Cybersecurity experts warn of increasingly sophisticated online scams that attackers are using to steal personal information and financial assets. Modern scams include fake online stores, "deepfake" videos, and "phishing" attacks that trick users into signing up.
What online scams are the biggest threat? One of the most common online scams involves sending deceptive messages or emails that convince victims that they need to take immediate action – whether it’s to verify their identity, update their password, or claim a shipment. When a user clicks on a link or enters their information, it immediately falls into the hands of attackers, who then use it to theft of money or identity.
No one is safe online – not experienced users, not young or old individuals, not even businesses and organizations. Cybercriminals are constantly developing new tactics to trick victims and force them into reckless actions that can lead to data misuse, loss of financial assets or even digital identityThat's why it's essential to recognize the most common online scams and learn how to avoid them.
Telekom Slovenije warns that in Cybersecurity and Resilience Center recorded a record number of security incidents (online fraud). Last year, they handled four times as many cases as in 2023, with the growth trend continuing. The main reason for the increased number of attacks is often the carelessness of users who fall for online fraud.
Take the quiz to see how well you would recognize online scams in practice.
The quiz results will give you a clearer picture of how big a threat online scams pose. Quiz participants are entered into a prize draw for new iPhone 16.
Safer Internet Month dedicated to artificial intelligence
In this campaign, Telekom Slovenije Let's enjoy wisely focuses on various digital illusions, such as fake news and fake online stores, online and SMS fishing (phishing and smishing), fake online profiles and deep fakes (deepfakes), which can be created with the help of artificial intelligence. Tips and recommendations for the safe use of technology are available on the platform Let's enjoy wisely.
The most common online scams and how to recognize them
1. Phishing – when fraudsters fish for your information
Phishing is one of the most common online scams, in which attackers use fake emails, SMS messages, or fake websites to try to obtain personal information, passwords, or banking information from victims.
How It Works?
Attackers often send emails that appear to come from an official institution (e.g., a bank, email provider, delivery service). The message warns of an urgent problem – a suspicious purchase, a security issue, or a blocked account – and asks you to take immediate action, such as clicking on a link or entering information.
How to protect yourself?
- Always check the URL of the link – if it doesn't match the official website, don't enter the information.
- Be skeptical of messages that demand immediate action.
- Use two-factor authentication for additional account protection.
2. Grooming – when false friends turn out to be dangerous strangers
Online predators often use social media and online gaming platforms to reach out to younger users. With the help of fake profiles they pose as peers, gain their trust, and then manipulate them into dangerous situations.
How It Works?
Attackers gradually build a relationship with their victims, often through compliments, praise, or gifts. Once they gain their trust, they begin to encourage them to reveal personal information, send photos, or even meet in person.
How to protect yourself?
- Don't share personal information or photos online.
- Be wary of suspicious profiles that have few friends or unclear pictures.
- If you feel uncomfortable communicating online, stop immediately and inform an adult or the competent institutions.
3. Generative Artificial Intelligence – Advanced Tool or Dangerous Trap?
Generative Artificial Intelligence (GenAI) is one of the most advanced technologies today, enabling the creation of text, images, sounds, and even videos that look completely authentic. While AI is incredibly useful in automating tasks and creating content, it can also pose a serious security risk if misused.
How It Works?
GenAI analyzes large amounts of data and generates new content that looks convincing based on learned patterns. The new technology brings many benefits, but it is crucial to be critical of the content when using it. GenAI needs your supervision, otherwise it may pose a risk of spreading misinformation.
How to protect yourself?
- Critically evaluate the information you find online – check the sources!
- Be careful of content that evokes strong emotional responses, as it is often manipulated.
- Don't trust everything you see or hear - generated texts can be misleading.
4. Deepfake – when you can no longer believe your eyes
Deepfakes are digitally manipulated images, videos, or audio recordings created using artificial intelligence. They are often used by attackers to spread false information, fraud, or blackmail.
