Common X scams and how to protect yourself against them

 

Close lesson
You have completed 0%

Common X scams and how to protect yourself against them

A post on X with a fishing hook next to it

What's coming up?

Now that you have your X account set up and you are ready to use it, it’s time to learn about some common scams on X and what you can do to protect yourself against them.

Start activity

Phishing scams

A phishing scam is any scam that aims to fool people into disclosing personal and private information, such as passwords, bank details, or tax file numbers.

Phishing scammers use a range of tactics to get your information, but the most common is to get you to click or tap on a link that takes you to a what looks like the X sign-in page. The page is a fake, set up by the scammers to record your username and password, so they can pretend to be you online.

A scammer with a laptop, fishing pole and hook
A profile picture with a question mark on it

Protecting yourself against phishing scams

Protecting yourself from a phishing scam comes down to being wary of links that people send you. As a rule of thumb, if you don’t know the person, or company then do not click on the link!

If you have clicked on the link, check that the web page you’re looking at is legitimate by checking the URL, or address, in the address bar. For instance, X’s legitimate web address is https://twitter.com.

A bogus web page that is made to look like X’s sign-in page is likely to have a different URL.

Protecting yourself against phishing scams (cont'd)

If you have clicked on the link, check that the web page you’re looking at is legitimate by checking the URL, or address, in the address bar. For instance, X’s legitimate web address is https://twitter.com (because X used to be known as Twitter).

A bogus web page that is made to look like X’s sign-in page is likely to have a different URL.

A real vs fake twitter web address

Money-making scams

Some scammers craft elaborate stories to get you to give them money. They may set up a fake X account to pose as someone you know, then share a story of hardship and ask for money to help.

Other examples include scammers telling you that you’ve won a competition and that you need to send them some personal details in order to claim your prize.

An example of a post displaying a money-making scam
An example of a post showing a lottery scam

Protecting yourself against money-making scams

When it comes to competitions or special deals you learn about on X, if it seems too good to be true, it often is. If someone tells you that you’ve won a competition that you didn’t enter into, then it is likely a scam. Simply ignore the message and report the user to X.

If an X user claiming to be someone you know contacts you requesting money, it is a good idea to pick up the phone and call this person to see if it’s really them who is making the request.

Viruses and spyware

Similar to a phishing scam, some scammers will send you messages with links to click on. Often these sources look like legitimate companies or people you may know, but in fact they are not. When you click on these links, various viruses and spyware can be installed onto your device or computer, often without you knowing.

An example of a post containing a dodgy link
A virus attacking a mobile device

Protecting yourself against viruses and spyware

If you do not recognise or know the person or company who has sent you the link, do not click on it!

Even if you think you recognise the sender, and the email or message provides a link for you to enter personal details, don’t click on it. Reputable businesses and organisations will never request personal information in this way.

In addition, you should ensure that your device or computer has the latest antivirus software installed to help protect you from attack.

Nice work!

You have just completed the Common X scams and how to protect yourself against them activity.

This now brings you to the end of the Introduction to X (formerly known as Twitter) course. If you’re a registered user, you can now complete a short quiz to test your learning. If you’re not registered, this is now the end of this course.

A mobile device with a lock on the screen