Staying Safe in the Digital Era: A Guide to Awareness and Protection
What is Computer Fraud?
Computer fraud, in the Republic of Albania, constitutes a criminal offense as defined under Article 143/b of the Criminal Code, within the category of offenses “Against computer crime.” According to this provision, computer fraud is defined as follows:
“Entering, modifying, deleting or omitting computer data or interfering in the operation of a computer system, in order to ensure for oneself or for other parties, through fraud, an unfair economic benefit or to cause to a third party asset reduction.”
Methods of Computer Fraud and How to Protect Yourself?
📧 Phishing Scams
What is it?
The use of fake emails, SMS messages, or the creation of fake websites that imitate legitimate institutions or organizations, with the aim of deceiving users into giving sensitive information such as bank details, login credentials, or private keys in the case of cryptocurrencies. These details are then used to access users’ accounts and withdraw funds, open new accounts, or carry out fraudulent transactions.
How to Protect Yourself?
- Do not click on links received via emails or SMS that ask for updates or verification of information related to bank accounts, emails, investment apps, or any platform containing sensitive information.
- Carefully check the sender’s email address, the URL, and the writing used in any correspondence. Scammers use small changes that are not easily noticeable at first glance. Misspelled URLs, often with slight deviations from official financial or government websites, may be fake.
- Be cautious with documents you download. Do not open attachments in emails from unknown senders.
- Use strong passwords and enable two-factor authentication.
Fraud Through Investment Platforms
What is it?
The use of fake advertisements or online “advisors” to involve or attract individuals into fake trading or asset investment platforms. These schemes often use psychological manipulation and pressure tactics to lure victims, convincing them to invest in false or fraudulent opportunities. Some of the most common schemes in this area are:
Pyramid and Ponzi Schemes
Pyramid and Ponzi schemes: These are fraudulent investment schemes that rely on the continuous recruitment of new investors or new investments to generate returns for earlier investors. These schemes often fail when it becomes impossible to recruit enough new investors to support the payments and profits.
High-Return Investments
High-return investment schemes: These types of schemes offer investment opportunities that seem “too good to be true,” promising exceptionally high returns. Usually, these schemes use high-pressure tactics for quick or limited-time investments, aiming to attract investors within a short period of time.
Pig Butchering
Pig Butchering scheme: This scheme is common in cryptocurrency and virtual asset investments. It uses psychological manipulation to take victims’ life savings, promising them high returns from investments in virtual assets, while in reality, it is simply a scam.
Pump and Dump
Pump and Dump scheme: This scheme involves spreading false information to artificially inflate the prices of assets such as stocks, cryptocurrencies, or digital tokens. After this intentional price increase, the fraudsters sell their assets at the inflated prices. Once they stop promoting and sell off the assets, the price drops, and the victims lose their invested money.
How to Protect Yourself?
- Do not invest based solely on advice from someone who contacts you only online. Request additional information (name, email, phone number, address) and information about the proposed offer online. Also, conduct further online research, as there may be information published by others who may have fallen victim to the scam.
- Verify any online requests for payments or purchases; if possible, call the person or institution to ensure the request is legitimate. You should also verify any changes to account numbers or payment procedures with the person making the request.
- If you have invested in various stock or virtual asset platforms and believe you are a victim of fraud, do not pay additional fees or taxes to withdraw your money.
🧑💼 Business Email Compromise (BEC) Fraud
What is it?
The manipulation of email communications, where fraudsters pose as clients, partners, or a legitimate business or organization, with the aim of deceiving victims and convincing them to transfer funds to new accounts controlled by the fraudsters.
How to Protect Yourself
- Do not click on links received via emails or SMS that ask for updates or verification of information related to bank accounts, emails, investment apps, or any platform containing sensitive information.
- Carefully check the sender’s email address, the URL, and the writing used in any correspondence. Scammers use small changes that are not easily noticeable at first glance. Misspelled URLs, often with slight deviations from official financial or government websites, may be fake.
- Do not pay for services that claim they can recover lost funds.
- Be cautious with documents you download. Do not open attachments in emails from unknown senders.
- Use strong passwords and enable two-factor authentication.
Fraud through Social Media and Telecommunication Impersonation
What is it?
Contacting victims through social media apps or phone calls by scammers pretending to be government officials, relatives, or friends. They exploit the victims’ emotions to pressure them into making payments, giving access to their accounts, or performing financial actions—such as applying for loans or opening new accounts through which fraudulent transactions are carried out.
How to Protect Yourself
- Verify any online requests for payments or purchases. If possible, call the person or institution directly to confirm the legitimacy of the request.
- Always verify any changes in account numbers or payment procedures with the requester.
- Do not pay for services that claim they can recover lost funds.
- Use strong passwords and enable two-factor authentication.
- Do not click on links received via email or SMS that ask for updates or verification of information related to bank accounts, email, investment apps, or any other platform containing sensitive information.
❤️ Online Romance Scam
What is it?
The use of fake identities on online platforms or social networks to create romantic relationships and emotionally manipulate victims, with the intent of persuading them to send money.
How to Protect Yourself
- Be cautious about the personal information you share on social media or the internet.Perform additional checks online regarding the person’s photos or profile to see if the image, name, or details have been used elsewhere.
- Be alert if the person seems too perfect or quickly asks you to move the conversation off the dating platform or social network to a more private channel.
- Never send money to someone you have only communicated with online or over the phone.
Employment Scams
What is it?
The posting of fake job offers on social media, through which scammers deceive victims by asking for payments to secure jobs abroad, or additional payments for training programs that are supposedly required for employment—but which never actually take place.
How to Protect Yourself
- Avoid any job offer that comes to you unexpectedly via SMS or social media, especially if you didn’t apply for it.
- Never make upfront payments for job contracts inside or outside the country without first verifying the legitimacy of the company offering the job (do online research to check if the company has been linked to scams, whether it operates legally, or if it is fake).
- Be cautious if the salary offered seems too high to be true.
- Be alert if the representatives refuse to meet in person or even virtually.