2 id=\"h-jadi-apa-itu-scam\"><span id=\"Jadi_Apa_Itu_Scam\"><strong>So, What is a Scam?<\/strong><\/span><\/h2>\n<p>Scam is a mode of fraud that takes advantage of the victim&#8217;s negligence for profit.\u00a0The types of fraud are also increasingly diverse, there are donation scams, survey scams, cold call scams, phishing scams, and love scams.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Scam is a crime that continues to run rampant, especially in the digital era.\u00a0In fact,\u00a013% of fraud victims\u00a0reported losses of up to USD 50 million.\u00a0You don&#8217;t want to be one of the victims, do you? Indeed, what\u00a0is\u00a0the meaning of a scam?\u00a0And, is there a way to avoid a scam?\u00a0Don&#8217;t worry.\u00a0You will find all the answers [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":2944,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[2],"tags":[],"class_list":["post-2943","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-2"],"_links":{"self":[{"href":"https:\/\/matob.web.id\/random\/wp-json\/wp\/v2\/posts\/2943","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/matob.web.id\/random\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/matob.web.id\/random\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/matob.web.id\/random\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/matob.web.id\/random\/wp-json\/wp\/v2\/comments?post=2943"}],"version-history":[{"count":2,"href":"https:\/\/matob.web.id\/random\/wp-json\/wp\/v2\/posts\/2943\/revisions"}],"predecessor-version":[{"id":2946,"href":"https:\/\/matob.web.id\/random\/wp-json\/wp\/v2\/posts\/2943\/revisions\/2946"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/matob.web.id\/random\/wp-json\/wp\/v2\/media\/2944"}],"wp:attachment":[{"href":"https:\/\/matob.web.id\/random\/wp-json\/wp\/v2\/media?parent=2943"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/matob.web.id\/random\/wp-json\/wp\/v2\/categories?post=2943"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/matob.web.id\/random\/wp-json\/wp\/v2\/tags?post=2943"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}