HaulMatch

Fraud Warning

Customer Information

By focusing on providing the best shipping experience possible, HaulMatch has earned a trusted brand name. Unfortunately, unscrupulous people sometimes try to use the HaulMatch brand to scam and defraud others. Here are a few common scams, and ways that you can avoid and report them.

Email Scam/Phishing Notification Example:

Scam Example
email message security

5 Tips for Identifying Scam Emails

General Recommendation

Most email scams rely on the recipient not identifying it as fraudulent and instead believing it to be a genuine and honest correspondence. The tactics that con artists use to trick people into trusting an email are becoming increasingly devious and subtle. Here are five tips that will help you avoid becoming a victim of a scam email. If you know what to look for, it’s always possible to ascertain the legitimacy of an email before it can do any harm to you or your computer.

1. Sender

The best and most efficient method of verifying an email’s authenticity is to check who it’s from. It’s not always as simple as it sounds to ascertain the sender, as they can edit the subject line and the name themselves. However, it is relatively simple for most email clients to read the email address itself. Normally, hovering the cursor over the subject line will reveal the email address.

Many scammers will automate the creation of fake accounts and therefore the names will be obviously spurious. If the email address consists of a collection of random characters, you know it’s probably bogus. However, if the address seems plausible, you may need to take further steps to verify its validity. To do this, simply open a new tab and Google the email address and the name of the sender. If they don’t match up, send the email straight to your spam folder and flag it as potentially harmful.

2. Accuracy

Most fraudulent emails are peppered with spelling mistakes and grammatical inconsistencies. This is by design. Con artists believe that anyone who notices blatant spelling mistakes is less likely to fall for a scam, so they write intentionally poor copy to weed out less-susceptible recipients. Scan the content of the email and delete it if there is more than one simple mistake.

If you’re not confident in your ability to spot spelling and grammar errors, download apps or browser extensions to do it for you. There are many apps that will automatically scan every piece of text on your browser and underline any errors in red.

3. Contact

Legitimate correspondence from trusted sources will always contain contact information. Look to the bottom of the page to see if there is any identifying information available. If there isn’t, be immediately distrustful of the email content. However, if contact information is clearly displayed, it still might not be a legitimate email.

Check the validity of any contact information available to you. Simply Googling the company is normally enough to cross reference the details provided. If you’re still unsure, find the brand’s homepage and contact them through a different, verifiable, source asking them whether they sent the email. Most companies will be aware of the current phishing scams using their name, so they will be able to quickly provide you with answers.

4. Requests

A common theme that all scam emails share is that they will require something of you. If you receive an email that simply provides information without asking you to do anything, it is probably from a legitimate source. However, if you receive one that asks you to follow a link or reply with certain information, it may be a scam.

Don’t follow any links contained in unsolicited emails and don’t, under any circumstances, give out personal information. Legitimate businesses will never require you to provide identifying details via email. Any email that does should not be trusted.

5. Pressure

On top of inappropriate requests, many scam emails will impose a time constraint on the supposedly required action. Any email that claims to require a response within a specific time limit should provoke suspicion. Pressure tactics are an aggressive marketing tool used to limit the time a person has to think things through. Normally, this is to prevent the victim from having time to work out the ruse. Any sort of ultimatum or arbitrary constraint should ring alarm bells.

Specific scam emails are always evolving, but the general tactics used are generally consistent. If you know what tactics they deploy, you’ll know what to avoid. Use these five techniques to assess each email you receive to prevent yourself from falling victim to email scammers.