Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecuritySecurity NewswireCybersecurity News

FBI Warns of Cyber-Based Romance Scams

insider-enews
February 6, 2020

The Federal Bureau of Investigation (FBI) is warning Americans to be on the lookout for cyber-based romance scams.  

"Well-rehearsed criminals search dating sites, apps, chat rooms, and other social media networking sites attempting to build “relationships” for the sole purpose of getting your money or your personally identifiable information," says the FBI. 

FBI Richmond suggests taking these points into consideration to avoid becoming a victim.

  • Only use reputable, nationally-recognized dating websites; however, be aware that scammers may be using them too.
  • Research photos and profiles in other online search tools and ask questions.
  • Never provide your financial information, loan money, nor allow your bank accounts to be used for transfers of funds.
  • Do not allow attempts to isolate you from family and friends.
  • Do not blindly believe the stories of severe life circumstances, tragedies, family deaths, injuries, or other hardships geared at keeping your interest and concern.
  • If you are planning to meet someone in person you have met online, meet in a public place and let someone know where you will be and what time you should return home.
  • If you are traveling to a foreign country to meet someone check the State Department’s Travel Advisories beforehand (http://travel.state.gov/), provide your itinerary to family and friends, and do not travel alone if possible.

"Victims may be hesitant to report being taken advantage of due to embarrassment, shame or humiliation. It’s important to remember, romance scams can happen to anyone at any time," says the FBI.

If you suspect your online relationship is a scam, cease all contact immediately. If you are a victim who has already sent money, immediately report the incident to your financial institution, file a complaint with the FBI’s Internet Crimes Complaint Center (www.ic3.gov), and contact law enforcement. 

“Cybercrime is associated with technological tricks and an attackers ability to bypass and evade security controls. However, what is just as commonly used are social engineering tricks that manipulate the human psyche through emotions," says Chris Morales, head of security analytics at Vectra. "Defending against technology-based attacks, such as malware, requires the use of technology controls, but defending against social engineering becomes a mental game. Social engineering isn’t new to the cyber world. It has been in use for as long as people have existed. For example, a simple form could be a child manipulating a parent to purchase a toy. The intent of social engineering is to influence people into taking action that might not be in their best interest."

"Which is why cybercriminals have caught on," he continues. "Holidays like Valentine’s Day are a particular focal point for social engineering tricks as people tend to have elevated emotions. As many people feel particularly lonely on this day, any kind of attention would be comforting. It is unfortunate that many online predators would be manipulate strong emotions to influence people into performing acts such as sending a financial transaction to someone who they have never met. No matter how desirable a person may sound online, everyone must tread with caution. Only trust those you know in person and even then be cautious. In our connected society, everyone needs to remember to remember a basic rule we were taught as a child, especially with people you can’t even look in the eye. Don’t talk to strangers.”

"For cybercriminals, Valentine’s Day is just another holiday and the opportunity for just another scam. If you don’t know who the mark is, it’s most likely you," Terrence Jackson, CISO at Thycotic says. "Phishing is still the attackers weapon of choice and there will be no shortage of well-crafted emails and messages designed to emotionally engage you and prevent you from making rational decisions. Here are some practical step that can help you protect your heart and your wallet:

  1. If it sounds too good to be true, it usually is.
  2. Stay clear of stories that pull at your heart strings from unsolicited sources or strangers that are requesting money.
  3. Never share usernames, passwords, bank account numbers or credit card numbers with strangers.
  4. Use common sense. That Romeo or Juliet is more likely a scammer than your soul mate.
  5. If the request is from someone familiar, call them to verify the request, don’t just take a social media message at face value.
  6. If your new “love” is on a dating app and one of the first request is for money…..Run like the wind!
KEYWORDS: cyber security cybersecurity FBI scams social engineering

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Cyber tech background

    Security’s Top Cybersecurity Leaders 2026

    Security magazine’s Top Cybersecurity Leaders 2026 award...
    Top Cybersecurity Leaders
  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Columns
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

Popular Stories

Pixelated brain

Critical Thinking Erosion: A Hidden Threat to Security Career Resilience

Red block among white blocks

Plenty of Associations, But Not Enough Association

Person on iPhone

The Olympics Are Going Mobile — Your Security Strategy Has to Follow

Phone showing hearts and flirty emojis

Valentine’s Day 2026: Inside the Industrial-Scale Romance Scam Economy

Red and blue pawns with thought bubbles

Implementing Meaningful De-Escalation Training in Your Security Program

SEC 2026 Benchmark Banner

Events

April 8, 2026

The Future of Executive Protection: Layering Technology, Intelligence, and Response

Digital threats to executives and other high-profile employees are evolving faster than most corporate protection programs. Learn why modern executive protection programs require data-driven, intelligence-led strategies to keep pace with the magnitude of today’s threats.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
SEC 2026 Top Cybersecurity Leaders

Related Articles

  • Phone screen with two heart emojis and a kissing emoji

    The FBI warns of the prevalence of romance scams this Valentine's Day

    See More
  • vishing campaign rise amid COVID-19 work from home restrictions says FBI

    FBI warns companies of surge in voice call phishing scams

    See More
  • online dating

    Don't fall victim to cyber romance scams

    See More

Related Products

See More Products
  • 1119490936.jpg

    Solving Cyber Risk: Protecting Your Company and Society

  • 9780367339456.jpg.jpg.jpg

    Cyber Strategy: Risk-Driven Security and Resiliency

  • 9780367221942.jpg

    From Visual Surveillance to Internet of Things: Technology and Applications

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing