9,075
edits
Drew Jackson (talk | contribs) |
|||
Line 1: | Line 1: | ||
{{REVIEWEDPLS | reviewer = [[People's Law School]]|date= March 2017}}{{Scams to Avoid TOC}} | {{REVIEWEDPLS | reviewer = [[People's Law School]]|date= March 2017}}{{Scams to Avoid TOC}} | ||
;Catphishing: When someone assumes a fake identity to lure another person into an emotional or romantic relationship with them, so they can trick them out of their money. | ;Catphishing: When someone assumes a fake identity to lure another person into an emotional or romantic relationship with them, so they can trick them out of their money. | ||
Line 18: | Line 8: | ||
;Credit: The ability to obtain money or value based on trust that payment will be made in the future. | ;Credit: The ability to obtain money or value based on trust that payment will be made in the future. | ||
;Credit report: A detailed list of a | ;Credit report: A detailed list of a person's credit and bill-paying history, and other information about them. | ||
;Credit score: A number that expresses the information in a | ;Credit score: A number that expresses the information in a person's credit report at one point in time. The score indicates the risk the person represents for lenders, compared with other people, on a scale from 300 to 900. The higher the score, the lower the risk for lenders. | ||
;Creditor: A person or company to whom another person owes money or an obligation. | ;Creditor: A person or company to whom another person owes money or an obligation. | ||
Line 28: | Line 18: | ||
;Fraud: To intentionally deceive someone in order to gain an unfair or illegal advantage. | ;Fraud: To intentionally deceive someone in order to gain an unfair or illegal advantage. | ||
;Identity theft: When someone takes personal information and uses it to access that | ;Identity theft: When someone takes personal information and uses it to access that person's finances, make purchases in their name, or commit other crimes. | ||
;Malware: Software used to disrupt use of a computer or other device or gain access to sensitive information on the device. | ;Malware: Software used to disrupt use of a computer or other device or gain access to sensitive information on the device. | ||
;Phishing: When someone sends a fake email or text to trick a person into handing over personal and financial information. Their message is being used as bait to | ;Phishing: When someone sends a fake email or text to trick a person into handing over personal and financial information. Their message is being used as bait to "fish" for victims. | ||
;Scam: An illegal or dishonest scheme to trick people out of their money. | ;Scam: An illegal or dishonest scheme to trick people out of their money. |
edits