Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecuritySecurity NewswireCybersecurity News

FBI Warns of Cyber-Based Romance Scams

insider-enews
February 6, 2020

The Federal Bureau of Investigation (FBI) is warning Americans to be on the lookout for cyber-based romance scams.  

"Well-rehearsed criminals search dating sites, apps, chat rooms, and other social media networking sites attempting to build “relationships” for the sole purpose of getting your money or your personally identifiable information," says the FBI. 

FBI Richmond suggests taking these points into consideration to avoid becoming a victim.

  • Only use reputable, nationally-recognized dating websites; however, be aware that scammers may be using them too.
  • Research photos and profiles in other online search tools and ask questions.
  • Never provide your financial information, loan money, nor allow your bank accounts to be used for transfers of funds.
  • Do not allow attempts to isolate you from family and friends.
  • Do not blindly believe the stories of severe life circumstances, tragedies, family deaths, injuries, or other hardships geared at keeping your interest and concern.
  • If you are planning to meet someone in person you have met online, meet in a public place and let someone know where you will be and what time you should return home.
  • If you are traveling to a foreign country to meet someone check the State Department’s Travel Advisories beforehand (http://travel.state.gov/), provide your itinerary to family and friends, and do not travel alone if possible.

"Victims may be hesitant to report being taken advantage of due to embarrassment, shame or humiliation. It’s important to remember, romance scams can happen to anyone at any time," says the FBI.

If you suspect your online relationship is a scam, cease all contact immediately. If you are a victim who has already sent money, immediately report the incident to your financial institution, file a complaint with the FBI’s Internet Crimes Complaint Center (www.ic3.gov), and contact law enforcement. 

“Cybercrime is associated with technological tricks and an attackers ability to bypass and evade security controls. However, what is just as commonly used are social engineering tricks that manipulate the human psyche through emotions," says Chris Morales, head of security analytics at Vectra. "Defending against technology-based attacks, such as malware, requires the use of technology controls, but defending against social engineering becomes a mental game. Social engineering isn’t new to the cyber world. It has been in use for as long as people have existed. For example, a simple form could be a child manipulating a parent to purchase a toy. The intent of social engineering is to influence people into taking action that might not be in their best interest."

"Which is why cybercriminals have caught on," he continues. "Holidays like Valentine’s Day are a particular focal point for social engineering tricks as people tend to have elevated emotions. As many people feel particularly lonely on this day, any kind of attention would be comforting. It is unfortunate that many online predators would be manipulate strong emotions to influence people into performing acts such as sending a financial transaction to someone who they have never met. No matter how desirable a person may sound online, everyone must tread with caution. Only trust those you know in person and even then be cautious. In our connected society, everyone needs to remember to remember a basic rule we were taught as a child, especially with people you can’t even look in the eye. Don’t talk to strangers.”

"For cybercriminals, Valentine’s Day is just another holiday and the opportunity for just another scam. If you don’t know who the mark is, it’s most likely you," Terrence Jackson, CISO at Thycotic says. "Phishing is still the attackers weapon of choice and there will be no shortage of well-crafted emails and messages designed to emotionally engage you and prevent you from making rational decisions. Here are some practical step that can help you protect your heart and your wallet:

  1. If it sounds too good to be true, it usually is.
  2. Stay clear of stories that pull at your heart strings from unsolicited sources or strangers that are requesting money.
  3. Never share usernames, passwords, bank account numbers or credit card numbers with strangers.
  4. Use common sense. That Romeo or Juliet is more likely a scammer than your soul mate.
  5. If the request is from someone familiar, call them to verify the request, don’t just take a social media message at face value.
  6. If your new “love” is on a dating app and one of the first request is for money…..Run like the wind!
KEYWORDS: cyber security cybersecurity FBI scams social engineering

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Security Leadership and Management
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Cyber Tactics Column
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Cybersecurity Education & Training
    By: Charles Denyer
Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Pills spilled

More than 20,000 sensitive medical records exposed

Laptop in darkness

Verizon 2025 Data Breach Investigations Report shows rise in cyberattacks

Coding on screen

Research reveals mass scanning and exploitation campaigns

White post office truck

Department of Labor Sues USPS Over Texas Whistleblower Termination

Computer with binary code hovering nearby

Cyberattacks Targeting US Increased by 136%

2025 Security Benchmark banner

Events

May 22, 2025

Proactive Crisis Communication

Crisis doesn't wait for the right time - it strikes when least expected. Is your team prepared to communicate clearly and effectively when it matters most?

September 29, 2025

Global Security Exchange (GSX)

 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Phone screen with two heart emojis and a kissing emoji

    The FBI warns of the prevalence of romance scams this Valentine's Day

    See More
  • vishing campaign rise amid COVID-19 work from home restrictions says FBI

    FBI warns companies of surge in voice call phishing scams

    See More
  • online dating

    Don't fall victim to cyber romance scams

    See More

Related Products

See More Products
  • databasehacker

    The Database Hacker's Handboo

See More Products

Events

View AllSubmit An Event
  • June 20, 2024

    Turning Threats into Solutions in Today's Cyber Landscape

    ON DEMAND: This webinar will also explore lessons learned and the evolving threat landscape of cybersecurity within local governments and how these key challenges and tactics can develop an effective security strategy.
View AllSubmit An Event
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing