Economic Indicators
Technology has always moved fast, but it’s zigzagging at a lightning pace these days. The explosion of new tools — from digital currencies to artificial intelligence (AI) — has opened vistas in how we work and play.
But it’s not just everyday people taking advantage of these new technologies. Bad actors on the internet are using them to spin up slick new scams and to deploy them at scale.
However, these hackers aren’t the undetectable coding geniuses seen in movies. Rather, they’re more likely to be pushy, unethical salespeople armed with stolen data. Their goal is to cajole and pressure their victims into betraying passwords, exposing sensitive computer access or handing over cash. You don’t need to be computer savvy to protect yourself; in fact, a little vigilance can go a long way toward thwarting them.
“Cyber threats can sound intimidating, especially with the rise of advanced techniques. But staying safe doesn’t require technical expertise — it starts with a mindset,” says Lauren Silverman, head of business security management at Capital Group. “By following the simple principle of ‘stop, check, report,’ every individual can play a powerful role in defending themselves against scams and fraud.”
It’s a common misapprehension that hackers are surfing on oceans of code, silently infiltrating silos of secret information. More commonly, they’re doing something much simpler: using relatively straightforward tools to trick people into divulging information or handing over cash.
The ways they meet their victims are varied — they send text messages and emails, seed false information on fake webpages and even hide malicious programs behind QR codes. At the end of the day, though, they generally need you to engage with one of their traps, and that’s where the “stop, check, report” framework comes into play.
The first step is to stop before you engage with anything on the internet. Whether you’ve received a direct message from an unknown sender or you’re being asked to use an app to view the menu at a trendy restaurant, take a moment before clicking on or replying to anything and check the situation.
“Security isn’t just about technology — it’s about behavior,” Silverman adds. “Small steps can make a big difference: Pause before clicking, protect your privacy and talk to someone if something feels off.”
Finally, when you’re confident that you’ve found a bona fide fraud attempt, report it to the relevant parties. That doesn’t just mean law enforcement. If someone is impersonating a company, let that organization know. Most companies, including Capital Group, take active measures to remove malicious impersonators, and they appreciate such reports. You can read up how to report such fraud, and more tips on protecting yourself, at our fraud-protection website here.
Vigilance alone isn’t always going to be enough. If, for example, you’ve clicked on what seemed like a legitimate link and have found yourself in a conversation that doesn’t seem quite right, remember that you’re empowered to simply hang up, block the number or stop returning messages.
One of the strongest tools in the hacker’s “social engineering” arsenal are high-pressure sales tactics. Scammers might raise the stakes of the conversation, warning you of dire legal action, devastating fines or even criminal proceedings against you or a loved one. They may push you to make snap decisions on incredibly short deadlines. They could warn you not to discuss the conversation with anyone else. These tactics might seem brutish, but they work — they play up people’s anxieties and keep them focused on an imaginary threat so targets don’t stop to think through the situation.
If there’s anything that feels even a little off, break off contact. If the caller is posing as a business representative or government agent, you can always follow up with that group through official channels. Don’t use a phone number or email address provided by the contact or contained in an email or text. And no matter what someone says, you can always reach out to loved ones and legal or financial professionals.
Hackers thrive on easy information. The more they know about their target, the more convincing their disguise. Unfortunately, many of us have made it easy for crooks to learn about us and leverage that information.
More tips can be found at www.capitalgroup.com/about-us/fraud-protection-and-awareness.html.
One newer attack to be aware of: deepfake contacts. These are tailored scams designed to fool targets into thinking they’re talking to a loved one or acquaintance. The attackers can use short video or audio clips — often sourced through unsecured social media — to create fairly convincing mimics. They can even carry on conversations to some extent using large language model technology.
The attackers use these parrots to ask for cash or sensitive information, sometimes with a story about needing bail or to cover medical bills.
That’s all genuinely unsettling, but there’s good news: These scams are just as defensible as any other. Take a breath, don’t let the scammer pressure you into a hasty decision and reach out to trusted advisors for their opinions and guidance. Deepfakes specifically have another simple weakness: They can’t repeat anything you haven’t put on the internet. If you and your family share a passcode — a simple but unusual word or phrase that’s kept offline and is hard to guess — you can ask for it during phone conversations. The deepfake machine simply won’t be able to give it to you.
“In a world of deepfakes and digital deception, trust is built through action,” Silverman says. “We act swiftly to verify and protect your accounts, and we encourage you to do the same — stay informed, stay cautious, and know we’re always here to help.”
Economic Indicators
Interest Rates