Holiday Shopping Safety Tips

Scams don't have to be scary
when you know what to look for.

Keep an eye out for these, and others like them, this holiday season to protect you, your wallet, and your identity. Think you've been a victim of a scam? It's not the end of the world, but you should take action. Call us at 417-895-4139, and we'll get through it together.



Look-Alike Websites

Scammers use look-alike websites as a deceptive tactic to trick individuals into believing they are interacting with legitimate and trusted sites. Here's how they typically execute such scams:

  • Scammers create websites that closely resemble well-known and trusted platforms, such as banks, online retailers, or government websites.

  • They often use domain names that are very similar to the legitimate site, with minor misspellings, added characters, or different domain extensions (e.g., .net instead of .com).

  • The scam websites replicate the legitimate site's design, layout, and content, making it difficult for users to distinguish between the real and fake versions.

  • Scammers set up forms on these fake websites to collect sensitive information such as login credentials, credit card details, or personal information.

  • Victims may be led to these look-alike sites through phishing emails, messages, or malicious advertisements that redirect them from legitimate websites.

  • One common tactic is to create fake login pages. When users enter their credentials, scammers harvest this information for unauthorized access to the real accounts.

  • Some look-alike sites may distribute malware by prompting users to download files or plugins, exploiting vulnerabilities in their devices.

  • Scammers may use social engineering techniques, such as sending emails claiming urgent updates or security alerts, to lure users to these fake sites. Staying vigilant and using security measures like two-factor authentication can add an extra layer of protection against these scams.


Alerts About Compromised Accounts

Scammers employ fake alerts about "compromised" accounts as a tactic to deceive individuals and manipulate them into providing sensitive information. Here's how they typically execute such scams:

  • Scammers often pretend to be reputable organizations or services such as banks, email providers, online retailers, or streaming platforms.

  • They create a sense of urgency by claiming that there has been suspicious activity or a security breach on the individual's account. Fear tactics, like mentioning potential unauthorized access, are used to prompt quick action.

  • Scammers may send emails, make phone calls, or send text messages to convey the alert. These messages often appear official, with logos and language mimicking legitimate communications.

  • Victims are urged to verify their identity by providing personal information such as usernames, passwords, Social Security numbers, or credit card details. Legitimate organizations typically do not request such sensitive information through unsolicited messages.

  • Some scams threaten to lock or suspend the account unless immediate action is taken. This threat is designed to pressure individuals into complying with the scammer's demands.
    Scammers may include links in emails or messages that lead to fake login pages. Unsuspecting individuals who enter their credentials on these pages unwittingly provide scammers with access to their accounts. Alternatively, clicking on links may install malware on the victim's device.

  • Scammers may provide contact information (phone numbers, email addresses) for individuals to call and "resolve" the issue. However, these contact details lead to the scammers themselves or automated systems that extract more personal information.


To avoid falling victim to these scams, individuals should remain vigilant, verify the legitimacy of alerts independently (not through contact details provided in the message), and never share personal or financial information via unsolicited communications. Regularly monitoring accounts for any unusual activity and using two-factor authentication can add an extra layer of security.


Fake Shipping Notices

Scammers use fake shipping notices as a deceptive tactic to exploit individuals and trick them into taking actions that benefit the scammer. Here's how they typically execute such scams:

  • Scammers often pretend to be well-known shipping companies, retailers, or other reputable services that typically send shipping notifications.

  • Victims receive emails or text messages that appear to be legitimate shipping notifications. These messages often include logos, branding, and language mimicking actual communications from reputable companies.

  • The fake notices may claim there is a problem with the shipment, a delay in delivery, or an issue with the recipient's information. This creates a sense of urgency and concern.

  • To resolve the alleged issue, victims are prompted to take immediate action, such as clicking on a link to track the shipment, confirming personal information, or downloading an attachment.

  • Clicking on the provided links may lead victims to fake websites that mimic legitimate tracking pages. Alternatively, downloading attachments can install malware on the recipient's device, allowing scammers to gain unauthorized access.

  • Scammers use fake shipping notices to collect sensitive information, such as login credentials, credit card details, or other personal data. This information can then be used for identity theft or financial fraud.

  • The scam may provide contact information for individuals to call and address the supposed shipping issue. However, these contact details often lead to the scammers themselves or automated systems designed to extract more personal information.

To avoid falling victim to fake shipping notice scams, individuals should verify the legitimacy of such notifications independently by checking directly with the shipping company or retailer. Avoid clicking on links or downloading attachments from unsolicited messages. If there are concerns about a shipment, contact the company using official contact information obtained separately from the notification. Stay cautious, especially during the holiday season when shipping activity is high and scams are prevalent.


