Each third German goes on the internet on dating and uses digital dating to find a new love (source: bitkom), but not everyone says it’s serious – Love Scam is the keyword.

Criminals use Tinder and other dating platforms, chats and social networks specifically to make unsuspecting singles to facilitate monetary amounts or to reach their personal documents, such as identity papers. The German IT security manufacturer G Data warns internet users in front of these love fraud attacks and gives tips for secure online flirts.

  • Product Tip: Case “Love Scamming” – Rotated on Online Dating: “I was sure he loves me”

“Love Scam is a very perfidious stitch that works well from criminal views,” explains Tim Berghoff, Security Evangelist at G Data. “The criminals exploit the good faith of the singles and just leave their victims when no longer responds to news.

For users, Love Scam can have serious consequences if the perpetrators use, for example, transmitted identity papers for counterfeit identities and offenses. Therefore, you should stop chats immediately if you feel that it’s all about money or personal information. “

How Love Scam works

Many singles are looking for their great love on the internet. Social networks and online dating apps are quickly in contact with other people looking for a new partner or partner. Here, the Love Scam stitch uses: About fake user profiles – often with pictures that show a very good-looking woman or a man – take the perpetrators to the singles.

If the contact becomes narrower, the perpetrators ask for monetary amounts, for example to pay a plane ticket for the alleged meeting or to pay for a presupply necessary medical treatment. Numbers the lovers the money, the amount is irretrievably lost. Often the criminals also have official documents, e.g. Passes or ID cards, apart and ask for a copy to use them for counterfeiting.

For singles in search of the big love not falling in love scamers, they should be a few advice. The German IT security manufacturer GDATA gives tips for safe flirting in the network.

  • Reading tip: Bye, online dating!: How best to meet singles

So you safely flirt at Tinder & Co.

1.Abeimkeeping with fast love skewers:

If flirter is already overwhelmed with the first contact with debowing love declarations, caution is required.

2. Names on the Internet Counterclock

Users can check the name of their new acquaintance online and see if this is known as Scamming profile. For pictures, a reverse picture search is also worthwhile, maybe you get more information here.

3. Do not give too many details from you

Since nobody can tell if your favorite really hides behind the profile, you should wait with personal details to the real meeting.

4. Save chat gradients and photos

It makes sense to store the chat courses to hand over them later, if.

  • Surftipp: already gone to the glue? – The “Softboi” mesh: Fieser dating tactics are lulled women

5. No payments to unknown

If the flirt partner asks for money, for example, for a flight ticket, a visa or a medical treatment, no payment should be made.

6. No copies of official documents send

Defects, passes and other official papers should never be shipped. Users then have no control more about what happens to the documents.

7. Put a criminal complaint

Users who have become victims of Love Scam should provide a criminal complaint at the police. That’s important, if legal action should be initiated against the victim for payments or misuse of the identity.

8th. Well protected to the Internet

A comprehensive safety solution with a powerful real-time protection requires all computers, smartphones and tablets and protects against malicious code. Users are particularly well protected with newly integrated deepray technology. With the help of an artificial intelligence, it ensures even better protection against harmful processes.

9. Be up-to-date

The software, apps and the operating system installed on the PC and the mobile device should always be up to date and all available updates will be installed immediately. Users include security gaps that could exploit criminals for attacks.