{"id":132988,"date":"2024-03-26T06:59:00","date_gmt":"2024-03-26T13:59:00","guid":{"rendered":"https:\/\/www.mcafee.com\/blogs\/?p=132988"},"modified":"2024-06-19T07:16:40","modified_gmt":"2024-06-19T14:16:40","slug":"quizzes-and-other-identity-theft-schemes-to-avoid-on-social-media","status":"publish","type":"post","link":"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/quizzes-and-other-identity-theft-schemes-to-avoid-on-social-media\/","title":{"rendered":"Quizzes and Other Identity Theft Schemes to Avoid on Social Media"},"content":{"rendered":"<p><span data-contrast=\"auto\">Before you take the\u00a0fun-looking\u00a0quiz that\u00a0popped\u00a0up in your social media feed, think twice. The person\u00a0holding the answers\u00a0may be a hacker.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Where people go, hackers are sure to follow. So it\u2019s no surprise hackers have set up shop on social media. This has been the case for years, yet now social media-based crime is on the rise. Since 2021, total <\/span><a href=\"https:\/\/www.ftc.gov\/news-events\/data-visualizations\/data-spotlight\/2023\/10\/social-media-golden-goose-scammers\" target=\"_blank\" rel=\"noopener\"><span data-contrast=\"none\">reported losses to this type of fraud reached $2.7 billion<\/span><\/a><span data-contrast=\"auto\">.\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Among these losses are cases of <a href=\"https:\/\/www.mcafee.com\/en-us\/identity-theft.html\">identity theft<\/a>, where criminals use social media to gather personal information and build profiles of potential victims they can target. Just as we discussed in our recent blog, \u201c<\/span><a href=\"https:\/\/www.mcafee.com\/blogs\/consumer-cyber-awareness\/can-thieves-steal-identities-with-only-a-name-and-address\/\" target=\"_blank\" rel=\"noopener\"><span data-contrast=\"none\">Can thieves steal identities with only a name and address?<\/span><\/a><span data-contrast=\"auto\">\u201d\u00a0these\u00a0bits of information are important pieces in\u00a0the larger jigsaw puzzle that is your overall identity.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Let\u2019s\u00a0uncover these scams\u00a0these crooks use so that you can steer clear and stay safe.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<h2><b><span data-contrast=\"auto\">A quick look at some common social media scams<\/span><\/b><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/h2>\n<h3><b><span data-contrast=\"auto\">Quizzes and surveys<\/span><\/b><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/h3>\n<p><span data-contrast=\"auto\">\u201cWhat\u2019s your spooky Halloween name?\u201d or \u201cWhat\u2019s your professional\u00a0wrestler\u00a0name?\u201d You\u2019ve probably seen a few of those and similar quizzes in your feed where you use\u00a0the street you grew up on, your birthdate,\u00a0your favorite song,\u00a0and maybe\u00a0the name of a beloved first pet\u00a0to cook up a silly name\u00a0or some other result.\u00a0Of course, these\u00a0are pieces of personal information, sometimes the answer to commonly used security questions by banks and other financial institutions. (Like, what was the model of your first car?)\u00a0With this info in hand, a hacker could attempt to gain access to your accounts.\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Similarly, scammers will also post surveys with the offer of a gift card to a popular retailer. All you\u00a0have to\u00a0do is fork over your personal info. Of course, there\u2019s no gift card coming. Meanwhile, that scammer\u00a0now has some choice pieces of personal info that they can potentially use against you.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><b><span data-contrast=\"auto\">How to avoid\u00a0them:<\/span><\/b><span data-contrast=\"auto\">\u00a0Simply put, don\u2019t take those quizzes and surveys online.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<h3><b><span data-contrast=\"auto\">Bogus benefits and get-rich-quick schemes<\/span><\/b><span data-contrast=\"auto\">\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/h3>\n<p><span data-contrast=\"auto\">The list here is long. These include posts and direct messages about\u00a0<\/span><a href=\"https:\/\/www.consumer.ftc.gov\/blog\/2021\/10\/spot-pandemic-scam-emergency-broadband-program-impersonators\" target=\"_blank\" rel=\"noopener\"><span data-contrast=\"none\">phony relief funds<\/span><\/a><span data-contrast=\"auto\">,\u00a0<\/span><a href=\"https:\/\/www.consumer.ftc.gov\/blog\/2021\/08\/warning-email-ftc-chair-lina-m-khan-about-coronavirus-money-fake\" target=\"_blank\" rel=\"noopener\"><span data-contrast=\"none\">grants<\/span><\/a><span data-contrast=\"auto\">, and giveaways\u2014along with\u00a0<\/span><a href=\"https:\/\/www.consumer.ftc.gov\/articles\/job-scams\" target=\"_blank\" rel=\"noopener\"><span data-contrast=\"none\">bogus business opportunities<\/span><\/a><span data-contrast=\"auto\"> that run the gamut from thinly veiled pyramid schemes and gifting circles to mystery shopper jobs. What they all have in common is that they\u2019re run by scammers who want your information, money, or both. If this sounds familiar, like those old emails about transferring funds for a prince in some faraway nation, it is. Many of these scams simply made the jump from email to social media platforms.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><b><span data-contrast=\"auto\">How to avoid\u00a0them:<\/span><\/b><span data-contrast=\"auto\">\u00a0Research any offer, business opportunity, or organization that reaches out to you. A good trick is to do a search of the organization\u2019s name plus the term \u201cscam\u201d or \u201creview\u201d or \u201ccomplaint\u201d to see if anything sketchy comes up.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<h3><b><span data-contrast=\"auto\">Government imposter scams<\/span><\/b><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/h3>\n<p><span data-contrast=\"auto\">If there\u2019s one government official that scammers like to use to scare you, it\u2019s the tax collector. These scammers will use social media messaging (and other mediums like emails, texts, and phone calls) to pose as an official who\u2019s either demanding back taxes or offering a refund or credit\u2014all of which are bogus and all of which involve you handing over your personal info, money, or both. <\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><b><span data-contrast=\"auto\">How to avoid\u00a0them:<\/span><\/b><span data-contrast=\"auto\">\u00a0Delete the message. In the U.S., the IRS\u00a0and other government agencies\u00a0will\u00a0<\/span><b><span data-contrast=\"auto\">never<\/span><\/b><span data-contrast=\"auto\"> reach out to you in this way or\u00a0ask you for your personal information.\u00a0Likewise, they won\u2019t demand payment via wire transfer, gift cards, or cryptocurrency like Bitcoin.\u00a0Only scammers\u00a0will.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<h3><b><span data-contrast=\"auto\">Friends and family imposter scams<\/span><\/b><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/h3>\n<p><span data-contrast=\"auto\">These are far more targeted than the scams listed above because they\u2019re targeted and often rely upon specific information about you and your family. Thanks to social media, scammers can gain access to that info and use it against you. One example is the \u201cgrandkid scam\u201d where a hacker impersonates a grandchild and asks a grandparent for money. Similarly, there are family emergency scams where a bad actor sends a message that a family member was in an accident or arrested and needs money quickly. In all, they rely on a phony story that often involves someone close to you who\u2019s in need or trouble.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><b><span data-contrast=\"auto\">How to avoid\u00a0them:<\/span><\/b><span data-contrast=\"auto\">\u00a0Take a deep breath and\u00a0confirm the situation. Reach out to the person in question or another friend or family member\u00a0to see if there really\u00a0is a concern. Don\u2019t jump to pay right away.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<h3><b><span data-contrast=\"auto\">The romance con<\/span><\/b><span data-contrast=\"auto\">\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/h3>\n<p><span data-contrast=\"auto\">This is one of the most targeted attacks of all\u2014the con artist who strikes up an online relationship\u00a0to bilk a\u00a0victim out of money.\u00a0Found everywhere from\u00a0social media sites\u00a0to dating apps to online forums, this scam\u00a0involves\u00a0creating a phony profile and a phony story to go with it. From there, the\u00a0scammer will\u00a0communicate several times a day, perhaps talking about their\u00a0exotic\u00a0job\u00a0in some exotic location. They\u2019ll build trust along the way and eventually ask\u00a0the victim\u00a0to wire money or purchase gift cards.\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><b><span data-contrast=\"auto\">How to avoid\u00a0them:<\/span><\/b><span data-contrast=\"auto\">\u00a0Bottom line,\u00a0if someone you\u2019ve never met in person asks you for money online, it\u2019s a good bet that it\u2019s a scam.\u00a0Don\u2019t do it.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<h2><b><span data-contrast=\"auto\">Protecting yourself from identity theft and scams on social media<\/span><\/b><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/h2>\n<p><span data-contrast=\"auto\">Now with an idea of what the bad actors are up to out there, here\u2019s a quick rundown of things you can do to protect yourself further from the social media scams they\u2019re trying to pull.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<ol>\n<li data-leveltext=\"%1.\" data-font=\"Calibri, Calibri_MSFontService, sans-serif\" data-listid=\"3\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><b><span data-contrast=\"auto\">Use strict privacy settings.<\/span><\/b><span data-contrast=\"auto\"> First up, set your social media profile to private so that only approved friends and family members can access it.\u00a0McAfee&#8217;s <a href=\"https:\/\/www.mcafee.com\/blogs\/internet-security\/introducing-social-privacy-manager\/\" target=\"_blank\" rel=\"noopener\">Social Media Privacy Manager<\/a> can easily help you do this. This will circulate less of your personal information in public. However, consider anything you do or post on social media as public information. (Plenty of people can still see it, copy it, and pass it along.) Likewise, pare back the information you provide in your profile, like your birthday, the high school you attended, and so on. The less you put out there, the less a scammer can use against you.<\/span><span data-ccp-props=\"{&quot;134233279&quot;:true,&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<li data-leveltext=\"%1.\" data-font=\"Calibri, Calibri_MSFontService, sans-serif\" data-listid=\"3\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><b><span data-contrast=\"auto\">Be a skeptic.<\/span><\/b><span data-contrast=\"auto\">\u00a0You could argue that this applies to staying safe online in general.\u00a0So many scams rely on our innate willingness to share\u00a0stories, help\u00a0others, or simply talk about\u00a0what\u2019s going on in our lives. This willingness could lower your guard\u00a0when a scammer comes calling. Instead, try to look at the messages you receive beyond face value. Does something seem unusual about the language or request? What could be the motivation behind it? Pausing and considering questions like these could\u00a0spare\u00a0some headaches.<\/span><span data-ccp-props=\"{&quot;134233279&quot;:true,&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<li data-leveltext=\"%1.\" data-font=\"Calibri, Calibri_MSFontService, sans-serif\" data-listid=\"3\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><b><span data-contrast=\"auto\">Know your friends.<\/span><\/b><span data-contrast=\"auto\"> How well do you know everyone on your list of friends and followers? Even with your privacy settings set to the max, these people will see what you\u2019re posting online. Being selective about who you invite into that private circle of yours can limit the amount of personal information people have immediate access to via your posts, tweets, and updates. However, if you like having a larger list of\u00a0friends and followers, be aware\u00a0that\u00a0any personal info you share\u00a0is effectively being broadcast on\u00a0a small\u00a0scale\u2014potentially to people you don\u2019t really know well at all.<\/span><span data-ccp-props=\"{&quot;134233279&quot;:true,&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<li data-leveltext=\"%1.\" data-font=\"Calibri, Calibri_MSFontService, sans-serif\" data-listid=\"3\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><b><span data-contrast=\"auto\">Follow up.<\/span><\/b><span data-contrast=\"auto\">\u00a0Get a message from a \u201cfriend\u201d that seems a little spammy or just plain weird? Or maybe you get something that sounds like an imposter scam, like the ones we outlined above? Follow up with them using another means of communication other than the social media account that sent the message.\u00a0See what\u2019s\u00a0<\/span><i><span data-contrast=\"auto\">really<\/span><\/i><span data-contrast=\"auto\">\u00a0going on.\u00a0<\/span><span data-ccp-props=\"{&quot;134233279&quot;:true,&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<li data-leveltext=\"%1.\" data-font=\"Calibri, Calibri_MSFontService, sans-serif\" data-listid=\"3\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><b><span data-contrast=\"auto\">Look out for each other.<\/span><\/b><span data-contrast=\"auto\"> Much like following up, looking out for each other means letting friends know about that strange message you received or a friend request from a potentially duplicate account. By speaking up, you may be giving them the first sign that their account (and thus a portion of their identity) has been compromised. Likewise, it also means talking about\u00a0that online flame with each other, how it\u2019s going, and, importantly if that \u201cspecial someone\u201d has stooped to asking for money.<\/span><span data-ccp-props=\"{&quot;134233279&quot;:true,&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<\/ol>\n<h2><b><span data-contrast=\"auto\">Stay steps ahead of the scams on social media<\/span><\/b><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/h2>\n<p><span data-contrast=\"auto\">Above and\u00a0beyond what we\u2019ve covered so far, some online protection basics can keep you safer still.\u00a0<\/span><a href=\"https:\/\/www.mcafee.com\/en-us\/antivirus\/mcafee-total-protection.html?path=blogs\" target=\"_blank\" rel=\"noopener\"><span data-contrast=\"none\">Comprehensive online protection software<\/span><\/a><span data-contrast=\"auto\">\u00a0will help you create strong, unique passwords for all your accounts, help you keep from clicking links to malicious sites,\u00a0and\u00a0prevent\u00a0you from downloading malware. Moreover, it can provide you with\u00a0<\/span><a href=\"https:\/\/www.mcafee.com\/en-us\/identity-theft\/protection.html?path=blogs\" target=\"_blank\" rel=\"noopener\"><span data-contrast=\"none\">identity protection services<\/span><\/a><span data-contrast=\"auto\">\u00a0like ours, which\u00a0keep\u00a0your personal info private\u00a0with around-the-clock\u00a0monitoring of your email addresses and bank accounts with up to $1M of ID theft insurance.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Together, with some good protection and a sharp eye, you can avoid those identity theft scams floating around on social media\u2014and get back to enjoying time spent online with your true family and friends.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Before you take the\u00a0fun-looking\u00a0quiz that\u00a0popped\u00a0up in your social media feed, think twice. The person\u00a0holding the answers\u00a0may be a hacker.\u00a0 Where&#8230;<\/p>\n","protected":false},"author":1408,"featured_media":186841,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[13],"tags":[11368,6144],"coauthors":[15741],"class_list":["post-132988","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-privacy-identity-protection","tag-identity-theft-schemes","tag-social-media-scams"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Quizzes and Other Identity Theft Schemes to Avoid on Social Media | McAfee Blog<\/title>\n<meta name=\"description\" content=\"Before you take the\u00a0fun-looking\u00a0quiz that\u00a0popped\u00a0up in your social media feed, think twice. The person\u00a0holding the answers\u00a0may be a hacker.\u00a0 Where people\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Quizzes and Other Identity Theft Schemes to Avoid on Social Media | McAfee Blog\" \/>\n<meta property=\"og:description\" content=\"Before you take the\u00a0fun-looking\u00a0quiz that\u00a0popped\u00a0up in your social media feed, think twice. The person\u00a0holding the answers\u00a0may be a hacker.\u00a0 Where people\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/quizzes-and-other-identity-theft-schemes-to-avoid-on-social-media\/\" \/>\n<meta property=\"og:site_name\" content=\"McAfee Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:published_time\" content=\"2024-03-26T13:59:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-06-19T14:16:40+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/12\/300x200_Quizzes.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"300\" \/>\n\t<meta property=\"og:image:height\" content=\"200\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Amy Bunn\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@McAfee\" \/>\n<meta name=\"twitter:site\" content=\"@McAfee\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Amy Bunn\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/quizzes-and-other-identity-theft-schemes-to-avoid-on-social-media\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/quizzes-and-other-identity-theft-schemes-to-avoid-on-social-media\/\"},\"author\":{\"name\":\"Amy Bunn\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/15fadfbc1716a6a3d88e22ed09e95fe3\"},\"headline\":\"Quizzes and Other Identity Theft Schemes to Avoid on Social Media\",\"datePublished\":\"2024-03-26T13:59:00+00:00\",\"dateModified\":\"2024-06-19T14:16:40+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/quizzes-and-other-identity-theft-schemes-to-avoid-on-social-media\/\"},\"wordCount\":1512,\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/quizzes-and-other-identity-theft-schemes-to-avoid-on-social-media\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/12\/300x200_Blog_032624.png\",\"keywords\":[\"Identity theft schemes\",\"social media scams\"],\"articleSection\":[\"Privacy &amp; Identity Protection\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/quizzes-and-other-identity-theft-schemes-to-avoid-on-social-media\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/quizzes-and-other-identity-theft-schemes-to-avoid-on-social-media\/\",\"name\":\"Quizzes and Other Identity Theft Schemes to Avoid on Social Media | McAfee Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/quizzes-and-other-identity-theft-schemes-to-avoid-on-social-media\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/quizzes-and-other-identity-theft-schemes-to-avoid-on-social-media\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/12\/300x200_Blog_032624.png\",\"datePublished\":\"2024-03-26T13:59:00+00:00\",\"dateModified\":\"2024-06-19T14:16:40+00:00\",\"description\":\"Before you take the\u00a0fun-looking\u00a0quiz that\u00a0popped\u00a0up in your social media feed, think twice. The person\u00a0holding the answers\u00a0may be a hacker.\u00a0 Where people\",\"breadcrumb\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/quizzes-and-other-identity-theft-schemes-to-avoid-on-social-media\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/quizzes-and-other-identity-theft-schemes-to-avoid-on-social-media\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/quizzes-and-other-identity-theft-schemes-to-avoid-on-social-media\/#primaryimage\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/12\/300x200_Blog_032624.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/12\/300x200_Blog_032624.png\",\"width\":300,\"height\":200},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/quizzes-and-other-identity-theft-schemes-to-avoid-on-social-media\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Privacy &amp; Identity Protection\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Quizzes and Other Identity Theft Schemes to Avoid on Social Media\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"name\":\"McAfee Blog\",\"description\":\"Internet Security News\",\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\",\"name\":\"McAfee\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"width\":1286,\"height\":336,\"caption\":\"McAfee\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/x.com\/McAfee\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/www.youtube.com\/McAfee\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/15fadfbc1716a6a3d88e22ed09e95fe3\",\"name\":\"Amy Bunn\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/b58be83668cf2b1de7fb5b8a222bb835\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/Amy-Bunn-96x96.jpeg\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/Amy-Bunn-96x96.jpeg\",\"caption\":\"Amy Bunn\"},\"description\":\"Amy Bunn is head of communications at McAfee and has worked in technology and cybersecurity for over 15 years. During this time, Amy has witnessed the changing technology landscape and the critical role that online protection plays today. Amy believes that families and individuals around the world should be free to enjoy all the benefits and advantages that the internet and technology afford and is passionate about making this a reality by discussing the very latest in cybersecurity tips and advice, which, when combined with robust online protection, can help empower people to live their life online with total confidence.\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/author\/amy-bunn\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Quizzes and Other Identity Theft Schemes to Avoid on Social Media | McAfee Blog","description":"Before you take the\u00a0fun-looking\u00a0quiz that\u00a0popped\u00a0up in your social media feed, think twice. The person\u00a0holding the answers\u00a0may be a hacker.\u00a0 Where people","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"Quizzes and Other Identity Theft Schemes to Avoid on Social Media | McAfee Blog","og_description":"Before you take the\u00a0fun-looking\u00a0quiz that\u00a0popped\u00a0up in your social media feed, think twice. The person\u00a0holding the answers\u00a0may be a hacker.\u00a0 Where people","og_url":"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/quizzes-and-other-identity-theft-schemes-to-avoid-on-social-media\/","og_site_name":"McAfee Blog","article_publisher":"https:\/\/www.facebook.com\/McAfee\/","article_published_time":"2024-03-26T13:59:00+00:00","article_modified_time":"2024-06-19T14:16:40+00:00","og_image":[{"width":300,"height":200,"url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/12\/300x200_Quizzes.jpg","type":"image\/jpeg"}],"author":"Amy Bunn","twitter_card":"summary_large_image","twitter_creator":"@McAfee","twitter_site":"@McAfee","twitter_misc":{"Written by":"Amy Bunn","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/quizzes-and-other-identity-theft-schemes-to-avoid-on-social-media\/#article","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/quizzes-and-other-identity-theft-schemes-to-avoid-on-social-media\/"},"author":{"name":"Amy Bunn","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/15fadfbc1716a6a3d88e22ed09e95fe3"},"headline":"Quizzes and Other Identity Theft Schemes to Avoid on Social Media","datePublished":"2024-03-26T13:59:00+00:00","dateModified":"2024-06-19T14:16:40+00:00","mainEntityOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/quizzes-and-other-identity-theft-schemes-to-avoid-on-social-media\/"},"wordCount":1512,"publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/quizzes-and-other-identity-theft-schemes-to-avoid-on-social-media\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/12\/300x200_Blog_032624.png","keywords":["Identity