All Article Properties:
{
"access_control": false,
"status": "publish",
"objectType": "Article",
"id": "2081823",
"signature": "Article:2081823",
"url": "https://staging.dailymaverick.co.za/article/2024-03-05-beware-psychological-techniques-used-by-scammers/",
"shorturl": "https://staging.dailymaverick.co.za/article/2081823",
"slug": "beware-psychological-techniques-used-by-scammers",
"contentType": {
"id": "1",
"name": "Article",
"slug": "article"
},
"views": 0,
"comments": 1,
"preview_limit": null,
"excludedFromGoogleSearchEngine": 0,
"title": "Not so fast! Watch out for these psychological techniques used by scammers — and how to protect yourself",
"firstPublished": "2024-03-05 12:52:56",
"lastUpdate": "2024-03-05 12:52:56",
"categories": [
{
"id": "26",
"name": "Sci-Tech",
"signature": "Category:26",
"slug": "sci-tech",
"typeId": {
"typeId": "1",
"name": "Daily Maverick",
"slug": "",
"includeInIssue": "0",
"shortened_domain": "",
"stylesheetClass": "",
"domain": "staging.dailymaverick.co.za",
"articleUrlPrefix": "",
"access_groups": "[]",
"locale": "",
"preview_limit": null
},
"parentId": null,
"parent": [],
"image": "",
"cover": "",
"logo": "",
"paid": "0",
"objectType": "Category",
"url": "https://staging.dailymaverick.co.za/category/sci-tech/",
"cssCode": "",
"template": "default",
"tagline": "",
"link_param": null,
"description": "",
"metaDescription": "",
"order": "0",
"pageId": null,
"articlesCount": null,
"allowComments": "1",
"accessType": "freecount",
"status": "1",
"children": [],
"cached": true
},
{
"id": "341015",
"name": "DM168",
"signature": "Category:341015",
"slug": "dm168",
"typeId": {
"typeId": "1",
"name": "Daily Maverick",
"slug": "",
"includeInIssue": "0",
"shortened_domain": "",
"stylesheetClass": "",
"domain": "staging.dailymaverick.co.za",
"articleUrlPrefix": "",
"access_groups": "[]",
"locale": "",
"preview_limit": null
},
"parentId": null,
"parent": [],
"image": "",
"cover": "",
"logo": "",
"paid": "0",
"objectType": "Category",
"url": "https://staging.dailymaverick.co.za/category/dm168/",
"cssCode": "",
"template": "default",
"tagline": "",
"link_param": null,
"description": "",
"metaDescription": "",
"order": "0",
"pageId": null,
"articlesCount": null,
"allowComments": "1",
"accessType": "freecount",
"status": "1",
"children": [],
"cached": true
},
{
"id": "387188",
"name": "Maverick News",
"signature": "Category:387188",
"slug": "maverick-news",
"typeId": {
"typeId": "1",
"name": "Daily Maverick",
"slug": "",
"includeInIssue": "0",
"shortened_domain": "",
"stylesheetClass": "",
"domain": "staging.dailymaverick.co.za",
"articleUrlPrefix": "",
"access_groups": "[]",
"locale": "",
"preview_limit": null
},
"parentId": null,
"parent": [],
"image": "",
"cover": "",
"logo": "",
"paid": "0",
"objectType": "Category",
"url": "https://staging.dailymaverick.co.za/category/maverick-news/",
"cssCode": "",
"template": "default",
"tagline": "",
"link_param": null,
"description": "",
"metaDescription": "",
"order": "0",
"pageId": null,
"articlesCount": null,
"allowComments": "1",
"accessType": "freecount",
"status": "1",
"children": [],
"cached": true
}
],
"content_length": 6386,
"contents": "<span style=\"font-weight: 400;\">Not a day goes by without a headline about a </span><a href=\"https://www.vice.com/en/article/qjvaym/people-share-worst-scam-stories\"><span style=\"font-weight: 400;\">victim being scammed</span></a><span style=\"font-weight: 400;\"> and losing money. We are constantly warned about new scams and staying safe from cybercriminals.</span>\r\n\r\n<span style=\"font-weight: 400;\">So why are people still getting scammed, and sometimes spectacularly so?</span>\r\n\r\n<span style=\"font-weight: 400;\">Scammers use sophisticated psychological techniques. They exploit our deepest human vulnerabilities and bypass rational thought to tap into our emotional responses.</span>\r\n\r\n<span style=\"font-weight: 400;\">This “</span><a href=\"https://www.thecut.com/article/amazon-scam-call-ftc-arrest-warrants.html\"><span style=\"font-weight: 400;\">psychological warfare</span></a><span style=\"font-weight: 400;\">” coerces victims into making impulsive decisions. Sometimes scammers spread their methods around many potential victims to see who is vulnerable. Other times, criminals focus on a specific person.