HOW TO STAY SAFE
Phishing (Emails From Scammers or Fake Websites)
Phishing emails ask users to click on a link in the email. This link will direct them to a 'spoofed' website (a fake website that very closely resembles the original site) to obtain, verify or update contact details or other confidential information, including financial information.
Scammers send these messages hoping to trick people into clicking on the links, sharing their information, verifying their details, or buying products from counterfeit platforms, thus capturing their card or online payment information.
The information phished by the scammers can then be used to commit other crimes and in many cases, card fraud.
How To Spot It
These are the red flags you should look out for:
- The email is unsolicited.
- They pressure you to act quickly. Be wary of a sense of urgency or pressure. Scammers try to rush you into making a decision or acting quickly, often threatening negative consequences if you do not follow their instructions.
- They ask you to confirm or provide confidential information. The email may ask you for personal or confidential information like your ID number, login credentials, banking details, account information, pin etc. Legitimate organisations will never ask for confidential information like your banking, pin or login details.
What To Do
There are steps you can take to empower yourself to fight back against scams:
- Do not click on any links or icons in unsolicited emails & do not reply: Instead, take a screenshot, including any URLs, for reporting purposes.
- Verify and do your research: Visit the institution's official website directly and contact them through trusted channels to verify the legitimacy of the email.
- Check the website: Use our Yima website vulnerability scanner to ensure the site is safe.
- Do not interact: Immediately block and report!
- Report it: Report the phishing email on the email application you use. If you have been scammed, please report it immediately to the relevant organisation and/ or authorities, as well as the Yima reporting function below, or the Yima scams hotline.
Stop. Think. Verify. Don't get scammed!
HOW TO STAY SAFE
Advanced Fee Scams
This is when scammers trick victims into paying upfront fees, usually for discounted goods or services, with the promise of a prize, large payoff, or a gift that needs to be delivered, or even an inheritance that needs to be distributed.FIND OUT MOREInvestment Scams
Scammers create the illusion of amazing investment opportunities that will help you improve your financial status.FIND OUT MOREMoney Mules
Fraudsters often trick people into letting them use their bank accounts to receive money from illegal activities - such as fraud, corruption, drug sales, smuggling, or even human trafficking. This tactic, known as money laundering, hides their identity by making transactions look legitimate.FIND OUT MOREOnline Shopping Scam
Online shopping and e-commerce channels have grown tremendously in the last few years as more and more people are turning to it for the convenience it offers in a fast-paced world, as well as the amazing deals you can find online. However, this has also created various opportunities for scammers to gain access to your information or to steal your hard-earned cash.FIND OUT MOREPush Payment Fraud
Push payment fraud is when a person is tricked into authorising a real-time transfer of funds to a scammer impersonating a trusted organisation, like a bank representative for example.FIND OUT MORERemote Access Scams
You are contacted by a scammer posing as a service provider that is known to you. They request 'remote access' to your device to do a security check, update or transaction.FIND OUT MORERomance Scams
As more and more of our lives exist online, it is no surprise that dating is as well. Many people turn to online platforms to find love and connection. There are many wonderful success stories, however, scammers have entered the chat, and they use sophisticated methods to deceive and trick unsuspecting victims who are simply looking for love.FIND OUT MOREVishing (Phone Calls)
Scammers phone individuals posing as a representative from an established organisation like a bank, mobile service provider, insurer, retailer, government body or even the police. This is also known as voice phishing or vishing.FIND OUT MOREAncestry Scams
These scams involve using a person's desire to connect with their heritage or cultural beliefs. Scammers create fake inheritance scenarios or fictitious ancestral demands from a sangoma (traditional healer).FIND OUT MORECommodity Scams
A commodity scam is a sophisticated scheme involving raw materials like agricultural products, precious metals, or energy.FIND OUT MOREEmployment Scams
Employment scams target people who are looking for jobs or employment opportunities. Scammers create fake job posts to lure people in, only to steal their money or personal information.FIND OUT MORESmishing (SMSs)
Smishing is short for 'SMS phishing'. This is when fraudsters send an SMS pretending to be an organisation asking for financial or personal information.FIND OUT MOREImpersonation Scams
Impersonation scams involve criminals pretending to be trusted individuals or representatives from reputable organisations with the aim of stealing your money or personal and confidential information.FIND OUT MOREQuishing (Malicious QR Codes)
Quishing, or QR code phishing, is a scam where criminals use malicious QR codes to trick people into visiting their fake websites, downloading malware onto their devices, sharing personal information or stealing your money.FIND OUT MORESocial Engineering
Social engineering is a tactic used by scammers to influence or deceive a victim in order to steal their personal/ financial information or money, or to gain control over a system. It is about about using your behaviour and what you share with the world against you, and exploits your trust. A common tactic by scammers is to create a fake profile and then befriend potential victims, taking great interest in their social lives. They use this connection to gain access to your life and information.FIND OUT MORECrypto Scams
Scammers create fake online investment trading platforms and investment houses, or crypto exchanges with the intention of stealing your money. They create professional looking marketing material and share posts on social media platforms to entice interest - promising fantastic returns for little investment. Their fake websites or mobile applications are designed to impress with technical layouts that imitate legitimate trading platforms.FIND OUT MOREBusiness Email Compromise
Business Email Compromise (BEC) is a sophisticated tactic where scammers impersonate high-ranking company officials or trusted partners through email or other messaging platforms to trick employees into making payments or sharing private and confidential business information.FIND OUT MORELoan/ Debt Collector Scams
A loan scam is when a criminal deceives an individual into applying for fake loans. The scammers request personal and confidential information which is later used for other criminal activities.FIND OUT MOREAdvanced Fee Scams
This is when scammers trick victims into paying upfront fees, usually for discounted goods or services, with the promise of a prize, large payoff, or a gift that needs to be delivered, or even an inheritance that needs to be distributed.FIND OUT MOREInvestment Scams
Scammers create the illusion of amazing investment opportunities that will help you improve your financial status.FIND OUT MOREMoney Mules
Fraudsters often trick people into letting them use their bank accounts to receive money from illegal activities - such as fraud, corruption, drug sales, smuggling, or even human trafficking. This tactic, known as money laundering, hides their identity by making transactions look legitimate.FIND OUT MOREOnline Shopping Scam
Online shopping and e-commerce channels have grown tremendously in the last few years as more and more people are turning to it for the convenience it offers in a fast-paced world, as well as the amazing deals you can find online. However, this has also created various opportunities for scammers to gain access to your information or to steal your hard-earned cash.FIND OUT MOREPush Payment Fraud
Push payment fraud is when a person is tricked into authorising a real-time transfer of funds to a scammer impersonating a trusted organisation, like a bank representative for example.FIND OUT MORERemote Access Scams
You are contacted by a scammer posing as a service provider that is known to you. They request 'remote access' to your device to do a security check, update or transaction.FIND OUT MORERomance Scams
As more and more of our lives exist online, it is no surprise that dating is as well. Many people turn to online platforms to find love and connection. There are many wonderful success stories, however, scammers have entered the chat, and they use sophisticated methods to deceive and trick unsuspecting victims who are simply looking for love.FIND OUT MOREVishing (Phone Calls)
Scammers phone individuals posing as a representative from an established organisation like a bank, mobile service provider, insurer, retailer, government body or even the police. This is also known as voice phishing or vishing.FIND OUT MOREAncestry Scams
These scams involve using a person's desire to connect with their heritage or cultural beliefs. Scammers create fake inheritance scenarios or fictitious ancestral demands from a sangoma (traditional healer).FIND OUT MORECommodity Scams
A commodity scam is a sophisticated scheme involving raw materials like agricultural products, precious metals, or energy.FIND OUT MOREEmployment Scams
Employment scams target people who are looking for jobs or employment opportunities. Scammers create fake job posts to lure people in, only to steal their money or personal information.FIND OUT MORESmishing (SMSs)
Smishing is short for 'SMS phishing'. This is when fraudsters send an SMS pretending to be an organisation asking for financial or personal information.FIND OUT MOREImpersonation Scams
Impersonation scams involve criminals pretending to be trusted individuals or representatives from reputable organisations with the aim of stealing your money or personal and confidential information.FIND OUT MOREQuishing (Malicious QR Codes)
Quishing, or QR code phishing, is a scam where criminals use malicious QR codes to trick people into visiting their fake websites, downloading malware onto their devices, sharing personal information or stealing your money.FIND OUT MORESocial Engineering
Social engineering is a tactic used by scammers to influence or deceive a victim in order to steal their personal/ financial information or money, or to gain control over a system. It is about about using your behaviour and what you share with the world against you, and exploits your trust. A common tactic by scammers is to create a fake profile and then befriend potential victims, taking great interest in their social lives. They use this connection to gain access to your life and information.FIND OUT MORECrypto Scams
Scammers create fake online investment trading platforms and investment houses, or crypto exchanges with the intention of stealing your money. They create professional looking marketing material and share posts on social media platforms to entice interest - promising fantastic returns for little investment. Their fake websites or mobile applications are designed to impress with technical layouts that imitate legitimate trading platforms.FIND OUT MOREBusiness Email Compromise
