{"id":6424,"date":"2023-02-27T10:43:15","date_gmt":"2023-02-27T08:43:15","guid":{"rendered":"https:\/\/blog.eset.ee\/?p=6424"},"modified":"2023-11-24T17:27:10","modified_gmt":"2023-11-24T15:27:10","slug":"10-signs-that-scammers-have-you-in-their-sights","status":"publish","type":"post","link":"https:\/\/blog.eset.ee\/et\/en\/2023\/02\/27\/10-signs-that-scammers-have-you-in-their-sights\/","title":{"rendered":"10 signs that scammers have you in their sights"},"content":{"rendered":"\n<p>We all spend so much of our time online these days. It\u2019s estimated that the&nbsp;<a href=\"https:\/\/explodingtopics.com\/blog\/screen-time-stats\">average adult spends<\/a>&nbsp;the best part of seven hours per day glued to their screens. When we\u2019re finished with work, we\u2019re hitting up our apps to watch TV, do our online banking, play games, socialize with friends \u2013 even visit the doctor.<\/p>\n\n\n\n<p>Cybercriminals and fraudsters know all this. They know we\u2019re comfortable with digital interactions, and that we routinely hand over personal and financial information to the organizations we interact with online. And they\u2019ve devised a variety of ways to get ahold of that info, and our hard-earned cash.<\/p>\n\n\n\n<p>This is where we all need to get a bit more digital savvy. By learning what typical tactics the bad guys use, we can stay safer online and keep our personal data and money under lock and key.<\/p>\n\n\n\n<p>We\u2019ve rounded up 10 of the most common warning signs that should set your alarm bells ringing.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">1. The message is unsolicited<\/h3>\n\n\n\n<p>These are the\u00a0<a href=\"https:\/\/www.eset.com\/uk\/types-of-cyber-threats\/phishing\/?utm_source=welivesecurity.com&amp;utm_medium=referral&amp;utm_campaign=autotagging&amp;utm_content=scams&amp;utm_term=en\">classic phishing<\/a>\u00a0emails or even texts (<a href=\"https:\/\/www.welivesecurity.com\/2021\/01\/22\/why-do-we-fall-sms-phishing-scams-so-easily\/\">smishing<\/a>) that form the basis of many fraud and cybercrime attacks. There is an almost limitless variety of themes, but phishing generally works via\u00a0<a href=\"https:\/\/www.welivesecurity.com\/2015\/12\/30\/5-things-need-know-social-engineering\/\">social engineering<\/a>, a way that fraudsters trick victims into doing their bidding \u2013 for example by forcing them into making a rushed decision, and\/or pretending to be a representative from a reputable organization like the government, a tech vendor or bank. The end goal is usually to steal logins and personal and financial information, or get you to\u00a0<a href=\"https:\/\/www.welivesecurity.com\/2020\/12\/23\/7-ways-malware-can-get-your-device\/\">unwittingly download malware<\/a>\u00a0onto your device.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"660\" height=\"651\" src=\"https:\/\/blog.eset.ee\/wp-content\/uploads\/2023\/02\/An-example-of-a-spammed-email-alert.png\" alt=\"\" class=\"wp-image-6425\" srcset=\"https:\/\/blog.eset.ee\/wp-content\/uploads\/2023\/02\/An-example-of-a-spammed-email-alert.png 660w, https:\/\/blog.eset.ee\/wp-content\/uploads\/2023\/02\/An-example-of-a-spammed-email-alert-130x128.png 130w\" sizes=\"auto, (max-width: 660px) 100vw, 660px\" \/><\/figure>\n\n\n\n<p><a  href=\"https:\/\/www.welivesecurity.com\/wp-content\/uploads\/2023\/02\/An-example-of-a-spammed-email-alert.png\" data-rel=\"lightbox-gallery-0\" data-rl_title=\"\" data-rl_caption=\"\" data-magnific_type=\"gallery\" title=\"\"><\/a><em>Fake email notification<\/em><\/p>\n\n\n\n<h3 class=\"wp-block-heading\">2. They call you out of the blue<\/h3>\n\n\n\n<p>Also known as voice phishing, or&nbsp;<a href=\"https:\/\/www.welivesecurity.com\/2021\/06\/14\/vishing-what-is-it-how-avoid-getting-scammed\/\" target=\"_blank\" rel=\"noreferrer noopener\">\u201cvishing\u201d<\/a>, scam calls are on the rise.&nbsp;<a href=\"https:\/\/www.darkreading.com\/attacks-breaches\/vishing-attacks-reach-all-time-high-according-to-latest-agari-and-phishlabs-report\" target=\"_blank\" rel=\"noreferrer noopener\">One report<\/a>&nbsp;claimed they surged 550% in volume year-on-year in Q1 2022. Fraudsters often use these calls as part of a multi-stage phishing attack, with victims tricked into calling the number via a scam email. These \u201chybrid\u201d vishing campaigns now number 26% of all vishing calls. Popular tactics include cold-calling victims pretending, for example, that something is wrong with their computer (<a href=\"https:\/\/www.welivesecurity.com\/2015\/04\/14\/tech-support-scammers-teeth\/\" target=\"_blank\" rel=\"noreferrer noopener\">tech support fraud<\/a>) or that there is something wrong with any of your valuable online accounts, i.e., typically those containing your personal and financial data.<audio preload=\"none\"><\/audio><audio preload=\"none\"><\/audio><\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"470\" height=\"522\" src=\"https:\/\/blog.eset.ee\/wp-content\/uploads\/2023\/02\/vishing-scam-example.jpg\" alt=\"\" class=\"wp-image-6428\" srcset=\"https:\/\/blog.eset.ee\/wp-content\/uploads\/2023\/02\/vishing-scam-example.jpg 470w, https:\/\/blog.eset.ee\/wp-content\/uploads\/2023\/02\/vishing-scam-example-115x128.jpg 115w\" sizes=\"auto, (max-width: 470px) 100vw, 470px\" \/><\/figure>\n\n\n\n<p><a  href=\"https:\/\/www.welivesecurity.com\/wp-content\/uploads\/2023\/02\/vishing-scam-example.jpg\" data-rel=\"lightbox-gallery-0\" data-rl_title=\"\" data-rl_caption=\"\" data-magnific_type=\"gallery\" title=\"\"><\/a><\/p>\n\n\n\n<p><em>Transcript of another vishing voicemail message (source: Twitter)<\/em><\/p>\n\n\n\n<h3 class=\"wp-block-heading\">3. You\u2019re being rushed into action<\/h3>\n\n\n\n<p>This is a common tactic used in social engineering and phishing attacks, designed to pressure the victim into making a rash decision. It could be a prize draw that\u2019s about to end. It could be a fake delivery notice which says the item will be returned to sender unless a tax is paid. The idea is to force that user into opening a malicious attachment, clicking on a malicious link and\/or entering their personal details.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">4. Something doesn\u2019t feel right<\/h3>\n\n\n\n<p>While fraudsters are working hard to sound more convincing and are bound to&nbsp;<a href=\"https:\/\/www.welivesecurity.com\/2023\/02\/14\/chatgpt-will-you-be-my-valentine\/\" target=\"_blank\" rel=\"noreferrer noopener\">co-opt tools such as ChatGPT for their own ends<\/a>, don\u2019t expect all social engineering scams to suddenly use perfect English. In other words, if an email message was sent from a free email service such as Gmail, it opens with a generic salutation like \u201cDear client\u201d and\/or is laden with grammar mistakes, you\u2019re most likely dealing with a scammer. A message that is sent from a legitimate organization is unlikely to contain a large number of misspelled words or odd mistakes.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">5. Out-of-the-blue requests to download a new update<\/h3>\n\n\n\n<p>Software updates are&nbsp;<a href=\"https:\/\/www.welivesecurity.com\/2022\/10\/24\/5-reasons-keep-software-devices-up-to-date\/\" target=\"_blank\" rel=\"noreferrer noopener\">important for your secure and optimized user experience<\/a>, but you need to make sure you\u2019re downloading your updates from the right source. In other words, be wary of installing anything on your computer that isn\u2019t properly vetted or is not listed for downloaded on a legitimate vendor site\/app marketplace. Phishing tactics often try to persuade you to do so. The original message may be spoofed to appear as if sent from a legitimate vendor or service provider like a mobile carrier.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"521\" height=\"832\" src=\"https:\/\/blog.eset.ee\/wp-content\/uploads\/2023\/02\/eset-research.png\" alt=\"\" class=\"wp-image-6431\" srcset=\"https:\/\/blog.eset.ee\/wp-content\/uploads\/2023\/02\/eset-research.png 521w, https:\/\/blog.eset.ee\/wp-content\/uploads\/2023\/02\/eset-research-80x128.png 80w\" sizes=\"auto, (max-width: 521px) 100vw, 521px\" \/><\/figure>\n\n\n\n<h3 class=\"wp-block-heading\">6. A popup alert with a number to call in order to cleanse your device of malware<\/h3>\n\n\n\n<p>Fake alerts are sometimes designed to facilitate scams, especially\u00a0<a href=\"https:\/\/www.welivesecurity.com\/2023\/01\/19\/tech-support-scammers-still-at-it-what-look-out-for\/\" target=\"_blank\" rel=\"noreferrer noopener\">tech support scams<\/a>. Here, fake popups might appear on your screen after visiting a malicious site. The message may incorrectly say the machine has been compromised with malware and that you must call a support number to get their machine cleaned. In fact, doing so will take them straight through to a fraud call center.<a  href=\"https:\/\/www.welivesecurity.com\/wp-content\/uploads\/2023\/02\/tech-support-scam-example.png\" data-rel=\"lightbox-gallery-0\" data-rl_title=\"\" data-rl_caption=\"\" data-magnific_type=\"gallery\" title=\"\"><\/a><\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"579\" src=\"https:\/\/blog.eset.ee\/wp-content\/uploads\/2023\/02\/tech-support-scam-example-1024x579.png\" alt=\"\" class=\"wp-image-6434\" srcset=\"https:\/\/blog.eset.ee\/wp-content\/uploads\/2023\/02\/tech-support-scam-example-1024x579.png 1024w, https:\/\/blog.eset.ee\/wp-content\/uploads\/2023\/02\/tech-support-scam-example-190x107.png 190w, https:\/\/blog.eset.ee\/wp-content\/uploads\/2023\/02\/tech-support-scam-example-768x434.png 768w, https:\/\/blog.eset.ee\/wp-content\/uploads\/2023\/02\/tech-support-scam-example-1536x868.png 1536w, https:\/\/blog.eset.ee\/wp-content\/uploads\/2023\/02\/tech-support-scam-example.png 1911w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p><em>Example of a tech support scam<\/em><\/p>\n\n\n\n<h3 class=\"wp-block-heading\">7. An offer that seems too good to be true<\/h3>\n\n\n\n<p>Scammers frequently take advantage of the credulity of many internet users. It could be high-value products for sale that are\u00a0<a href=\"https:\/\/www.welivesecurity.com\/2021\/11\/25\/triangle-holiday-shopping-scams-social-media-supply-chain-woes\/\" target=\"_blank\" rel=\"noreferrer noopener\">significantly marked down in price<\/a>. Or lavish prizes being offered for participation in surveys. Or even investment opportunities in cryptocurrency with no downsides. The bottom line is that if it looks too good to be true, it usually is.<a  href=\"https:\/\/www.welivesecurity.com\/wp-content\/uploads\/2023\/02\/fifa-world-cup-lottery-scam-2022.jpg\" data-rel=\"lightbox-gallery-0\" data-rl_title=\"\" data-rl_caption=\"\" data-magnific_type=\"gallery\" title=\"\"><\/a><\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"550\" height=\"781\" src=\"https:\/\/blog.eset.ee\/wp-content\/uploads\/2023\/02\/fifa-world-cup-lottery-scam-2022.jpg\" alt=\"\" class=\"wp-image-6437\" srcset=\"https:\/\/blog.eset.ee\/wp-content\/uploads\/2023\/02\/fifa-world-cup-lottery-scam-2022.jpg 550w, https:\/\/blog.eset.ee\/wp-content\/uploads\/2023\/02\/fifa-world-cup-lottery-scam-2022-90x128.jpg 90w\" sizes=\"auto, (max-width: 550px) 100vw, 550px\" \/><\/figure>\n\n\n\n<p><em>No, you haven\u2019t won a lottery<\/em><\/p>\n\n\n\n<h3 class=\"wp-block-heading\">8. You\u2019re lavished with love after just a few interactions<\/h3>\n\n\n\n<p>Lonely hearts who try their luck on dating sites should be aware that many of the profiles they interact with&nbsp;<a href=\"https:\/\/blog.eset.ie\/2022\/02\/11\/when-love-hurts-watch-out-for-romance-scams-this-valentines-day\/\" target=\"_blank\" rel=\"noreferrer noopener\">may be fakes<\/a>. Scammers befriend their victims online and then swiftly move the conversation onto unmonitored channels like encrypted messaging apps. They soon profess their love then try to extract money from their victim, usually for spurious reasons like medical bills, or plane tickets to see their Valentine.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">9. A request to fill out a survey in return for a gift<\/h3>\n\n\n\n<p>As mentioned,&nbsp;<a href=\"https:\/\/www.welivesecurity.com\/2023\/02\/02\/real-fake-spot-survey-scam\/\" target=\"_blank\" rel=\"noreferrer noopener\">survey scams<\/a>&nbsp;are an increasingly popular way for crooks to elicit personal and financial information from victims. One criminal&nbsp;<a href=\"https:\/\/www.infosecurity-magazine.com\/news\/scam-phishing-network-victims-80m\/\" target=\"_blank\" rel=\"noreferrer noopener\">campaign is netting<\/a>&nbsp;US$80 million per month from fake surveys and giveaways. Beware those offering&nbsp;<a href=\"https:\/\/www.welivesecurity.com\/2021\/12\/07\/5-common-gift-card-scams-how-spot-them\/\" target=\"_blank\" rel=\"noreferrer noopener\">generous gifts<\/a>&nbsp;and too-good-to-be-true offers. There will always be a catch, whether it\u2019s handing over your personal info, or paying a small fee in return for a prize that never materializes.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"515\" height=\"1024\" src=\"https:\/\/blog.eset.ee\/wp-content\/uploads\/2023\/02\/scam-fake-competition-survey-adidas-1-515x1024-1.jpg\" alt=\"\" class=\"wp-image-6440\" srcset=\"https:\/\/blog.eset.ee\/wp-content\/uploads\/2023\/02\/scam-fake-competition-survey-adidas-1-515x1024-1.jpg 515w, https:\/\/blog.eset.ee\/wp-content\/uploads\/2023\/02\/scam-fake-competition-survey-adidas-1-515x1024-1-64x128.jpg 64w\" sizes=\"auto, (max-width: 515px) 100vw, 515px\" \/><\/figure>\n\n\n\n<p><a  href=\"https:\/\/www.welivesecurity.com\/wp-content\/uploads\/2023\/02\/scam-fake-competition-survey-adidas-1.jpg\" data-rel=\"lightbox-gallery-0\" data-rl_title=\"\" data-rl_caption=\"\" data-magnific_type=\"gallery\" title=\"\"><\/a><\/p>\n\n\n\n<p><em>This survey, which was part of a scam campaign&nbsp;<u><a href=\"https:\/\/www.welivesecurity.com\/2018\/06\/14\/phishing-anniversary-free-50-month-subscription\/\" target=\"_blank\" rel=\"noreferrer noopener\">we wrote about in 2018<\/a><\/u>, isn\u2019t real<\/em><\/p>\n\n\n\n<h3 class=\"wp-block-heading\">10. Upfront requests for money<\/h3>\n\n\n\n<p>Instant money transfer apps like&nbsp;<a href=\"https:\/\/www.welivesecurity.com\/2022\/10\/12\/how-scammers-target-zelle-users-stay-safe\/\" target=\"_blank\" rel=\"noreferrer noopener\">Zelle<\/a>,&nbsp;<a href=\"https:\/\/www.welivesecurity.com\/2022\/07\/27\/cash-app-fraud-scams-watch-out\/\" target=\"_blank\" rel=\"noreferrer noopener\">Cash App<\/a>&nbsp;and&nbsp;<a href=\"https:\/\/www.welivesecurity.com\/2023\/01\/17\/venmo-scams-how-stay-safe\/\" target=\"_blank\" rel=\"noreferrer noopener\">Venmo<\/a>&nbsp;have made it child\u2019s play to pay friends and family. But scammers are also requesting payment via these apps \u2013 for&nbsp;<a href=\"https:\/\/www.welivesecurity.com\/2022\/07\/06\/8-common-facebook-marketplace-scams-how-avoid\/\" target=\"_blank\" rel=\"noreferrer noopener\">non-existent items they may be selling online<\/a>, or in romance scams like the one above. They may even pretend to be friends\/family requesting emergency funds, or might impersonate a legitimate company and send an invoice for payment. The bottom line is that, unlike card payments, these apps don\u2019t allow the user to recover funds if stolen via fraud. Like cash, once the money\u2019s gone, it\u2019s gone.