Common Scams

There are many different types of online scams that are designed to steal your money, identity, credentials, and other sensitive information. Though some of these scams seem very different from the others, most scams share several common red flags. Click one of the topics below to learn more about how these scams work, and how to protect yourself and others from them!

  • In this type of scam, scammers send deceptive emails that appear to be legitimate transaction confirmations from legitimate companies. In scams that target Kent State, the most commonly impersonated company on an invoice tends to be Geek Squad. However, any legitimate business can be impersonated in this scam. These emails typically include details about an immediate subscription renewal or an order that you have no knowledge of.

    (Click to enlarge)

  • A frequently-reported scam targeting Kent State is the job offer scam. In this scam, a very tempting job is offered to you in exchange for your account's password or your personal information. The FTC reported that, in 2024, over $500 million was lost to scams of this nature. This type of scam has also recently increased in popularity in the United States amidst a rapidly-changing job market. Read on to learn how this scam works, what the attackers are after, and how to avoid falling victim to the scammers!

     

    How It Works

  • File sharing phishing emails are very common. This scam utilizes services such as Google Drive or Microsoft OneDrive to share a file with you. This file will have an important-sounding name, often involving payroll or employee benefits. The scammer will also use an account with an email address that sounds as if it might belong to the university's payroll team, HR department, and other administrative offices. The goal is to get you to click the link and open the file, then complete the tasks within. Read on to learn what these phishing emails look like, what is contained within the shared f

  • Scammers are always trying to create new tactics to use against their targets. A recent phishing scam that has targeted Kent State University is the financial aid phish. This scam claims that you have unclaimed financial aid or refunds, but you won't receive the money until you verify some of your sensitive personal information. In this article, you will learn how this scam works, how to recognize it, and what to do if you encounter one.

     

    How Does This Scam Work?

  • In today's digital age, scams and phishing attempts have become increasingly sophisticated and prevalent. Cybercriminals are quick to adapt their tactics to lure unsuspecting victims into their traps, and one common ruse is impersonating trusted courier services such as the USPS, UPS, FedEx and DHL. These scams are usually executed through text messages or emails, and it's essential to be aware of the red flags and know how to protect yourself.

     

    How it works

    Scammers will often use text messages and emails to impersonat

  • Are You Available?

    The "Are You Available?" scam falls in the category of phishing techniques that do not rely on tricking you into clicking on a link. Instead, the scammer wants you to reply with some kind of valuable information.

     

    How it Works

    You receive an email that appears to have come from your supervisor, or an executive. They are asking you a seemingly innocuous question such as:

    1. "Are you available right now?"
    2. “Send me your available cell number.”
    3. "Can you run a quick errand for me?"
    4. "I have a request I need you t
  • You'd better watch out! 'Tis the season for scams.

    HOLIDAY SCAMS ON THE NAUGHTY LIST:

    It's always a scramble to find the perfect gift in time for the holidays. Keep in mind - just like the Grinch sitting high up on his mountaintop keeping his eyes on the little town of Whoville, cyber criminals are watching and ready to scam you! Many of us will sh

  •  

     

    One of the most impressive and well-known technologies of recent years is artificial intelligence (AI). AI models have evolved into robust tools that can be used to generate text, images, audio, and even videos. But as technology continues to evolve, so do the concerns around using it. In this article, you will learn about the dangers of misusing AI models, and how scammers can use artificial intelligence for malicious purposes. You will also learn several techniq

  • Phishing attempts are often after your personal information. This is typically in order to more easily commit other crimes, or to engage in fraud against you. Scammers will come up with elaborate strategies in order to steal money or financial information from you.

     

    Tutoring Scam

    The tutoring scam will often target professors and graduate students who teach math or music. The scam will often begin by asking for available times and a price. Usually, the scammer will say that their son/daughter is in the 7th or 8th grade and needs tutoring for algebra or a musical in