theft schemes","social media scams"],"articleSection":["Privacy &amp; Identity Protection"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/quizzes-and-other-identity-theft-schemes-to-avoid-on-social-media\/","url":"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/quizzes-and-other-identity-theft-schemes-to-avoid-on-social-media\/","name":"Quizzes and Other Identity Theft Schemes to Avoid on Social Media | McAfee Blog","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/quizzes-and-other-identity-theft-schemes-to-avoid-on-social-media\/#primaryimage"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/quizzes-and-other-identity-theft-schemes-to-avoid-on-social-media\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/12\/300x200_Blog_032624.png","datePublished":"2024-03-26T13:59:00+00:00","dateModified":"2024-06-19T14:16:40+00:00","description":"Before you take the\u00a0fun-looking\u00a0quiz that\u00a0popped\u00a0up in your social media feed, think twice. The person\u00a0holding the answers\u00a0may be a hacker.\u00a0 Where people","breadcrumb":{"@id":"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/quizzes-and-other-identity-theft-schemes-to-avoid-on-social-media\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/quizzes-and-other-identity-theft-schemes-to-avoid-on-social-media\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/quizzes-and-other-identity-theft-schemes-to-avoid-on-social-media\/#primaryimage","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/12\/300x200_Blog_032624.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/12\/300x200_Blog_032624.png","width":300,"height":200},{"@type":"BreadcrumbList","@id":"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/quizzes-and-other-identity-theft-schemes-to-avoid-on-social-media\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/www.mcafee.com\/blogs\/"},{"@type":"ListItem","position":2,"name":"Privacy &amp; Identity Protection","item":"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/"},{"@type":"ListItem","position":3,"name":"Quizzes and Other Identity Theft Schemes to Avoid on Social Media"}]},{"@type":"WebSite","@id":"https:\/\/www.mcafee.com\/blogs\/#website","url":"https:\/\/www.mcafee.com\/blogs\/","name":"McAfee Blog","description":"Internet Security News","publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.mcafee.com\/blogs\/#organization","name":"McAfee","url":"https:\/\/www.mcafee.com\/blogs\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","width":1286,"height":336,"caption":"McAfee"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/x.com\/McAfee","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/www.youtube.com\/McAfee"]},{"@type":"Person","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/15fadfbc1716a6a3d88e22ed09e95fe3","name":"Amy Bunn","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/b58be83668cf2b1de7fb5b8a222bb835","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/Amy-Bunn-96x96.jpeg","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/Amy-Bunn-96x96.jpeg","caption":"Amy Bunn"},"description":"Amy Bunn is head of communications at McAfee and has worked in technology and cybersecurity for over 15 years. During this time, Amy has witnessed the changing technology landscape and the critical role that online protection plays today. Amy believes that families and individuals around the world should be free to enjoy all the benefits and advantages that the internet and technology afford and is passionate about making this a reality by discussing the very latest in cybersecurity tips and advice, which, when combined with robust online protection, can help empower people to live their life online with total confidence.","url":"https:\/\/www.mcafee.com\/blogs\/author\/amy-bunn\/"}]}},"_links":{"self":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/132988","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/users\/1408"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/comments?post=132988"}],"version-history":[{"count":5,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/132988\/revisions"}],"predecessor-version":[{"id":194692,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/132988\/revisions\/194692"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media\/186841"}],"wp:attachment":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media?parent=132988"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/categories?post=132988"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/tags?post=132988"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/coauthors?post=132988"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}