<\/p>\n\n\n\n<p>With these and any other scams, it pays to be skeptical online. Don\u2019t download anything you haven\u2019t verified is legitimate. Don\u2019t reply to unsolicited emails or texts. Don\u2019t hand over any info over the phone.<\/p>\n\n\n\n<p>Stay safe!<\/p>\n","protected":false},"excerpt":{"rendered":"<p>We all spend so much of our time online these days. It\u2019s estimated that the&nbsp;average adult spends&nbsp;the best part of seven hours per day glued to their screens. When we\u2019re finished with work, we\u2019re hitting up our apps to watch TV, do our online banking, play games, socialize with friends \u2013 even visit the doctor.<\/p>\n","protected":false},"author":5,"featured_media":6446,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[148,169],"tags":[],"class_list":["post-6424","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity","category-scams"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.2 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>10 signs that scammers have you in their sights - ESET Eesti Blogi<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/blog.eset.ee\/et\/en\/2023\/02\/27\/10-signs-that-scammers-have-you-in-their-sights\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"10 signs that scammers have you in their sights\" \/>\n<meta property=\"og:description\" content=\"We all spend so much of our time online these days. It\u2019s estimated that the&nbsp;average adult spends&nbsp;the best part of seven hours per day glued to their screens. When we\u2019re finished with work, we\u2019re hitting up our apps to watch TV, do our online banking, play games, socialize with friends \u2013 even visit the doctor.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/blog.eset.ee\/et\/en\/2023\/02\/27\/10-signs-that-scammers-have-you-in-their-sights\/\" \/>\n<meta property=\"og:site_name\" content=\"ESET Eesti Blogi\" \/>\n<meta property=\"article:publisher\" content=\"http:\/\/www.facebook.com\/antiviirus\" \/>\n<meta property=\"article:published_time\" content=\"2023-02-27T08:43:15+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-11-24T15:27:10+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/blog.eset.ee\/wp-content\/uploads\/2023\/02\/alert-scam-1200x628-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"628\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"ESET Blog\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"ESET Blog\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2023\\\/02\\\/27\\\/10-signs-that-scammers-have-you-in-their-sights\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2023\\\/02\\\/27\\\/10-signs-that-scammers-have-you-in-their-sights\\\/\"},\"author\":{\"name\":\"ESET Blog\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/#\\\/schema\\\/person\\\/876cf293277fc0b2ae2f4395fffe4c88\"},\"headline\":\"10 signs that scammers have you in their sights\",\"datePublished\":\"2023-02-27T08:43:15+00:00\",\"dateModified\":\"2023-11-24T15:27:10+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2023\\\/02\\\/27\\\/10-signs-that-scammers-have-you-in-their-sights\\\/\"},\"wordCount\":1168,\"image\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2023\\\/02\\\/27\\\/10-signs-that-scammers-have-you-in-their-sights\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/blog.eset.ee\\\/wp-content\\\/uploads\\\/2023\\\/02\\\/alert-scam-1200x628-1.jpg\",\"articleSection\":[\"cybersecurity\",\"scams\"],\"inLanguage\":\"en-US\",\"copyrightYear\":\"2023\",\"copyrightHolder\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/#organization\"}},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2023\\\/02\\\/27\\\/10-signs-that-scammers-have-you-in-their-sights\\\/\",\"url\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2023\\\/02\\\/27\\\/10-signs-that-scammers-have-you-in-their-sights\\\/\",\"name\":\"10 signs that scammers have you in their sights - ESET Eesti Blogi\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2023\\\/02\\\/27\\\/10-signs-that-scammers-have-you-in-their-sights\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2023\\\/02\\\/27\\\/10-signs-that-scammers-have-you-in-their-sights\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/blog.eset.ee\\\/wp-content\\\/uploads\\\/2023\\\/02\\\/alert-scam-1200x628-1.jpg\",\"datePublished\":\"2023-02-27T08:43:15+00:00\",\"dateModified\":\"2023-11-24T15:27:10+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/#\\\/schema\\\/person\\\/876cf293277fc0b2ae2f4395fffe4c88\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2023\\\/02\\\/27\\\/10-signs-that-scammers-have-you-in-their-sights\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2023\\\/02\\\/27\\\/10-signs-that-scammers-have-you-in-their-sights\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2023\\\/02\\\/27\\\/10-signs-that-scammers-have-you-in-their-sights\\\/#primaryimage\",\"url\":\"https:\\\/\\\/blog.eset.ee\\\/wp-content\\\/uploads\\\/2023\\\/02\\\/alert-scam-1200x628-1.jpg\",\"contentUrl\":\"https:\\\/\\\/blog.eset.ee\\\/wp-content\\\/uploads\\\/2023\\\/02\\\/alert-scam-1200x628-1.jpg\",\"width\":1200,\"height\":628},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2023\\\/02\\\/27\\\/10-signs-that-scammers-have-you-in-their-sights\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"10 signs that scammers have you in their sights\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/\",\"name\":\"ESET Eesti Blogi\",\"description\":\"Uudised IT maailmast\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/#\\\/schema\\\/person\\\/876cf293277fc0b2ae2f4395fffe4c88\",\"name\":\"ESET Blog\",\"sameAs\":[\"http:\\\/\\\/eset.ee\"],\"url\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/author\\\/allankinsigo\\\/\"},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2023\\\/02\\\/27\\\/10-signs-that-scammers-have-you-in-their-sights\\\/#local-main-organization-logo\",\"url\":\"\",\"contentUrl\":\"\",\"caption\":\"ESET EESTI\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"10 signs that scammers have you in their sights - ESET Eesti Blogi","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/blog.eset.ee\/et\/en\/2023\/02\/27\/10-signs-that-scammers-have-you-in-their-sights\/","og_locale":"en_US","og_type":"article","og_title":"10 signs that scammers have you in their sights","og_description":"We all spend so much of our time online these days. It\u2019s estimated that the&nbsp;average adult spends&nbsp;the best part of seven hours per day glued to their screens. When we\u2019re finished with work, we\u2019re hitting up our apps to watch TV, do our online banking, play games, socialize with friends \u2013 even visit the doctor.","og_url":"https:\/\/blog.eset.ee\/et\/en\/2023\/02\/27\/10-signs-that-scammers-have-you-in-their-sights\/","og_site_name":"ESET Eesti Blogi","article_publisher":"http:\/\/www.facebook.com\/antiviirus","article_published_time":"2023-02-27T08:43:15+00:00","article_modified_time":"2023-11-24T15:27:10+00:00","og_image":[{"width":1200,"height":628,"url":"https:\/\/blog.eset.ee\/wp-content\/uploads\/2023\/02\/alert-scam-1200x628-1.jpg","type":"image\/jpeg"}],"author":"ESET Blog","twitter_card":"summary_large_image","twitter_misc":{"Written by":"ESET Blog","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/blog.eset.ee\/et\/en\/2023\/02\/27\/10-signs-that-scammers-have-you-in-their-sights\/#article","isPartOf":{"@id":"https:\/\/blog.eset.ee\/et\/en\/2023\/02\/27\/10-signs-that-scammers-have-you-in-their-sights\/"},"author":{"name":"ESET Blog","@id":"https:\/\/blog.eset.ee\/et\/en\/#\/schema\/person\/876cf293277fc0b2ae2f4395fffe4c88"},"headline":"10 signs that scammers have you in their sights","datePublished":"2023-02-27T08:43:15+00:00","dateModified":"2023-11-24T15:27:10+00:00","mainEntityOfPage":{"@id":"https:\/\/blog.eset.ee\/et\/en\/2023\/02\/27\/10-signs-that-scammers-have-you-in-their-sights\/"},"wordCount":1168,"image":{"@id":"https:\/\/blog.eset.ee\/et\/en\/2023\/02\/27\/10-signs-that-scammers-have-you-in-their-sights\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.eset.ee\/wp-content\/uploads\/2023\/02\/alert-scam-1200x628-1.jpg","articleSection":["cybersecurity","scams"],"inLanguage":"en-US","copyrightYear":"2023","copyrightHolder":{"@id":"https:\/\/blog.eset.ee\/et\/#organization"}},{"@type":"WebPage","@id":"https:\/\/blog.eset.ee\/et\/en\/2023\/02\/27\/10-signs-that-scammers-have-you-in-their-sights\/","url":"https:\/\/blog.eset.ee\/et\/en\/2023\/02\/27\/10-signs-that-scammers-have-you-in-their-sights\/","name":"10 signs that scammers have you in their sights - ESET Eesti Blogi","isPartOf":{"@id":"https:\/\/blog.eset.ee\/et\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/blog.eset.ee\/et\/en\/2023\/02\/27\/10-signs-that-scammers-have-you-in-their-sights\/#primaryimage"},"image":{"@id":"https:\/\/blog.eset.ee\/et\/en\/2023\/02\/27\/10-signs-that-scammers-have-you-in-their-sights\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.eset.ee\/wp-content\/uploads\/2023\/02\/alert-scam-1200x628-1.jpg","datePublished":"2023-02-27T08:43:15+00:00","dateModified":"2023-11-24T15:27:10+00:00","author":{"@id":"https:\/\/blog.eset.ee\/et\/en\/#\/schema\/person\/876cf293277fc0b2ae2f4395fffe4c88"},"breadcrumb":{"@id":"https:\/\/blog.eset.ee\/et\/en\/2023\/02\/27\/10-signs-that-scammers-have-you-in-their-sights\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/blog.eset.ee\/et\/en\/2023\/02\/27\/10-signs-that-scammers-have-you-in-their-sights\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.eset.ee\/et\/en\/2023\/02\/27\/10-signs-that-scammers-have-you-in-their-sights\/#primaryimage","url":"https:\/\/blog.eset.ee\/wp-content\/uploads\/2023\/02\/alert-scam-1200x628-1.jpg","contentUrl":"https:\/\/blog.eset.ee\/wp-content\/uploads\/2023\/02\/alert-scam-1200x628-1.jpg","width":1200,"height":628},{"@type":"BreadcrumbList","@id":"https:\/\/blog.eset.ee\/et\/en\/2023\/02\/27\/10-signs-that-scammers-have-you-in-their-sights\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/blog.eset.ee\/et\/en\/"},{"@type":"ListItem","position":2,"name":"10 signs that scammers have you in their sights"}]},{"@type":"WebSite","@id":"https:\/\/blog.eset.ee\/et\/en\/#website","url":"https:\/\/blog.eset.ee\/et\/en\/","name":"ESET Eesti Blogi","description":"Uudised IT maailmast","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/blog.eset.ee\/et\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/blog.eset.ee\/et\/en\/#\/schema\/person\/876cf293277fc0b2ae2f4395fffe4c88","name":"ESET Blog","sameAs":["http:\/\/eset.ee"],"url":"https:\/\/blog.eset.ee\/et\/en\/author\/allankinsigo\/"},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.eset.ee\/et\/en\/2023\/02\/27\/10-signs-that-scammers-have-you-in-their-sights\/#local-main-organization-logo","url":"","contentUrl":"","caption":"ESET EESTI"}]}},"amp_enabled":true,"_links":{"self":[{"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/posts\/6424","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/comments?post=6424"}],"version-history":[{"count":0,"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/posts\/6424\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/media\/6446"}],"wp:attachment":[{"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/media?parent=6424"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/categories?post=6424"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/tags?post=6424"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}