Scams have been around for decades. They are techniques that fraudsters use to con you out of your money. The reason that they have been around for such a long time is because they are an effective way to bilk billions of dollars out of consumers pockets every year with very little chance of getting caught.\nHere are some of the most popular ones so you can be on the lookout for them.\nTickets\nEspecially at the time of year when there are important Pro or college sports playoff games, websites pop up that offer the best seats at what appears to be normal prices. The creators of the websites not only don’t have the tickets but they will go so far as to create a meeting place to hand over the tickets-after you paid for them of course. Craigslist is notorious for this kind of phony ticket selling.\nID Fraud\nPeople who do not have protection for their computers, have been likened to homeowners who leave their front door open. ID fraud is the fastest growing white-collar crime in the world. Fraudsters use a variety of techniques to get you to reveal your personal information. A good example is a phone call or email from someone at your bank claiming that your account has been compromised in some way and that in order for it to get fixed you need to confirm your personal data. It goes downhill from there.\nAdvance Fee Scam\nThis scam has been around for a long time and can be done by phone, email or snail mail. It boldly announces that you have won a prize in a lottery and that you need to pay X number of dollars up front to release the prize. Of course there is no prize.\nNatural Disaster Scheme\nThere were over 800 natural disasters around the world last year. They are all heartbreaking, gut wrenching experiences for the thousands of victims. Scam artists prey on the sensitivity and generosity of people to donate money for their relief. This can be done by phone or email. The fact is that legitimate relief agencies never solicit donations over the phone or by email.\nPhishing\nAccording to Wikipedia “Phishing is the act of attempting to acquire information such as usernames, passwords, and credit card details (and sometimes, indirectly, money) by masquerading as a trustworthy entity in an electronic communication.” These can look like they come from banks, popular social websites, auction sites such as eBay or online payment processors. They frequently contain links that are infected with malware.\nUnfortunately, many of these techniques are aimed at senior citizens who tend to be very gullible. In general you should avoid ever sharing personal data on social websites and be suspicious of anything that sounds too good to be true. You will keep much more of your hard-earned money instead of losing it to hucksters.\nOur Identity Theft Prevention products can help you protect your identity from being stolen.\nSince so many scams are perpetrated on seniors by phone, this Cell Phone Recorder can help document the incident for evidence if a crime is committed.