Business Email Compromise (BEC) is a sophisticated tactic where scammers impersonate high-ranking company officials or trusted partners through email or other messaging platforms to trick employees into making payments or sharing private and confidential business information.FIND OUT MORELoan/ Debt Collector Scams
A loan scam is when a criminal deceives an individual into applying for fake loans. The scammers request personal and confidential information which is later used for other criminal activities.FIND OUT MOREAdvanced Fee Scams
This is when scammers trick victims into paying upfront fees, usually for discounted goods or services, with the promise of a prize, large payoff, or a gift that needs to be delivered, or even an inheritance that needs to be distributed.FIND OUT MOREInvestment Scams
Scammers create the illusion of amazing investment opportunities that will help you improve your financial status.FIND OUT MOREMoney Mules
Fraudsters often trick people into letting them use their bank accounts to receive money from illegal activities - such as fraud, corruption, drug sales, smuggling, or even human trafficking. This tactic, known as money laundering, hides their identity by making transactions look legitimate.FIND OUT MOREOnline Shopping Scam
Online shopping and e-commerce channels have grown tremendously in the last few years as more and more people are turning to it for the convenience it offers in a fast-paced world, as well as the amazing deals you can find online. However, this has also created various opportunities for scammers to gain access to your information or to steal your hard-earned cash.FIND OUT MOREPush Payment Fraud
Push payment fraud is when a person is tricked into authorising a real-time transfer of funds to a scammer impersonating a trusted organisation, like a bank representative for example.FIND OUT MORERemote Access Scams
You are contacted by a scammer posing as a service provider that is known to you. They request 'remote access' to your device to do a security check, update or transaction.FIND OUT MORERomance Scams
As more and more of our lives exist online, it is no surprise that dating is as well. Many people turn to online platforms to find love and connection. There are many wonderful success stories, however, scammers have entered the chat, and they use sophisticated methods to deceive and trick unsuspecting victims who are simply looking for love.FIND OUT MOREVishing (Phone Calls)
Scammers phone individuals posing as a representative from an established organisation like a bank, mobile service provider, insurer, retailer, government body or even the police. This is also known as voice phishing or vishing.FIND OUT MOREAncestry Scams
These scams involve using a person's desire to connect with their heritage or cultural beliefs. Scammers create fake inheritance scenarios or fictitious ancestral demands from a sangoma (traditional healer).FIND OUT MORECommodity Scams
A commodity scam is a sophisticated scheme involving raw materials like agricultural products, precious metals, or energy.FIND OUT MOREEmployment Scams
Employment scams target people who are looking for jobs or employment opportunities. Scammers create fake job posts to lure people in, only to steal their money or personal information.FIND OUT MORESmishing (SMSs)
Smishing is short for 'SMS phishing'. This is when fraudsters send an SMS pretending to be an organisation asking for financial or personal information.FIND OUT MOREImpersonation Scams
Impersonation scams involve criminals pretending to be trusted individuals or representatives from reputable organisations with the aim of stealing your money or personal and confidential information.FIND OUT MOREQuishing (Malicious QR Codes)
Quishing, or QR code phishing, is a scam where criminals use malicious QR codes to trick people into visiting their fake websites, downloading malware onto their devices, sharing personal information or stealing your money.FIND OUT MORESocial Engineering
Social engineering is a tactic used by scammers to influence or deceive a victim in order to steal their personal/ financial information or money, or to gain control over a system. It is about about using your behaviour and what you share with the world against you, and exploits your trust. A common tactic by scammers is to create a fake profile and then befriend potential victims, taking great interest in their social lives. They use this connection to gain access to your life and information.FIND OUT MORECrypto Scams
Scammers create fake online investment trading platforms and investment houses, or crypto exchanges with the intention of stealing your money. They create professional looking marketing material and share posts on social media platforms to entice interest - promising fantastic returns for little investment. Their fake websites or mobile applications are designed to impress with technical layouts that imitate legitimate trading platforms.FIND OUT MOREBusiness Email Compromise
Business Email Compromise (BEC) is a sophisticated tactic where scammers impersonate high-ranking company officials or trusted partners through email or other messaging platforms to trick employees into making payments or sharing private and confidential business information.FIND OUT MORELoan/ Debt Collector Scams
A loan scam is when a criminal deceives an individual into applying for fake loans. The scammers request personal and confidential information which is later used for other criminal activities.FIND OUT MORE
















