Tips for Dealing with Dangerous Tax Scams

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7
Next Tips for Dealing with Dangerous Tax Scams-2 Next

Phishing

Fake emails pretend to be from a trusted authority like the Internal Revenue Service (IRS), tax software vendor (e.g., TurboTax), or a tax preparer (e.g., H&R Block). Links in the emails direct you to a website that directs you to enter sensitive personal information such as bank account information or Social Security numbers. Once entered, the data is stolen and used for identify theft or tax fraud.

Don't click on links in emails. Instead, go directly to the site by typing in the URL or entering it in a search engine. Note that the IRS does not initiate taxpayer communications by email or other messaging services. Unsolicited email claiming to be from the IRS, or from an IRS-related component such as Electronic Federal Tax Payment System (EFTPS), should be reported to the IRS at phishing@irs.gov. Also, be careful of the sites you visit. Malicious sites can look authentic. Look carefully at the web address, or URL, and confirm that there are no typos or misspellings.

Cyber criminals and scammers view tax season as a prime opportunity. There are many ways that you can fall victim to their attacks and scams. The IRS has issued numerous consumer warnings about the fraudulent use of the IRS name or logo by scammers that are trying to trick consumers into providing their personal information (identity theft) in order to steal their financial assets or commit fraud. In addition, tax preparers and tax software vendors are often impersonated. Scammers use email, the web, postal mail, telephone and fax to set up their victims.

In this slideshow, Marie White, CEO of Security Mentor, a security awareness provider, discusses some of the serious tax scams and tax fraud, and offer ways to help you avoid them.

 

Related Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

 
More Slideshows

BitSightRansomware0x Ransomware: The Rising Face of Cybercrime

Ransomware is a legitimate threat, with estimates from the U.S. Department of Justice showing that over 4,000 of these attacks have occurred every day since the beginning of the year. ...  More >>

Security121-190x128 5 Ways CFOs Can Implement an Effective Cybersecurity Strategy

While cybersecurity concerns are widespread, finance remains one of the most vulnerable areas for malicious attacks. ...  More >>

infra100-190x128 Top 10 Strategic Technology Trends for 2017

Here are the top 10 strategic technology trends that will impact most organizations in 2017. Strategic technology trends are defined as those with substantial disruptive potential or those reaching the tipping point over the next five years. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.