Well done!
You have completed Internet Street Smarts!
You have completed Internet Street Smarts!
Explore common online scams, including phishing, ransomware, and emerging technology scams, while providing key strategies to identify red flags, protect your personal information, and understand the social justice implications of digital threats.
Don't Get Got!
You donβt get hacked because youβre stupid. You get hacked because youβre human. Scams have existed long before the internet, but now they hide behind screens and use digital tools to trick users. Being internet street-smart isnβt about knowing every scamβitβs about recognizing the red flags and pausing before acting. Scammers create urgency to make you act fast. Always double-check email senders, links, and attachments before clicking.
Related Discussions
Have questions about this video? Start a discussion with the community and Treehouse staff.
Sign upRelated Discussions
Have questions about this video? Start a discussion with the community and Treehouse staff.
Sign upYou don't get hacked because you're stupid, 0:05 you get hacked because you're human. 0:07 Liars and thieves have been around long before the Internet. 0:09 From con men who trick people into investing into fake schemes to friends 0:12 swiping money from your wallet, scams are nothing new. 0:17 What's changed is that the Internet has given these scammers a bigger playing 0:21 field a allowing them to hide behind screens and 0:25 cover their tracks with just a few clicks. 0:27 That's why being Internet street smart is so important. 0:29 It's not about knowing every single trick in the book, 0:32 it's about knowing how to spot the red flags and ask the right questions. 0:35 The online world moves fast and it's easy to fall into a trap when you're rushing. 0:39 But by learning a few key strategies, you can stay ahead of the game. 0:43 One of the primary methods scammers use to break 0:47 into accounts is is through fake links. 0:50 You might get a message that feels urgent, 0:53 something designed to make you panic and act without thinking. 0:56 It's always a good idea to double check the sender, verify the message, and 1:00 look closely at any links or attachments before clicking. 1:04 For example, does the website URL match what you're expecting? 1:07 If it says chase.net instead of chase.com, that is a huge red flag. 1:11 Scams come in many forms, but they all have one thing in common, 1:16 they can seriously harm finances, identity, and dignity. 1:20 Let's go over some common red flags that should make you think twice before 1:25 clicking or responding. 1:28 Email addresses that don't look quite right. 1:30 For example, 1:33 does it say Chasebank.services instead of Chasebank.com. 1:34 Suspicious attachments or links that you weren't expecting. 1:38 Sender addresses that seem unfamiliar. 1:42 Requests that feel off like asking for personal information or urgent action. 1:45 An unusual tone in a message even from someone you know. 1:50 Generic greetings like dear customer instead of your name. 1:53 Lookalike websites with poor grammar or spelling mistakes. 1:57 Language that feels urgent or threatening. 2:02 The platforms and apps we use push us to move fast, click, swipe, respond. 2:04 But when you slow down, you're more likely to spot the signs of a scam. 2:09 A few extra seconds could save you a lot of trouble. 2:14 Types of Scams. 2:17 There are three main scams that we're gonna cover and 2:19 then we'll take a look at a few more. 2:21 But the first three are trust-based scams, 2:23 hacking based scams, and emerging technology scams. 2:26 Trust-based scams, these scams rely on gaining your trust to trick you into 2:30 sharing personal information. 2:35 It's called social engineering, where scammers manipulate emotions like fear or 2:37 curiosity to get what they want. 2:42 One of the most common forms of social engineering is phishing. 2:44 Phishing attacks are designed to look like legitimate messages 2:49 from trusted entities like your bank or a coworker. 2:53 They often ask you to click on a link or 2:56 provide sensitive information like login credentials or credit card details. 2:58 Phishing remains one of the most common online scams, 3:03 with billions of phishing emails sent every year. 3:06 For example, let's say your uncle shows you a text message about a package that he 3:09 didn't order. 3:13 It's a phishing attempt, but how do you know? 3:14 Look for things like odd grammar, an unfamiliar link, or an urgent tone. 3:17 Help him stay safe by warning him about phishing. 3:22 Hacking-based scams, these scams involve breaking into your accounts or 3:26 devices using malicious software or tactics. 3:31 A common method is through ransomware or malicious QR codes. 3:34 Ransomware is a type of malware that locks you out of your own data and 3:39 the hacker demands payment to give you access again. 3:43 It's like someone breaking into your house, locking up your belongings and 3:47 asking you for money to get back in. 3:51 Ransomware have hit businesses and individuals alike. 3:53 QR code scams, QR codes are convenient, but they can also be dangerous. 