HOW TO STAY SAFE
Porting Cell Number/ Sim Swops
Porting a cell number is when you transfer it to a different service provider. A SIM swap means replacing your physical SIM card with a new one using the same number. Both processes are legitimate services; however, scammers do try and use these to their advantage.
A fraudster, pretending to be you, calls your cell phone service provider and asks for a new SIM card or to transfer your number to a new service provider (porting). The fraudster will then have access to any OTP (one-time password), or 2-factor authentication requests sent to your number. This will allow the scammer to update your passwords and take control of your accounts and social media profiles.
How To Spot It
These are the red flags you should look out for:
- Unusual account activity or transactions.
- Notifications from your mobile service provider about SIM changes or updates to your account that you did not request.
What To Do
There are steps you can take to empower yourself to fight back against scams:
- Be vigilant: Be very cautious of any phone calls, phishing emails, or SMS messages asking for personal information or prompting you to do things related to something you did not request.
- Implement robust cybersecurity practices: Use strong and unique passwords, avoid public Wi-Fi when working with sensitive/ confidential information, and implement multi-factor authentication where possible.
- Report it: If you have been scammed, please report it immediately to the relevant organisation and/ or authorities, as well as the Yima reporting function below, or the Yima scams hotline.
Stop. Think. Verify. Don't get scammed!
HOW TO STAY SAFE
Advanced Fee Scams
This is when scammers trick victims into paying upfront fees, usually for discounted goods or services, with the promise of a prize, large payoff, or a gift that needs to be delivered, or even an inheritance that needs to be distributed.FIND OUT MOREInvestment Scams
Scammers create the illusion of amazing investment opportunities that will help you improve your financial status.FIND OUT MOREPhishing (Emails/Websites)
Phishing emails ask users to click on a link in the email. This link will direct them to a 'spoofed' website (a fake website that very closely resembles the original site) to obtain, verify or update contact details or other confidential information, including financial information.FIND OUT MOREMoney Mules
Fraudsters often trick people into letting them use their bank accounts to receive money from illegal activities - such as fraud, corruption, drug sales, smuggling, or even human trafficking. This tactic, known as money laundering, hides their identity by making transactions look legitimate.FIND OUT MOREOnline Shopping Scam
Online shopping and e-commerce channels have grown tremendously in the last few years as more and more people are turning to it for the convenience it offers in a fast-paced world, as well as the amazing deals you can find online. However, this has also created various opportunities for scammers to gain access to your information or to steal your hard-earned cash.FIND OUT MOREPush Payment Fraud
Push payment fraud is when a person is tricked into authorising a real-time transfer of funds to a scammer impersonating a trusted organisation, like a bank representative for example.FIND OUT MORERemote Access Scams
You are contacted by a scammer posing as a service provider that is known to you. They request 'remote access' to your device to do a security check, update or transaction.FIND OUT MORERomance Scams
As more and more of our lives exist online, it is no surprise that dating is as well. Many people turn to online platforms to find love and connection. There are many wonderful success stories, however, scammers have entered the chat, and they use sophisticated methods to deceive and trick unsuspecting victims who are simply looking for love.FIND OUT MOREVishing (Phone Calls)
Scammers phone individuals posing as a representative from an established organisation like a bank, mobile service provider, insurer, retailer, government body or even the police. This is also known as voice phishing or vishing.FIND OUT MOREAncestry Scams
These scams involve using a person's desire to connect with their heritage or cultural beliefs. Scammers create fake inheritance scenarios or fictitious ancestral demands from a sangoma (traditional healer).FIND OUT MORECommodity Scams
A commodity scam is a sophisticated scheme involving raw materials like agricultural products, precious metals, or energy.FIND OUT MOREEmployment Scams
Employment scams target people who are looking for jobs or employment opportunities. Scammers create fake job posts to lure people in, only to steal their money or personal information.FIND OUT MORESmishing (SMSs)
Smishing is short for 'SMS phishing'. This is when fraudsters send an SMS pretending to be an organisation asking for financial or personal information.FIND OUT MOREImpersonation Scams
Impersonation scams involve criminals pretending to be trusted individuals or representatives from reputable organisations with the aim of stealing your money or personal and confidential information.FIND OUT MOREQuishing (Malicious QR Codes)
Quishing, or QR code phishing, is a scam where criminals use malicious QR codes to trick people into visiting their fake websites, downloading malware onto their devices, sharing personal information or stealing your money.FIND OUT MORESocial Engineering
Social engineering is a tactic used by scammers to influence or deceive a victim in order to steal their personal/ financial information or money, or to gain control over a system. It is about about using your behaviour and what you share with the world against you, and exploits your trust. A common tactic by scammers is to create a fake profile and then befriend potential victims, taking great interest in their social lives. They use this connection to gain access to your life and information.FIND OUT MORECrypto Scams
Scammers create fake online investment trading platforms and investment houses, or crypto exchanges with the intention of stealing your money. They create professional looking marketing material and share posts on social media platforms to entice interest - promising fantastic returns for little investment. Their fake websites or mobile applications are designed to impress with technical layouts that imitate legitimate trading platforms.FIND OUT MOREBusiness Email Compromise
Business Email Compromise (BEC) is a sophisticated tactic where scammers impersonate high-ranking company officials or trusted partners through email or other messaging platforms to trick employees into making payments or sharing private and confidential business information.FIND OUT MORELoan/ Debt Collector Scams
A loan scam is when a criminal deceives an individual into applying for fake loans. The scammers request personal and confidential information which is later used for other criminal activities.FIND OUT MOREAdvanced Fee Scams
This is when scammers trick victims into paying upfront fees, usually for discounted goods or services, with the promise of a prize, large payoff, or a gift that needs to be delivered, or even an inheritance that needs to be distributed.FIND OUT MOREInvestment Scams
Scammers create the illusion of amazing investment opportunities that will help you improve your financial status.FIND OUT MOREPhishing (Emails/Websites)
Phishing emails ask users to click on a link in the email. This link will direct them to a 'spoofed' website (a fake website that very closely resembles the original site) to obtain, verify or update contact details or other confidential information, including financial information.FIND OUT MOREMoney Mules
Fraudsters often trick people into letting them use their bank accounts to receive money from illegal activities - such as fraud, corruption, drug sales, smuggling, or even human trafficking. This tactic, known as money laundering, hides their identity by making transactions look legitimate.FIND OUT MOREOnline Shopping Scam
Online shopping and e-commerce channels have grown tremendously in the last few years as more and more people are turning to it for the convenience it offers in a fast-paced world, as well as the amazing deals you can find online. However, this has also created various opportunities for scammers to gain access to your information or to steal your hard-earned cash.FIND OUT MOREPush Payment Fraud
Push payment fraud is when a person is tricked into authorising a real-time transfer of funds to a scammer impersonating a trusted organisation, like a bank representative for example.FIND OUT MORERemote Access Scams
You are contacted by a scammer posing as a service provider that is known to you. They request 'remote access' to your device to do a security check, update or transaction.FIND OUT MORERomance Scams
As more and more of our lives exist online, it is no surprise that dating is as well. Many people turn to online platforms to find love and connection. There are many wonderful success stories, however, scammers have entered the chat, and they use sophisticated methods to deceive and trick unsuspecting victims who are simply looking for love.FIND OUT MOREVishing (Phone Calls)
Scammers phone individuals posing as a representative from an established organisation like a bank, mobile service provider, insurer, retailer, government body or even the police. This is also known as voice phishing or vishing.FIND OUT MOREAncestry Scams
These scams involve using a person's desire to connect with their heritage or cultural beliefs. Scammers create fake inheritance scenarios or fictitious ancestral demands from a sangoma (traditional healer).FIND OUT MORECommodity Scams
A commodity scam is a sophisticated scheme involving raw materials like agricultural products, precious metals, or energy.FIND OUT MOREEmployment Scams
Employment scams target people who are looking for jobs or employment opportunities. Scammers create fake job posts to lure people in, only to steal their money or personal information.FIND OUT MORESmishing (SMSs)
Smishing is short for 'SMS phishing'. This is when fraudsters send an SMS pretending to be an organisation asking for financial or personal information.FIND OUT MOREImpersonation Scams
Impersonation scams involve criminals pretending to be trusted individuals or representatives from reputable organisations with the aim of stealing your money or personal and confidential information.FIND OUT MOREQuishing (Malicious QR Codes)
Quishing, or QR code phishing, is a scam where criminals use malicious QR codes to trick people into visiting their fake websites, downloading malware onto their devices, sharing personal information or stealing your money.FIND OUT MORESocial Engineering
Social engineering is a tactic used by scammers to influence or deceive a victim in order to steal their personal/ financial information or money, or to gain control over a system. It is about about using your behaviour and what you share with the world against you, and exploits your trust. A common tactic by scammers is to create a fake profile and then befriend potential victims, taking great interest in their social lives. They use this connection to gain access to your life and information.FIND OUT MORECrypto Scams
Scammers create fake online investment trading platforms and investment houses, or crypto exchanges with the intention of stealing your money. They create professional looking marketing material and share posts on social media platforms to entice interest - promising fantastic returns for little investment. Their fake websites or mobile applications are designed to impress with technical layouts that imitate legitimate trading platforms.FIND OUT MOREBusiness Email Compromise
Business Email Compromise (BEC) is a sophisticated tactic where scammers impersonate high-ranking company officials or trusted partners through email or other messaging platforms to trick employees into making payments or sharing private and confidential business information.FIND OUT MORELoan/ Debt Collector Scams
A loan scam is when a criminal deceives an individual into applying for fake loans. The scammers request personal and confidential information which is later used for other criminal activities.FIND OUT MOREAdvanced Fee Scams
This is when scammers trick victims into paying upfront fees, usually for discounted goods or services, with the promise of a prize, large payoff, or a gift that needs to be delivered, or even an inheritance that needs to be distributed.FIND OUT MOREInvestment Scams
Scammers create the illusion of amazing investment opportunities that will help you improve your financial status.FIND OUT MOREPhishing (Emails/Websites)
Phishing emails ask users to click on a link in the email. This link will direct them to a 'spoofed' website (a fake website that very closely resembles the original site) to obtain, verify or update contact details or other confidential information, including financial information.FIND OUT MOREMoney Mules
Fraudsters often trick people into letting them use their bank accounts to receive money from illegal activities - such as fraud, corruption, drug sales, smuggling, or even human trafficking. This tactic, known as money laundering, hides their identity by making transactions look legitimate.FIND OUT MOREOnline Shopping Scam
Online shopping and e-commerce channels have grown tremendously in the last few years as more and more people are turning to it for the convenience it offers in a fast-paced world, as well as the amazing deals you can find online. However, this has also created various opportunities for scammers to gain access to your information or to steal your hard-earned cash.FIND OUT MOREPush Payment Fraud
Push payment fraud is when a person is tricked into authorising a real-time transfer of funds to a scammer impersonating a trusted organisation, like a bank representative for example.FIND OUT MORERemote Access Scams
You are contacted by a scammer posing as a service provider that is known to you. They request 'remote access' to your device to do a security check, update or transaction.FIND OUT MORERomance Scams
As more and more of our lives exist online, it is no surprise that dating is as well. Many people turn to online platforms to find love and connection. There are many wonderful success stories, however, scammers have entered the chat, and they use sophisticated methods to deceive and trick unsuspecting victims who are simply looking for love.FIND OUT MOREVishing (Phone Calls)
Scammers phone individuals posing as a representative from an established organisation like a bank, mobile service provider, insurer, retailer, government body or even the police. This is also known as voice phishing or vishing.FIND OUT MOREAncestry Scams
These scams involve using a person's desire to connect with their heritage or cultural beliefs. Scammers create fake inheritance scenarios or fictitious ancestral demands from a sangoma (traditional healer).FIND OUT MORECommodity Scams
A commodity scam is a sophisticated scheme involving raw materials like agricultural products, precious metals, or energy.FIND OUT MOREEmployment Scams
Employment scams target people who are looking for jobs or employment opportunities. Scammers create fake job posts to lure people in, only to steal their money or personal information.FIND OUT MORESmishing (SMSs)
Smishing is short for 'SMS phishing'. This is when fraudsters send an SMS pretending to be an organisation asking for financial or personal information.FIND OUT MOREImpersonation Scams
Impersonation scams involve criminals pretending to be trusted individuals or representatives from reputable organisations with the aim of stealing your money or personal and confidential information.FIND OUT MOREQuishing (Malicious QR Codes)
Quishing, or QR code phishing, is a scam where criminals use malicious QR codes to trick people into visiting their fake websites, downloading malware onto their devices, sharing personal information or stealing your money.FIND OUT MORESocial Engineering
Social engineering is a tactic used by scammers to influence or deceive a victim in order to steal their personal/ financial information or money, or to gain control over a system. It is about about using your behaviour and what you share with the world against you, and exploits your trust. A common tactic by scammers is to create a fake profile and then befriend potential victims, taking great interest in their social lives. They use this connection to gain access to your life and information.FIND OUT MORECrypto Scams
Scammers create fake online investment trading platforms and investment houses, or crypto exchanges with the intention of stealing your money. They create professional looking marketing material and share posts on social media platforms to entice interest - promising fantastic returns for little investment. Their fake websites or mobile applications are designed to impress with technical layouts that imitate legitimate trading platforms.FIND OUT MOREBusiness Email Compromise
Business Email Compromise (BEC) is a sophisticated tactic where scammers impersonate high-ranking company officials or trusted partners through email or other messaging platforms to trick employees into making payments or sharing private and confidential business information.FIND OUT MORELoan/ Debt Collector Scams
A loan scam is when a criminal deceives an individual into applying for fake loans. The scammers request personal and confidential information which is later used for other criminal activities.FIND OUT MORE
















