Jeeves Security center

Learn to identify fraudulent phone calls and messages

The likelihood you'll receive a fake message is growing dramatically. Learn how to protect yourself and your team from fraudulent phishing attempts.

Common types of fraud and cybercrime

Here are the most common types of fraud and cybercrime that you and your team are likely to encounter.
Phishing
Phishing is a type of fraudulent activity, aimed at deceiving individuals into thinking they have received a legitimate email from a trusted entity, with the purpose of extracting personal or company information. The information obtained through this scam can vary, from online banking login credentials to social insurance numbers.
Vishing
Vishing is a scam similar to phishing, where the perpetrator poses as a representative of a reputable organization to obtain sensitive information (such as credit card details) through phone calls.
Smishing
Smishing is a type of scam where fraudsters impersonate a trustworthy entity and attempt to obtain sensitive information from your company and clients through text messages.
Malware
Malware refers to various types of harmful software, such as viruses, worms, Trojan horses, spyware, and adware. Malware can disrupt computer operations and provide unauthorized access to computer systems, sensitive information, and other resources, thereby enabling fraudsters to carry out malicious activities.
Ransomware
Ransomware is a form of malware that encrypts files and data, with fraudsters demanding payment from victims in exchange for the decryption and return of their files and data. Malicious attachments and misleading pop-up ads are common tactics used to lure victims into falling prey to ransomware attacks.
Business Email Compromise
Business email compromise (BEC) is a type of scam in which a fraudster impersonates a business owner, CEO, vendor, or lawyer through email. The fraudulent email usually requests a payment to be made via wire or electronic funds transfer and may include a fake invoice or altered payment information on a legitimate invoice in order to deceive the recipient into making the payment to the wrong account.
Facing a security issue?
We're always here to help! Please chat with our support team by logging into your dashboard, or visit our help center.
How to spot a phishing email
Missing verified Jeeves logo
All emails from Jeeves will be accompanied by a Jeeves logo as its recipient photo and a blue Gmail checkmark.
Generic greetings
Phishing messages often begin with impersonal greetings. “Dear user” or “Hello, Jeeves member” are definitely suspect. Messages from Jeeves will always use the full name listed in your account.
Attachments
Attachments can contain malware, so never open them unless you’re 100% sure they’re legitimate.
A sense of urgency
Don’t heed pleas for you to take fast action or warning you of problems that will compromise your account status.
Fake URL
If the web address is scrambled or looks suspect, don't click on anything and leave.
How to recognize a fake phone call
Never trust Caller ID
Scammers can easily fake a Caller ID, so don’t rely on it as confirmation a call is legitimate. Just because it says “Jeeves” doesn’t necessarily mean the call is from us.
Never share sensitive info
Attachments can contain malware, so never open them unless you’re 100% sure they’re legitimate.
Never return an automated call
Scammers use automated systems to make voice calls. If an automated call provides a number and asks you to call back, don’t. Only contact Jeeves through the Contact page in our Help Center.
How to browse websites safely
Don’t rely on the “s” in https
One letter used to make a big difference, but now the ”s” doesn’t always mean the site is legitimate because hackers can build encrypted sites, too.
Don’t rely on the padlock symbol
Authentic sites will have this icon in the address bar, but many fake sites do, too.
Type the URL directly yourself
Phishers create fake websites with URLs that are very similar to the real one. To be safe, enter the URL you want to visit manually.