3:56 Scammers can embed malicious links into QR codes that lead to harmful websites or 4:01 download malware onto your device. 4:06 Be cautious when scanning QR codes, especially in public places. 4:09 Always ask yourself, do I trust this source? 4:12 For example, you're at a restaurant and you see a QR code to check out the menu, 4:16 but it takes you somewhere strange, that's a red flag. 4:20 Don't scan anything that doesn't come from a trusted source. 4:24 Emerging technology scams, New technologies have introduced new risks. 4:27 AI-generated deepfakes are becoming more common and harder to detect. 4:32 These scams involve highly realistic fake media like videos or 4:36 audio recordings created to deceive you. 4:40 AI deepfake scams, imagine getting a phone call that sounds exactly like a family 4:43 member asking for urgent financial help, but it's not them, it's a deepfake. 4:48 As technology advances, these scams will only become more convincing and dangerous. 4:54 Now let's take a look at a few other scams that aren't as common but 4:58 absolutely exist. 5:02 Social justice and scams. 5:03 While anyone can fall victim to scams, it's important to recognize that 5:05 marginalized communities such as low income individuals, 5:08 immigrants, older adults and people of color are often more vulnerable. 5:12 Scammers exploit inequalities that already exist in society, 5:16 targeting those who may have limited access to digital literacy, resources, 5:20 financial stability or English language skills. 5:24 Economic exploitation, low income communities are frequently the target of 5:28 scams that promise quick financial relief like fake job opportunities or 5:32 payday loan schemes. 5:36 These scams prey on the urgency of economic need, 5:38 leading to financial losses that can often have devastating effects. 5:40 For example, a job seeker in a vulnerable financial situation might respond to a job 5:44 post that offers high pay with minimal effort. 5:49 Only to be scammed out of personal information or 5:52 asked to pay a fee up front for an application fee. 5:55 Language barrier and trust-based scams. 5:57 Immigrant communities and 6:00 people with limited English proficiency are particularly vulnerable to 6:01 trust based scams like phishing or IRS or government impersonation scams. 6:06 These scams often use fear tactics such as threatening deportation or legal action, 6:10 which can be especially effective on individuals 6:15 who aren't familiar with US systems. 6:18 For example, scammers posing as IRS agents will often target immigrant communities, 6:20 threatening them with deportation to arrest them unless they pay immediately 6:25 via gift cards or wire transfers. 6:29 Digital redlining and targeted ads. 6:32 Communities of colors are disproportionately targeted by predatory 6:34 financial ads and digital redlining. 6:37 Algorithms push payday loans, debt consolidation scams, and 6:40 other financial schemes more aggressively to black and brown communities, 6:43 reinforcing systemic inequalities. 6:47 For example, an individual from a marginalized group may see more ads for 6:49 high interest loans. 6:54 Or get more phishing attempts for crypto investment scams due to biased algorithms 6:55 designed to exploit their community's economic struggles. 7:00 By understanding the social justice aspect of online scams, we can see how these 7:03 digital threats disproportionately impact already vulnerable populations. 7:07 The fight for online safety is not just about protecting personal information. 7:12 It's about leveling the playing field and ensuring that everyone, 7:16 regardless of their background, has access to the tools and 7:19 knowledge needed to protect themselves in the digital world. 7:22 Let's quickly recap the key points. 7:25 If something seems too good to be true, it probably is. 7:27 Scammers often rely on making things sound tempting or urgent to catch you off guard. 7:31 Always take a moment to question offers that seem too perfect. 7:36 Double-check everything. 7:40 Before clicking on links, opening attachments, or 7:42 sharing personal information, verify the source. 7:45 A few extra seconds can save you a lot of trouble down the road. 7:48 Don't click on anything unexpected. 7:52 If you didn't ask for it pause and evaluate, whether it's an email, 7:54 a text, or a link, taking a step back can help you avoid falling for a scam. 7:59 Remember the social justice angle. 8:04 Scams disproportionately affect marginalized communities who 8:07 are often targeted due to economic vulnerabilities, language barriers, 8:10 or limited digital literacy. 8:15 Being aware of this helps us not only protect ourselves, but 8:16 also support those around us who may be in a more vulnerable position. 8:20 If you or someone you know ever gets caught in a scam, don't worry, 8:23 you're not alone. 8:27 Report scams to the Federal Trade Commission or the Better Business Bureau, 8:28 and use the resources we've provided to stay informed. 8:32
You need to sign up for Treehouse in order to download course files.
Sign upYou need to sign up for Treehouse in order to set up Workspace
Sign up