Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecuritySecurity NewswireCybersecurity News

FBI Warns of Cyber-Based Romance Scams

insider-enews
February 6, 2020

The Federal Bureau of Investigation (FBI) is warning Americans to be on the lookout for cyber-based romance scams.  

"Well-rehearsed criminals search dating sites, apps, chat rooms, and other social media networking sites attempting to build “relationships” for the sole purpose of getting your money or your personally identifiable information," says the FBI. 

FBI Richmond suggests taking these points into consideration to avoid becoming a victim.

  • Only use reputable, nationally-recognized dating websites; however, be aware that scammers may be using them too.
  • Research photos and profiles in other online search tools and ask questions.
  • Never provide your financial information, loan money, nor allow your bank accounts to be used for transfers of funds.
  • Do not allow attempts to isolate you from family and friends.
  • Do not blindly believe the stories of severe life circumstances, tragedies, family deaths, injuries, or other hardships geared at keeping your interest and concern.
  • If you are planning to meet someone in person you have met online, meet in a public place and let someone know where you will be and what time you should return home.
  • If you are traveling to a foreign country to meet someone check the State Department’s Travel Advisories beforehand (http://travel.state.gov/), provide your itinerary to family and friends, and do not travel alone if possible.

"Victims may be hesitant to report being taken advantage of due to embarrassment, shame or humiliation. It’s important to remember, romance scams can happen to anyone at any time," says the FBI.

If you suspect your online relationship is a scam, cease all contact immediately. If you are a victim who has already sent money, immediately report the incident to your financial institution, file a complaint with the FBI’s Internet Crimes Complaint Center (www.ic3.gov), and contact law enforcement. 

“Cybercrime is associated with technological tricks and an attackers ability to bypass and evade security controls. However, what is just as commonly used are social engineering tricks that manipulate the human psyche through emotions," says Chris Morales, head of security analytics at Vectra. "Defending against technology-based attacks, such as malware, requires the use of technology controls, but defending against social engineering becomes a mental game. Social engineering isn’t new to the cyber world. It has been in use for as long as people have existed. For example, a simple form could be a child manipulating a parent to purchase a toy. The intent of social engineering is to influence people into taking action that might not be in their best interest."

"Which is why cybercriminals have caught on," he continues. "Holidays like Valentine’s Day are a particular focal point for social engineering tricks as people tend to have elevated emotions. As many people feel particularly lonely on this day, any kind of attention would be comforting. It is unfortunate that many online predators would be manipulate strong emotions to influence people into performing acts such as sending a financial transaction to someone who they have never met. No matter how desirable a person may sound online, everyone must tread with caution. Only trust those you know in person and even then be cautious. In our connected society, everyone needs to remember to remember a basic rule we were taught as a child, especially with people you can’t even look in the eye. Don’t talk to strangers.”

"For cybercriminals, Valentine’s Day is just another holiday and the opportunity for just another scam. If you don’t know who the mark is, it’s most likely you," Terrence Jackson, CISO at Thycotic says. "Phishing is still the attackers weapon of choice and there will be no shortage of well-crafted emails and messages designed to emotionally engage you and prevent you from making rational decisions. Here are some practical step that can help you protect your heart and your wallet:

  1. If it sounds too good to be true, it usually is.
  2. Stay clear of stories that pull at your heart strings from unsolicited sources or strangers that are requesting money.
  3. Never share usernames, passwords, bank account numbers or credit card numbers with strangers.
  4. Use common sense. That Romeo or Juliet is more likely a scammer than your soul mate.
  5. If the request is from someone familiar, call them to verify the request, don’t just take a social media message at face value.
  6. If your new “love” is on a dating app and one of the first request is for money…..Run like the wind!
KEYWORDS: cyber security cybersecurity FBI scams social engineering

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Career Intelligence
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Phone screen with two heart emojis and a kissing emoji

    The FBI warns of the prevalence of romance scams this Valentine's Day

    See More
  • vishing campaign rise amid COVID-19 work from home restrictions says FBI

    FBI warns companies of surge in voice call phishing scams

    See More
  • online dating

    Don't fall victim to cyber romance scams

    See More

Related Products

See More Products
  • 1119490936.jpg

    Solving Cyber Risk: Protecting Your Company and Society

  • 9780367339456.jpg.jpg.jpg

    Cyber Strategy: Risk-Driven Security and Resiliency

  • 9780367221942.jpg

    From Visual Surveillance to Internet of Things: Technology and Applications

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing