The summer is the ideal time to declutter your home while earning some extra cash. I advise using shopping apps like Mercari or Poshmark to sell used clothing if you don’t have the time or inclination to battle the heat during a yard sale. In addition to being simple to use, the applications are a little safer than message boards like Craigslist or Facebook Marketplace.

The simplest approach to avoid a fraudster is to only accept cash when selling to local buyers in person. However, not everyone resides in a neighborhood where holding garage sales or clothes exchanges is common or even feasible. Apps that facilitate the purchasing and selling of used products provide ease for both buyers and sellers. They also provide a number of seller protections, such as money-back guarantees or customer service procedures for recovering losses in a fraud.

By selling locally on community boards, you might be able to shift your stuff more quickly, but you run the risk of letting con artists deceive you into linking your account to criminal activity.

DON’T TURN INTO A DIGITAL COMPLEMENT scammers use community boards to obtain Google Voice phone numbers (Opens in a new window) from dealers, according to a report from Marissa Bodnar of WGME in Portland, Maine. They then con other trusting sellers by using the hacked number.

According to the Identity Theft Resource Center’s (ITRC) breaks down the scam (Opens in a new window) :

“Online sellers are sought out by con artists, who then message them pretending to be potential buyers. The thieves then order a Google verification number to be supplied to the vendor. Then, in order to confirm that the vendor is a true one, they request the seller reveal the code. It’s a Google Voice scam, though, and the con artist is hoping the victim would divulge the code so they can use it to make a new Google Voice phone number connected to the seller. They then continue to con other people while avoiding detection while using the victim’s name.”

Not a member of Google Voice? Yet another victim may be you. According to the ITRC, con artists can create a Google Voice account and connect it to the phone number of the target of their calls. The con artist then makes a phony post using the same name as the real seller, selling the same goods, and takes money or personal data from purchasers while posing as the victim.

The Google Voice fraud was the subject of about 4,000 incident reports to the ITRC in 2021. 37% of the ITRC’s scam reports from the first half of 2022 are regarding scams.

RECOVERING A STEALTHY GOOGLE VOICE NUMBER This problem is recognized by Google. Getting your Google Voice number back if you’ve fallen for a number hijacking scam isn’t that difficult. To regain your Google Voice number, take these four steps:

1. Log in and select Settings on voice.google.com. Click New connected number under Linked number.
2. To connect your Google Voice number to your landline or mobile phone, enter the number.

3. Click the Verify by phone link and then click Call if the given number belongs to a landline. The code is provided over the phone by Google Voice. Select Verify after entering the code. When you click Send code while using a mobile device, Google Voice texts the code to the phone.

4. To connect the number to your account, click or tap the Claim icon.
If you still want to sell your goods online through a neighborhood community marketplace, use caution.

EDITORS’ RECOMMENDATION

Don’t accept a mobile payment (such as Venmo, Velle, PayPal, etc.) from a stranger.
Never put down a cheque that is for more than the purchase price.
Don’t give somebody you don’t know your Google Voice verification code or any other verification code.
To achieve insurance-backed identity theft remediation, invest in identity theft protection software.
Do you enjoy what you’re reading? Receive a weekly additional story in your mailbox. Become a subscriber to the SecurityWatch newsletter.

WHAT ELSE HAPPENED THIS WEEK IN THE SECURITY WORLD? US sanctions “Tornado Cash” for using cryptocurrency to fund North Korea. The Tornado Cash cryptocurrency mixing service is thought to have been used by the North Korean hackers to hide the proceeds of two significant heists from earlier this year.

Twitter: A Zero-Day Exploit was Used to Gain Access to User Data. It’s possible that 5.4 million Twitter accounts were impacted.

Smartwatches will reportedly be used in the UK to enable constant surveillance. Additionally, it may be envisaged that users of the watches will up to five times per day send images of themselves to a facial recognition system.

Ukraine clamps down a big bot farm that was spreading Russian propaganda. According to the Security Service of Ukraine, the bot farm was disseminating the propaganda online using 5,000 SIM cards and 200 proxy servers.

Attorneys General from US States Create a National Anti-Robocalling Task Force. The organization wants to punish telecom providers who enable international robocalls.
APPRECIATE WHAT YOU JUST READ? For direct delivery of our top privacy and security stories to your inbox, subscribe to the SecurityWatch newsletter.

Advertisements, discounts, and affiliate links could be found in this newsletter. You agree to our Terms of Use and Privacy Policy by subscribing to a newsletter. You are always free to unsubscribe from the newsletters.

SHARE
TWEET

You may also like