</span>\r\n\r\n<span style=\"font-weight: 400;\">Let’s explore some of these psychological techniques and how you can defend yourself against them.</span>\r\n<h4><b>Random phone calls</b></h4>\r\n<span style=\"font-weight: 400;\">Scammers start with small requests to establish a sense of commitment. After agreeing to these minor requests, we are more likely to comply with larger demands, driven by a desire to act consistently.</span>\r\n\r\n<span style=\"font-weight: 400;\">The call won’t come from a number in your contacts or one you recognise, but the scammer may pretend to be someone you’ve engaged to work on your house, or perhaps one of your children using a friend’s phone to call you.</span>\r\n<blockquote>They may threaten legal trouble to instil fear, promise high investment returns to exploit greed, or share fabricated distressing stories to elicit sympathy and financial assistance.</blockquote>\r\n<span style=\"font-weight: 400;\">If it is a scammer, maybe keeping you on the phone for a long time gives them an opportunity to find out things about you or people you know.</span>\r\n\r\n<span style=\"font-weight: 400;\">They can use this information either immediately or at a later date.</span>\r\n<h4><b>Creating a sense of urgency</b></h4>\r\n<span style=\"font-weight: 400;\">Scammers fabricate scenarios that require immediate action, like claiming a bank account is at risk of closure, or an offer is about to expire. This tactic aims to prevent victims from assessing the situation logically or seeking advice, pressuring them into rushed decisions.</span>\r\n\r\n<span style=\"font-weight: 400;\">The scammer creates an artificial situation in which you are frightened into doing something you wouldn’t ordinarily do. Scam calls alleging to be from the South African Revenue Service (SARS) are a great example. You have a debt to pay – apparently – and things will go badly if you do not pay right now.</span>\r\n\r\n<span style=\"font-weight: 400;\">Scammers play on your emotions to provoke reactions that cloud judgement. They may threaten legal trouble to instil fear, promise high investment returns to exploit greed, or share fabricated distressing stories to elicit sympathy and financial assistance.</span>\r\n<h4><b>Building rapport with casual talk</b></h4>\r\n<span style=\"font-weight: 400;\">Through extended conversation, scammers build a psychological commitment to their scheme. No one gets very far by just demanding your password, but it’s natural to be friendly with people who are friendly towards us.</span>\r\n\r\n<span style=\"font-weight: 400;\">After staying on the line for long periods the victim also becomes cognitively fatigued. This not only makes them more open to suggestions, but also isolates them from friends or family who might recognise and counteract the scam.</span>\r\n\r\n<p><img loading=\"lazy\" class=\"size-full wp-image-2081958\" src=\"https://www.dailymaverick.co.za/wp-content/uploads/2024/03/disappointed-girl-looking-her-phone.jpg\" alt=\"scammers\" width=\"720\" height=\"900\" /> <em>Find another way to contact the person to verify who they are. For example, you can call a generic number for the business and ask to be connected. (Photo: Freepik)</em></p>\r\n<h4><b>Help me to help you</b></h4>\r\n<span style=\"font-weight: 400;\">In this case, the scammer creates a situation where they help you to solve a real or imaginary problem (that they actually created). They work their “IT magic” and the problem goes away.</span>\r\n\r\n<span style=\"font-weight: 400;\">Later, they ask you for something you wouldn’t normally do, and you do it because of the “social debt”: They helped you first.</span>\r\n\r\n<span style=\"font-weight: 400;\">For example, a hacker might attack a corporate network, causing it to slow down. Then they call you, pretending to be from your organisation, perhaps as a recent hire not yet on the company’s contact list. They “help” you by turning off the attack, leaving you suitably grateful.