Fake Suspension of Service Notices

Scammers use fake suspension notices as a manipulative tactic to exploit individuals and coerce them into taking actions that benefit the scammer. Here's how they typically execute such scams:

  • Scammers often pretend to be popular streaming services, cloud storage providers, or other online platforms that users frequently access.

  • Victims receive emails, messages, or alerts claiming that their account has been suspended or is at risk of suspension. The messages may state that the suspension is due to a payment issue or some form of policy violation.

  • Scammers create a sense of urgency and fear, emphasizing that immediate action is required to reactivate the account. They may threaten permanent suspension or loss of data if the recipient doesn't comply swiftly.

  • To resolve the supposed suspension, victims are prompted to provide personal information such as usernames, passwords, credit card details, or other sensitive data. Legitimate services typically do not request such information via unsolicited communications.

  • Scammers include links in the messages that lead to fake login pages. Clicking on these links may compromise the victim's credentials. Alternatively, attachments in the messages may contain malware, allowing scammers unauthorized access to the recipient's device.

  • The scam may provide contact details, urging victims to call a customer support number to resolve the suspension. However, these contact details often lead to the scammers themselves or automated systems designed to extract more personal information.

  • Some scams claim the account is suspended due to a billing issue and request victims to update their billing information. This is a ploy to capture financial details for fraudulent activities.

To avoid falling victim to fake suspension notice scams, individuals should verify the legitimacy of such notifications independently. Instead of clicking on links or using contact details provided in the message, users should go directly to the official website or contact customer support through verified channels. Staying vigilant and cautious, especially when faced with unexpected account suspension claims, is crucial to avoiding scams.


Using Public Wi-Fi Wisely

Scammers exploit public Wi-Fi to carry out various cybercrimes and compromise the security of individuals using these networks. Here's how they typically use public Wi-Fi for their schemes:

  • Scammers position themselves between a user and the Wi-Fi connection, intercepting and potentially altering the communication between the user and websites. This allows them to eavesdrop on sensitive information.

  • Scammers set up rogue Wi-Fi networks with names similar to legitimate public networks. When users connect to these fake networks, the scammers can monitor their online activities and potentially capture login credentials or personal data.

  • Scammers target active sessions between a user and a website, stealing session cookies or tokens to gain unauthorized access to the user's accounts.

  • Some scammers set up public Wi-Fi hotspots with malicious intent. Users connecting to these hotspots may unknowingly expose their data to the scammer.

  • Scammers may redirect users to fake login pages for commonly used websites. When users enter their credentials, the scammer captures this information for unauthorized access.

  • Scammers can use public Wi-Fi to distribute malware to connected devices. This malware may compromise the device's security and allow the scammer to control or monitor it remotely.

Staying vigilant and adopting cybersecurity best practices can help mitigate the risks associated with using public Wi-Fi.


Temporary Holiday Jobs

Scammers exploit temporary holiday job postings as a deceptive tactic to take advantage of job seekers. Here's how they typically execute such scams:

  • Scammers create fake job postings that mimic legitimate employers, often using recognizable company names or logos to appear trustworthy.

  • The scammers may advertise high-paying positions for simple or low-skill jobs, promising lucrative salaries for minimal effort.

  • Fake job postings often require little to no experience or qualifications, and they may claim to hire without interviews. This is a red flag, as legitimate employers typically screen candidates.

  • Scammers entice victims with promises of exceptionally high salaries for seemingly straightforward tasks. Be cautious if the offer seems too good to be true.

  • Victims may be asked to provide personal information such as Social Security numbers, bank account details, or copies of identification documents. Legitimate employers typically request this information after a formal hiring process.

  • Scammers may require candidates to pay fees for background checks, training materials, or other supposed expenses. Legitimate employers cover these costs themselves.

  • Scammers may direct applicants to fake websites or use email addresses that closely resemble legitimate company domains. Always verify the authenticity of the website and email contact.

  • Job scams often pressure applicants to accept the position quickly, creating a sense of urgency. Legitimate employers allow candidates time to consider and accept offers.

Stay vigilant during the holiday job search season and report suspicious postings to relevant authorities or job platforms.


Just for you



Avoid scams with confidence

Scams are on the rise. Learn how to identify red flags and to avoid common scams and stay protected this holiday season. Learn More



Open an account in no time

We know your time is valuable. That’s why we made account opening easier than creating that latte. Refreshing. Learn More



Community matters

We understand that the strength and livelihood of where we live depends on the commitment of its residents. That is why community matters to us. Learn More