• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer
  • Jobs
  • Career
    • Cyber Security Training
    • Work from Home
    • Cyber Security Analyst
    • Remote Work – Six Ways to Keep Your Data Safe When Working Remotely
  • Field Guide
  • Newsletter Signup
  • Deals
  • News
AskCyberSecurity.com

AskCyberSecurity.com

Cyber Security News & Information

  • Home
  • Data Privacy
    • Gamers
    • Government Cyber Security
      • Legislation
      • Standards
        • What are the risks of computer security?
        • Medical Cyber Security
    • Social Media
  • Security
    • Data Breaches
    • Scams
    • Malware
  • Software
    • Apps
    • Web Browsers
  • Glossary
    • Cyber Security Acronyms
  • About Ask Cyber Security
    • Authors
    • Contact Us
  • VPN
    • How Do I Know If My VPN is Working?
    • Best Free VPN iPhone
    • Why Use a VPN?
    • NordVPN vs IPVanish
    • Private Internet Access Download
    • Best VPN for Streaming
      • TikTok VPN
    • VPN Porn
    • Computer Security Software – What You Really Need
  • Tutorials
  • ChatGPT
    • Does ChatGPT Save Data?
AskCyber Home » News » data privacy » PlayStation 5 Giveaway Scam The Red Flag in a $1 Entry Fee

PlayStation 5 Giveaway Scam The Red Flag in a $1 Entry Fee

2021-04-13 by Grace Choi

playstation giveaway scam

What Would You Do for a PS5?

With every innovation comes new opportunities to take advantage of a general population that is too overwhelmed to promotions to use discernment against cleverly disguised cons. Most recently, there have been reports of a sham giveaway for one of 2020’s biggest releases: the PlayStation 5.

Techradar goes into what makes the PS5 so special, from a game-changing controller to faster loading times and general ease of use, not to mention ray-tracing capabilities which are especially important as games evolve. The only thing that seems to make the previous model a contender is the price. Needless to say, there was a mad dash for Sony’s well-timed new edition.

TikTok, Instagram, and Twitter were flooded late last year with different trends and challenges to earn the new console, and scammers have jumped on the opportunity to pilfer personal financial information from those that were not able to afford or make it in time to buy one for themselves.

Those Who Monetize on Trying Times

With Covid-19 causing shortages in all manner of products and production materials, Sony faced no exception with a shortage in the chips necessary to manufacture the PS5 fast enough to meet demand. This demand, which is happening at a time when the need for at-home entertainment is at an all-time high, has opened an opportune door for those who make a career of taking advantage of the tunnel vision that comes with “shiny object syndrome.”  

SEE ALSO Beware of Cyberpunk 2077 Scam

Using simple graphic tricks that are easy to miss at a passing glance, fake contests have risen, asking for a negligible entry fee to win a PS5. While $1 – $2 is dust compared to the cost of the prize, what it affords those behind the scam is credit card numbers, cvv/cvc numbers, individual addresses, and other billing information that can be used to pull money and identities from those who have fallen prey to the scheme. Kaspersky Daily has put out details on the specifics of the scam, which has been seen to use amazon logos and graphics to legitimize it to targets.

This occurs less than month since last month’s Walmart gift bag scam which promised those who shared the post a gift bag as well as a $75 gift card to the superstore chain. The difference in audience is key once we examine who would be interested in winning the PS5, from pre-adolescent to adolescent children to less tech-savvy parents and grandparents who would be buying them as gifts.

SEE ALSO 9 Free Security Tips for Gamers

What Can We Do?

These scams are not new, nor do we expect them to end as attackers become more creative and data science evolves. What we can do is urge caution when browsing, and especially before clicking on anything that seems too good to be true. It is easy to be caught up in the trends and it does not feel good to be trailing behind, but it is important to pause before any online interaction with an unverified entity.

Filed Under: data privacy

Primary Sidebar

Subscribe to Our Free Newsletter

We Don't Share or Sell Your Info

Web Browsers

Where Are My Saved Passwords in Chrome?

Google Removes 70 Malicious Browser Add-ons from Chrome Web Store

Firefox 75 Reports Your Browser Settings to Mozilla

Categories

Cyber Security Field Guide

Computer Security While TravelingGet Our Cyber Security Field Guide - Available on Amazon!

Recent Posts

Security Marketing Manager – Remote

Sr. Associate, Cybersecurity Architect – Pfizer

Strategic Customer Success Manager – Cybersecurity – Opportunity for Working Remotely

Top 20 Passwords Leaked on Dark Web

ISU Cybersecurity Leader Job Opening

Cyber Security News

Top 20 Passwords Leaked on Dark Web

… [Read More...] about Top 20 Passwords Leaked on Dark Web

Apple Warns of Actively Exploited Zero-Day Flaw

… [Read More...] about Apple Warns of Actively Exploited Zero-Day Flaw

IRS Stops Facial Recognition System for Online Access

… [Read More...] about IRS Stops Facial Recognition System for Online Access

National Cybersecurity Alliance Announces Data Privacy Week

… [Read More...] about National Cybersecurity Alliance Announces Data Privacy Week

More Cyber Security News

Tags

amazon Android Apple bitcoin China chrome CISA credit card DarkSide DHS DOJ Equifax Europe Facebook facial recognition FBI Firefox FTC games GDPR Google Government hacker identity theft India iPhone Iran IRS LinkedIn Microsoft North Korea PayPal phishing phishing email ransomware REvil Russia smartphone T-Mobile TikTok tutorial VPN WhatsApp WiFi Windows

Government

CBP Looks to Access Airline Passenger Data

FTC Releases Cyber Threat Video Playlist

Malware Found on US Government Funded Phones

UK NCA Reaches Out to Youth to Deter Cybercrimes

More Posts from this Category

Footer

Menu

  • Home
  • About
  • Authors
  • Newsletter Signup
  • PRIVACY POLICY

Search

Why Use a VPN?

NordVPN vs IPVanish VPN Review

NAVIGATION

  • Data Breaches
  • Data Privacy
  • Gamers
  • Scams
  • Malware

MEMBER NJCCIC

New Jersey Cybersecurity & Communications Integration Cell

STAY CONNECTED

  • Facebook
  • Instagram
  • Pinterest
  • YouTube
  • Twitter
  • RSS

Copyright © 2023 · AskCyberSecurity.com · METRONY, LLC

Go to mobile version