</span>\r\n\r\n<span style=\"font-weight: 400;\">Perhaps a week later, they call again and ask for sensitive information, such as the CEO’s password. You know company policy is not to divulge it, but the scammer will ask if you remember them (of course you do) and come up with an excuse for why they really need this password.</span>\r\n\r\n<span style=\"font-weight: 400;\">The balance of the social debt says you will help them.</span>\r\n<h4><b>Appealing to authority</b></h4>\r\n<span style=\"font-weight: 400;\">By posing as line managers, officials from government agencies, banks or other authoritative bodies, scammers exploit our natural tendency to obey authority.</span>\r\n\r\n<span style=\"font-weight: 400;\">Such scams operate at varying levels of sophistication. The simple version: Your manager messages you with an urgent request to buy some gift cards and send through their numbers.</span>\r\n<blockquote>If the conversation is moving too fast, remember that someone else’s problem is not yours to solve.</blockquote>\r\n<span style=\"font-weight: 400;\">The complex version: Your manager calls and asks to urgently transfer a large sum of money to an account you don’t recognise. You do this because </span><a href=\"https://www.wsj.com/articles/fraudsters-use-ai-to-mimic-ceos-voice-in-unusual-cybercrime-case-11567157402\"><span style=\"font-weight: 400;\">it sounds exactly</span></a><span style=\"font-weight: 400;\"> like your manager on the phone – but the scammer </span><a href=\"https://www.forbes.com/sites/thomasbrewster/2021/10/14/huge-bank-fraud-uses-deep-fake-voice-tech-to-steal-millions/?sh=1329b80e7559\"><span style=\"font-weight: 400;\">is using a voice deepfake</span></a><span style=\"font-weight: 400;\">. In a recent major case in Hong Kong, such a scam even involved a </span><a href=\"https://edition.cnn.com/2024/02/04/asia/deepfake-cfo-scam-hong-kong-intl-hnk/index.html\"><span style=\"font-weight: 400;\">deepfake video call</span></a><span style=\"font-weight: 400;\">.</span>\r\n\r\n<span style=\"font-weight: 400;\">This is deeply challenging because artificial intelligence tools, such as Microsoft’s VALL-E, can create </span><a href=\"https://arstechnica.com/information-technology/2023/01/microsofts-new-ai-can-simulate-anyones-voice-with-3-seconds-of-audio/\"><span style=\"font-weight: 400;\">a voice deepfake</span></a><span style=\"font-weight: 400;\"> using just three seconds of sampled audio from a real person.</span>\r\n<h4><b>How can you defend yourself against a scam?</b></h4>\r\n<span style=\"font-weight: 400;\">First and foremost, verify identity. Find another way to contact the person to verify who they are. For example, you can call a generic number for the business and ask to be connected.</span>\r\n\r\n<span style=\"font-weight: 400;\">In the face of rampant voice deepfakes, it can be helpful to agree on a “safe word” with your family members. If they call from an unrecognised number and you don’t hear the safe word, just hang up.</span>\r\n\r\n<b>Read more in Daily Maverick: </b><a href=\"https://www.dailymaverick.co.za/article/2023-07-31-how-to-spot-an-online-scam-and-avoid-becoming-the-next-victim/\"><span style=\"font-weight: 400;\">How to spot an online scam and avoid becoming the next victim</span></a>\r\n\r\n<span style=\"font-weight: 400;\">Watch out for pressure tactics. If the conversation is moving too fast, remember that someone else’s problem is not yours to solve. Stop and run the problem past a colleague or family member for a sanity check. A legitimate business will have no problem with you doing this.</span>\r\n\r\n<span style=\"font-weight: 400;\">Last, if you are not sure about even the slightest detail, the simplest thing is to hang up or not respond. If you really owe a tax debt, SARS will write to you. </span><b>DM</b>\r\n\r\n<i><span style=\"font-weight: 400;\">First published by</span></i> <a href=\"https://theconversation.com/what-psychological-warfare-tactics-do-scammers-use-and-how-can-you-protect-yourself-223959\"><span style=\"font-weight: 400;\">The Conversation</span></a><span style=\"font-weight: 400;\">.</span>\r\n\r\n<i><span style=\"font-weight: 400;\">Mike Johnstone is a security researcher and associate professor in resilient systems at Edith Cowan University in Australia. Georgia Psaroulis is a postdoctoral research fellow at the university.</span></i>\r\n\r\n<i><span style=\"font-weight: 400;\">This story first appeared in our weekly </span></i><span style=\"font-weight: 400;\">Daily Maverick 168</span><i><span style=\"font-weight: 400;\"> newspaper, which is available countrywide for R29.</span></i>\r\n\r\n<img loading=\"lazy\" class=\"alignnone size-full wp-image-2077972\" src=\"https://www.dailymaverick.co.za/wp-content/uploads/2024/03/DM-02032024001.jpg\" alt=\"DM168\" width=\"720\" height=\"947\" />",
"teaser": "Not so fast! Watch out for these psychological techniques used by scammers — and how to protect yourself",
"externalUrl": "",
"sponsor": null,
"authors": [
{
"id": "930400",
"name": "Mike Johnstone and Georgia Psaroulis",
"image": "",
"url": "https://staging.dailymaverick.co.za/author/mike-johnstone-and-georgia-psaroulis/",
"editorialName": "mike-johnstone-and-georgia-psaroulis",
"department": "",
"name_latin": ""
}
],
"description": "",
"keywords": [
{
"type": "Keyword",
"data": {
"keywordId": "10244",
"name": "Cybercrime",
"url": "https://staging.dailymaverick.co.za/keyword/cybercrime/",
"slug": "cybercrime",
"description": "",
"articlesCount": 0,
"replacedWith": null,
"display_name": "Cybercrime",
"translations": null
}
},
{
"type": "Keyword",
"data": {
"keywordId": "44939",
"name": "AI",
"url": "https://staging.dailymaverick.co.za/keyword/ai/",
"slug": "ai",
"description": "",
"articlesCount": 0,
"replacedWith": null,
"display_name": "AI",
"translations": null
}
},
{
"type": "Keyword",
"data": {
"keywordId": "254830",
"name": "The Conversation",
"url": "https://staging.dailymaverick.co.za/keyword/the-conversation/",
"slug": "the-conversation",
"description": "",
"articlesCount": 0,
"replacedWith": null,
"display_name": "The Conversation",
"translations": null
}
},
{
"type": "Keyword",
"data": {
"keywordId": "372742",
"name": "cybercriminals",
"url": "https://staging.dailymaverick.co.za/keyword/cybercriminals/",
"slug": "cybercriminals",
"description": "",
"articlesCount": 0,
"replacedWith": null,
"display_name": "cybercriminals",
"translations": null
}
},
{
"type": "Keyword",
"data": {
"keywordId": "376675",
"name": "scammers",
"url": "https://staging.dailymaverick.co.za/keyword/scammers/",
"slug": "scammers",
"description": "",
"articlesCount": 0,
"replacedWith": null,
"display_name": "scammers",
"translations": null
}
},
{
"type": "Keyword",
"data": {
"keywordId": "415691",
"name": "deepfake",
"url": "https://staging.dailymaverick.co.za/keyword/deepfake/",
"slug": "deepfake",
"description": "",
"articlesCount": 0,
"replacedWith": null,
"display_name": "deepfake",
"translations": null
}
},
{
"type": "Keyword",
"data": {
"keywordId": "415692",
"name": "psychological warfare",
"url": "https://staging.dailymaverick.co.za/keyword/psychological-warfare/",
"slug": "psychological-warfare",
"description": "",
"articlesCount": 0,
"replacedWith": null,
"display_name": "psychological warfare",
"translations": null
}
}
],
"short_summary": null,
"source": null,
"related": [],
"options": [],
"attachments": [
{
"id": "17063",
"name": "Find another way to contact the person to verify who they are. For example, you can call a generic number for the business and ask to be connected. (Photo: Freepik)",
