Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecuritySecurity NewswireCybersecurity News

The FBI warns of the prevalence of romance scams this Valentine's Day

By Security Staff
Phone screen with two heart emojis and a kissing emoji

Image via Unsplash

February 14, 2024

With the arrival of Valentine’s day, the FBI’s Cleveland division has issued a warning regarding romance scams. Perpetrators of these scams use online dating platforms or social media to deceive targets, establishing fake relationships and gaining the target’s trust before requesting money, gift cards, cryptocurrency or private information. In 2022, the FBI received 19,000 complaints about romance scams. The estimated loss from these scams is at least $739 million.

The typical targets are divorced, widowed, elderly or disabled women over the age of 40, although anyone can be the victim of a romance scam. Romance scammers will typically avoid meeting in person by claiming to live in another state or country. To avoid being the victim of a romance scam, the FBI advises that people should never send money or personal information to someone they’ve never met.

Awareness of romance scams can keep potential targets alert and safe. Security experts weigh in on how people can avoid these malicious actors online.  

Security experts weigh in

Claude Mandy, Chief Evangelist for Data Security at Symmetry Systems: 

“It is important to reflect on the increasing threat that Generative AI's growing, and easily available capabilities pose. Gen AI is already being used very successful to improve social engineering particularly in dating and romance scams. Cybercriminals are able to leverage generative AI to create convincing and almost foolproof personas from expected text and email responses to realistic images, audio and videos. The ease of deceiving individuals into believing false narratives or identities is unprecedented as a result.

Advice: 

  1. Individuals should exercise caution. Social engineering tactics often focus on compromising accounts or persuading individuals to make payments to criminals. avoid sharing sensitive info, look for signs of gen ai usage, Employ reverse image searches, enable MFA.
  2. Dating sites also play a key role. Implement robust identity verification measures, employ advanced fraud detection algorithms to reduce the use of bots etc. implement advanced content moderation tools to detect and remove fraudulent visual content.
  3. Organizations should realize that the ease of compromising passwords has never been higher and invest in phishing resistant MFA. Also ensuring that they focus on reducing the volume and sensitivity of data that can be accessed that isn’t required.”

Bud Broomhead, CEO at Viakoo:

“Romance scams are popular with cyber criminals because they work, are hard to recover money from, and have a higher chance of not being reported. Romance scams follow a playbook familiar to scammers; they leverage relationships that are meant to be based on trust. Other very popular variations of this scam are impersonating a CEO or high level manager in order to have an employee send money or gift cards, or a grandmother getting a call late at night from someone pretending to be their grandchild and needing urgent financial assistance. As overall corporate IT security improves and becomes more automated scammers and threat actors are turning to other forms of cyber crime to make money, romance scams being one of them.  The vast amounts of personal information that is available to cyber criminals makes their starting point much easier than before:  they already know a victim’s financial situation, how connected they are to other people, whether they recently ended another relationship, where from and when they last moved residence, and many other forms of personal information.  With more advanced AI capabilities (ChatGPT and others) in the hands of cyber criminals the threat is that romance scams can be automated at scale, and developed over a longer period of time to gain additional trust. Deepfake images, AI-generated conversations, and emotion analysis can or soon will be performed at a large scale, making current romance scams into a mild warm-up to the main event that is coming.  To prepare for the coming AI-driven onslaught more education and training is needed, with people needing to become more practiced and better at detecting such scams.  Online courses and other training can and should be part of general cybersecurity awareness training.”




KEYWORDS: cyber awareness holiday crime scam social media

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Career Intelligence
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

The Lourve

The Lourve Heist: What Was the State of the Museum’s Security?

The 2025 Security Benchmark Report

The 2025 Security Benchmark Report

Office supplies

Security Leaders Share Why 77% Organizations Lose Data Due to Insider Risks

American Airlines

Security Leaders Discuss Cyberattack on American Airlines Subsidiary

Going Down with the Ship

Going Down with the Ship

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

November 17, 2025

SECURITY 500 Conference

This event is designed to provide security executives, government officials and leaders of industry with vital information on how to elevate their programs while allowing attendees to share their strategies and solutions with other security industry executives.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • insider-enews

    FBI Warns of Cyber-Based Romance Scams

    See More
  • vishing campaign rise amid COVID-19 work from home restrictions says FBI

    FBI warns companies of surge in voice call phishing scams

    See More
  • FBI Warns All Businesses that They Are Now the Target of Cyberfraud and Cybertheft

    See More

Related Products

See More Products
  • Physical Security and Safety: A Field Guide for the Practitioner

  • The Database Hacker's Handboo

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing