Monday, October 31, 2016

Predators In Your Personal Space And How To Kick Their Butts!

Last week I posted about trust and law enforcement and the on goings of criminals who take advantage of "our" trusting nature.  Today, we are going to learn about scams that occur behind closed doors in our homes and offices that are not so easily detected such that of an idiot trying to impersonate a police officer without a holster for the gun he carries or proper identification on his person or alleged cruiser.

Let us not forget to thank those who serve with all of their heart and soul in order to protect society and our country!

In the U.S. alone, according to, 78% of people use social media.  Are you among the millions who has a Facebook page, Twitter account, or post on Instagram?   You are probably included in the majority of people who have their cell phone in their hand when driving, in a long line, or in a Doctors' office waiting room. Yes?  No?   So what if we love social media!  A lot of us use it for business purposes and to keep in touch with those that live far away.  I am thankful for social media, Facebook and LinkedIn rock!  But, are you aware of social media scams?  Here they are and how to kick their butts!  Please share with your friends and family so they are armed with the information that may prevent them from becoming a statistic.  I will be posting more about this in the coming weeks.

1.  Hidden URL's (Uniform Resource Locator)

Bait:  Shortened URL's.
Those with bad intention will use a shorter url in order to hide the full location to where you will be directed.  You may be directed to where you hope to go or to a world where malware is installed on your computer. Malware is software that is intended to damage and, in some cases, disable your computer.  People create malware and viruses for the sake of pissing people off, people they don't know or can visually watch the struggle as it takes place, and sometimes they do it to hijack your personal information.  These people have nothing better to do than cause others' harm for absolutely no reason at all.  Sociopaths are narcissistic and function without a conscience giving them the emotional freedom to lie, cheat, and steal.  They are intelligent and manipulative.  Perhaps those creating malware and viruses are Sociopaths that have nothing else better to do.  They create adds on your Facebook page or somewhere on the internet that manipulate you into clicking on the link.  After clicking on the link they pretty much have you where they want you.

IE:  Shorter url (although safe because it's mine ;-)):
       Full Location url:

Solution:  A good butt kicking is anti-virus and anti-spyware installed on your computer.

2.  Phishing Requests

Bait:  Personal remarks on your social media page or through an email that appear to be from people you know.

 Once you click on the link it takes you to a fake landing page created by a phisher in order to steal your log-in information.  IE: when you click on the link it directs you to a social media page that you have a sign in for.  The page seems legitimate where you type in your log-in information.

IE:  I do not have an example because that would require me to send you to a fake page that may cause harm to you or your computer.

Solution:  Kick some ass with Anti-Phishing defenses.

I do not endorse software but if you search online for the bold keywords in this posting you will find several methods that can protect you and your computers.

Next week:  More scams

Knowledge is power!  Arm yourself with information and share with your friends and family.  

Book me to speak at your next business meeting or event.  Get your wake-up call through my audience participation speaking presentations and learn through some of my most compelling cases, statistics, and facts about the art of lying, scams, and how to protect yourself in today's society at work, home, and school and much more!  Visit my website for helpful tips and free resources used by Private Investigators that you can use at home. 

Thank you for your continued support! - Cheryl D. Ring, The PI Speaker

No comments:

Post a Comment