How It Works?
Attackers use artificial intelligence to create a convincing video in which a person says things they never said or performs actions they never did. Deepfake technology is often used to spread political propaganda, financial fraud, and even personal discrediting of individuals.
How to protect yourself?
- Pay attention to irregularities in your videos – distorted facial features, strange shadows, or uneven lip movement.
- Check sources of information and be skeptical of sensationalist content.
- Use tools to analyze deepfake footage.
5. Fake online stores – tempting offers that can cost you dearly
In the age of online shopping, fake online stores are an increasingly common trap for unsuspecting shoppers. They offer incredibly low prices and exclusive discounts, but the products purchased never arrive or are poor quality counterfeits.
How It Works?
Attackers create professionally designed websites that mimic well-known brands or stores. The buyer makes a payment but never receives the ordered product. In some cases, credit card information is misused for further fraud.
How to protect yourself?
- Always check if the store has real reviews and contact information.
- Check that the web address starts with https:// and that the store has a valid domain.
- Don't trust amazing discounts that seem too good to be true.
6. Sharenting – when parents unintentionally endanger their children
Sharenting is the practice of parents posting photos and information about their children on social media, often without considering the long-term consequences.
How It Works?
Any image or information about a child posted becomes permanently available on the internet. Malicious individuals can use this information for identification, identity theft, or even abuse.
How to protect yourself?
- Limit the visibility of social media posts to a narrow circle of people.
- Do not post information about your child's daily activities, location, or school.
- Before you post something, ask yourself: Would my child be happy if they saw this in 10 years?
7. Play smart – when online games become a hunting ground for scammers
Online games are fun and popular with players of all ages, but they are also a haven for online scammers. Their goal is to obtain financial or personal information from unsuspecting players, so they use a variety of tactics to try to trick them.
How It Works?
Fraudsters often pose as regular players, moderators, or even game developers and use a variety of tactics to scam players, from fake bonuses, gifts, and offers for game improvements to stealing game accounts and manipulating them in a way that builds relationships with players and eventually convinces them to share personal information or even make financial transfers.
How to protect yourself?
- Never share your password or login information with anyone. Official developers and moderators will never ask you for your password.
- Check the authenticity of websites before entering your information. Official developer sites have verified domains and a secure connection (https://).
- Avoid unbelievable offers. If someone is offering “unlimited in-game currency” or “rare items for a small amount,” it’s almost certainly a scam.
- Be aware of suspicious players. If someone is convincing you to do something unusual or trying to obtain your information, end the communication and report the user if necessary.
8. Malware and device attacks
Attackers often use viruses and spyware to gain access to your devices and data.
How It Works?
Infected files are often spread through suspicious links, infected websites, or fake apps. Once a user downloads and opens a malicious file, the attacker can take control of the device.
How to protect yourself?
- Do not download applications from unknown sources.
- Always keep your operating system and security settings up to date.
- Use it Safe web, which automatically blocks dangerous websites.
Always be skeptical online
The internet can be a great tool, but only if used responsibly. Online attackers are becoming increasingly sophisticated and are using tactics – online scams – that can confuse even the most cautious users. That’s why it’s crucial to:
- always check the sources of information,
- do not share personal information with strangers,
- you are skeptical about incredible offers,
- you use security solutions such as Safe web.
With awareness and caution, you can avoid most online scams and maintain your digital security!
You are invited to visit the exhibition about digital illusions
The purpose of the special exhibition, which Telekom Slovenije prepared in cooperation with House of Illusions, is a fun and educational exploration of various digital illusions that both stimulate conversation and raise awareness among internet users of all ages. The exhibition on the topic of safe internet use will be on display at the House of Illusions until the end of February.
In order to raise awareness about online dangers, Telekom Slovenije experts also conduct workshops in primary schools. Let's not fall for the bait.
Advertiser: Telekom Slovenije