"description": "<span style=\"font-weight: 400;\">Not a day goes by without a headline about a </span><a href=\"https://www.vice.com/en/article/qjvaym/people-share-worst-scam-stories\"><span style=\"font-weight: 400;\">victim being scammed</span></a><span style=\"font-weight: 400;\"> and losing money. We are constantly warned about new scams and staying safe from cybercriminals.</span>\r\n\r\n<span style=\"font-weight: 400;\">So why are people still getting scammed, and sometimes spectacularly so?</span>\r\n\r\n<span style=\"font-weight: 400;\">Scammers use sophisticated psychological techniques. They exploit our deepest human vulnerabilities and bypass rational thought to tap into our emotional responses.</span>\r\n\r\n<span style=\"font-weight: 400;\">This “</span><a href=\"https://www.thecut.com/article/amazon-scam-call-ftc-arrest-warrants.html\"><span style=\"font-weight: 400;\">psychological warfare</span></a><span style=\"font-weight: 400;\">” coerces victims into making impulsive decisions. Sometimes scammers spread their methods around many potential victims to see who is vulnerable. Other times, criminals focus on a specific person.</span>\r\n\r\n<span style=\"font-weight: 400;\">Let’s explore some of these psychological techniques and how you can defend yourself against them.</span>\r\n<h4><b>Random phone calls</b></h4>\r\n<span style=\"font-weight: 400;\">Scammers start with small requests to establish a sense of commitment. After agreeing to these minor requests, we are more likely to comply with larger demands, driven by a desire to act consistently.</span>\r\n\r\n<span style=\"font-weight: 400;\">The call won’t come from a number in your contacts or one you recognise, but the scammer may pretend to be someone you’ve engaged to work on your house, or perhaps one of your children using a friend’s phone to call you.</span>\r\n<blockquote>They may threaten legal trouble to instil fear, promise high investment returns to exploit greed, or share fabricated distressing stories to elicit sympathy and financial assistance.</blockquote>\r\n<span style=\"font-weight: 400;\">If it is a scammer, maybe keeping you on the phone for a long time gives them an opportunity to find out things about you or people you know.</span>\r\n\r\n<span style=\"font-weight: 400;\">They can use this information either immediately or at a later date.</span>\r\n<h4><b>Creating a sense of urgency</b></h4>\r\n<span style=\"font-weight: 400;\">Scammers fabricate scenarios that require immediate action, like claiming a bank account is at risk of closure, or an offer is about to expire. This tactic aims to prevent victims from assessing the situation logically or seeking advice, pressuring them into rushed decisions.</span>\r\n\r\n<span style=\"font-weight: 400;\">The scammer creates an artificial situation in which you are frightened into doing something you wouldn’t ordinarily do. Scam calls alleging to be from the South African Revenue Service (SARS) are a great example. You have a debt to pay – apparently – and things will go badly if you do not pay right now.</span>\r\n\r\n<span style=\"font-weight: 400;\">Scammers play on your emotions to provoke reactions that cloud judgement. They may threaten legal trouble to instil fear, promise high investment returns to exploit greed, or share fabricated distressing stories to elicit sympathy and financial assistance.</span>\r\n<h4><b>Building rapport with casual talk</b></h4>\r\n<span style=\"font-weight: 400;\">Through extended conversation, scammers build a psychological commitment to their scheme. No one gets very far by just demanding your password, but it’s natural to be friendly with people who are friendly towards us.</span>\r\n\r\n<span style=\"font-weight: 400;\">After staying on the line for long periods the victim also becomes cognitively fatigued. This not only makes them more open to suggestions, but also isolates them from friends or family who might recognise and counteract the scam.</span>\r\n\r\n[caption id=\"attachment_2081958\" align=\"alignnone\" width=\"720\"]<img class=\"size-full wp-image-2081958\" src=\"https://www.dailymaverick.co.za/wp-content/uploads/2024/03/disappointed-girl-looking-her-phone.jpg\" alt=\"scammers\" width=\"720\" height=\"900\" /> <em>Find another way to contact the person to verify who they are. For example, you can call a generic number for the business and ask to be connected. (Photo: Freepik)</em>[/caption]\r\n<h4><b>Help me to help you</b></h4>\r\n<span style=\"font-weight: 400;\">In this case, the scammer creates a situation where they help you to solve a real or imaginary problem (that they actually created). They work their “IT magic” and the problem goes away.</span>\r\n\r\n<span style=\"font-weight: 400;\">Later, they ask you for something you wouldn’t normally do, and you do it because of the “social debt”: They helped you first.</span>\r\n\r\n<span style=\"font-weight: 400;\">For example, a hacker might attack a corporate network, causing it to slow down. Then they call you, pretending to be from your organisation, perhaps as a recent hire not yet on the company’s contact list. They “help” you by turning off the attack, leaving you suitably grateful.</span>\r\n\r\n<span style=\"font-weight: 400;\">Perhaps a week later, they call again and ask for sensitive information, such as the CEO’s password. You know company policy is not to divulge it, but the scammer will ask if you remember them (of course you do) and come up with an excuse for why they really need this password.</span>\r\n\r\n<span style=\"font-weight: 400;\">The balance of the social debt says you will help them.</span>\r\n<h4><b>Appealing to authority</b></h4>\r\n<span style=\"font-weight: 400;\">By posing as line managers, officials from government agencies, banks or other authoritative bodies, scammers exploit our natural tendency to obey authority.</span>\r\n\r\n<span style=\"font-weight: 400;\">Such scams operate at varying levels of sophistication. The simple version: Your manager messages you with an urgent request to buy some gift cards and send through their numbers.</span>\r\n<blockquote>If the conversation is moving too fast, remember that someone else’s problem is not yours to solve.</blockquote>\r\n<span style=\"font-weight: 400;\">The complex version: Your manager calls and asks to urgently transfer a large sum of money to an account you don’t recognise. You do this because </span><a href=\"https://www.wsj.com/articles/fraudsters-use-ai-to-mimic-ceos-voice-in-unusual-cybercrime-case-11567157402\"><span style=\"font-weight: 400;\">it sounds exactly</span></a><span style=\"font-weight: 400;\"> like your manager on the phone – but the scammer </span><a href=\"https://www.forbes.com/sites/thomasbrewster/2021/10/14/huge-bank-fraud-uses-deep-fake-voice-tech-to-steal-millions/?sh=1329b80e7559\"><span style=\"font-weight: 400;\">is using a voice deepfake</span></a><span style=\"font-weight: 400;\">. In a recent major case in Hong Kong, such a scam even involved a </span><a href=\"https://edition.cnn.com/2024/02/04/asia/deepfake-cfo-scam-hong-kong-intl-hnk/index.html\"><span style=\"font-weight: 400;\">deepfake video call</span></a><span style=\"font-weight: 400;\">.</span>\r\n\r\n<span style=\"font-weight: 400;\">This is deeply challenging because artificial intelligence tools, such as Microsoft’s VALL-E, can create </span><a href=\"https://arstechnica.com/information-technology/2023/01/microsofts-new-ai-can-simulate-anyones-voice-with-3-seconds-of-audio/\"><span style=\"font-weight: 400;\">a voice deepfake</span></a><span style=\"font-weight: 400;\"> using just three seconds of sampled audio from a real person.</span>\r\n<h4><b>How can you defend yourself against a scam?</b></h4>\r\n<span style=\"font-weight: 400;\">First and foremost, verify identity. Find another way to contact the person to verify who they are. For example, you can call a generic number for the business and ask to be connected.</span>\r\n\r\n<span style=\"font-weight: 400;\">In the face of rampant voice deepfakes, it can be helpful to agree on a “safe word” with your family members. If they call from an unrecognised number and you don’t hear the safe word, just hang up.</span>\r\n\r\n<b>Read more in Daily Maverick: </b><a href=\"https://www.dailymaverick.co.za/article/2023-07-31-how-to-spot-an-online-scam-and-avoid-becoming-the-next-victim/\"><span style=\"font-weight: 400;\">How to spot an online scam and avoid becoming the next victim</span></a>\r\n\r\n<span style=\"font-weight: 400;\">Watch out for pressure tactics. If the conversation is moving too fast, remember that someone else’s problem is not yours to solve. Stop and run the problem past a colleague or family member for a sanity check. A legitimate business will have no problem with you doing this.</span>\r\n\r\n<span style=\"font-weight: 400;\">Last, if you are not sure about even the slightest detail, the simplest thing is to hang up or not respond. If you really owe a tax debt, SARS will write to you. </span><b>DM</b>\r\n\r\n<i><span style=\"font-weight: 400;\">First published by</span></i> <a href=\"https://theconversation.com/what-psychological-warfare-tactics-do-scammers-use-and-how-can-you-protect-yourself-223959\"><span style=\"font-weight: 400;\">The Conversation</span></a><span style=\"font-weight: 400;\">.</span>\r\n\r\n<i><span style=\"font-weight: 400;\">Mike Johnstone is a security researcher and associate professor in resilient systems at Edith Cowan University in Australia. Georgia Psaroulis is a postdoctoral research fellow at the university.</span></i>\r\n\r\n<i><span style=\"font-weight: 400;\">This story first appeared in our weekly </span></i><span style=\"font-weight: 400;\">Daily Maverick 168</span><i><span style=\"font-weight: 400;\"> newspaper, which is available countrywide for R29.</span></i>\r\n\r\n<img class=\"alignnone size-full wp-image-2077972\" src=\"https://www.dailymaverick.co.za/wp-content/uploads/2024/03/DM-02032024001.jpg\" alt=\"DM168\" width=\"720\" height=\"947\" />",
"focal": "50% 50%",
"width": 0,
"height": 0,
"url": "https://dmcdn.whitebeard.net/dailymaverick/wp-content/uploads/2024/03/31.jpg",
"transforms": [
{
"x": "200",
"y": "100",
"url": "https://dmcdn.whitebeard.net/i/_hH7u3avQLBTEVzD3qSEXdLLYvs=/200x100/smart/filters:strip_exif()/file/dailymaverick/wp-content/uploads/2024/03/31.jpg"
},
{
"x": "450",
"y": "0",
"url": "https://dmcdn.whitebeard.net/i/R43HuH8nkw7WNIr85W9iV_AjvWw=/450x0/smart/file/dailymaverick/wp-content/uploads/2024/03/31.jpg"
},
{
"x": "800",
"y": "0",
"url": "https://dmcdn.whitebeard.net/i/N9hcO1W1D8u44OYc9XWp3UzU4yQ=/800x0/smart/filters:strip_exif()/file/dailymaverick/wp-content/uploads/2024/03/31.jpg"
},
{
"x": "1200",
"y": "0",
"url": "https://dmcdn.whitebeard.net/i/oi3eQSsu-LtbIwis3sKObTcBDKc=/1200x0/smart/filters:strip_exif()/file/dailymaverick/wp-content/uploads/2024/03/31.jpg"
},
{
"x": "1600",
"y": "0",
"url": "https://dmcdn.whitebeard.net/i/dBe5VU5lElWlXOhML7499etxFg4=/1600x0/smart/filters:strip_exif()/file/dailymaverick/wp-content/uploads/2024/03/31.jpg"
}
],
"url_thumbnail": "https://dmcdn.whitebeard.net/i/_hH7u3avQLBTEVzD3qSEXdLLYvs=/200x100/smart/filters:strip_exif()/file/dailymaverick/wp-content/uploads/2024/03/31.jpg",
"url_medium": "https://dmcdn.whitebeard.net/i/R43HuH8nkw7WNIr85W9iV_AjvWw=/450x0/smart/file/dailymaverick/wp-content/uploads/2024/03/31.jpg",
"url_large": "https://dmcdn.whitebeard.net/i/N9hcO1W1D8u44OYc9XWp3UzU4yQ=/800x0/smart/filters:strip_exif()/file/dailymaverick/wp-content/uploads/2024/03/31.jpg",
"url_xl": "https://dmcdn.whitebeard.net/i/oi3eQSsu-LtbIwis3sKObTcBDKc=/1200x0/smart/filters:strip_exif()/file/dailymaverick/wp-content/uploads/2024/03/31.jpg",
"url_xxl": "https://dmcdn.whitebeard.net/i/dBe5VU5lElWlXOhML7499etxFg4=/1600x0/smart/filters:strip_exif()/file/dailymaverick/wp-content/uploads/2024/03/31.jpg",
"type": "image"
}
],
"summary": "Scammers use ‘psychological warfare’ to get unsuspecting victims to part with valuable information or money. Here are some tips for how you can protect yourself.",
"template_type": null,
"dm_custom_section_label": null,
"elements": [],
"seo": {
"search_title": "Not so fast! Watch out for these psychological techniques used by scammers — and how to protect yourself",
"search_description": "<span style=\"font-weight: 400;\">Not a day goes by without a headline about a </span><a href=\"https://www.vice.com/en/article/qjvaym/people-share-worst-scam-stories\"><span style=\"font-weight: 400;\">vic",
"social_title": "Not so fast! Watch out for these psychological techniques used by scammers — and how to protect yourself",
"social_description": "<span style=\"font-weight: 400;\">Not a day goes by without a headline about a </span><a href=\"https://www.vice.com/en/article/qjvaym/people-share-worst-scam-stories\"><span style=\"font-weight: 400;\">vic",
"social_image": ""
},
"cached": true,
"access_allowed": true
}