www.1001TopWords.com |
Beware of Imitations! Security, Internet Scams, and the African Real Estate Agenda
Fishing on the Internet has come a long way. However, we TechWeb junkies like to call it Phishing. What I am talking about here is not going after your ordinary, everyday catch. Yet a fine catch it indeed may be to those thieving bandits if they can lure you into giving up your personal and private information. Trickery is vast and common on the World Wide Web. Beware, I say, beware! Email schemes, called "phishing" or "carding", attempt to trick consumers into disclosing personal and/or financial information. The emails appear to come from legitimate companies with whom consumers may regularly conduct business. I have seen scams appear to come from such noteworthy corporation as AOL, Earthlink, Paypal, eBay, or major credit card issuers. Often times the email threatens termination of accounts unless consumers update billing information. Phishing comes around in all forms. How many of you have had some Nigerian Prince that just inherited 35 million US dollars offer to share it with you for one reason or another? How many of you have received an e-mail supposedly from your bank that for "security reasons" requests you to click a link that takes you to an online form to fill out, requesting all your personal and confidential information about your bank account? A word to the wise: there is no Prince in Nigeria that needs your help, and your bank will never ask you for that info in an e-mail! The latest Internet scam appears to come from the South African Department of Mining. "Resources and we are in dire need of a foreign partner to assist us in the receipt and investment of US$15,500,000.00?" All they request is a secure place to deposit the lump sum on US territory, and you will gain a large piece of the pie. WOW, what a deal! Another I received comes from Johnson Mgabe, the son of the leader of the Republic of Zimbabwe Agricultural Commission. His father has just been assassinated, and he, the only remaining heir, is trying to escape. If you help him, he will give you lots of dough! Right on! "Please e-mail and tell me of your decision. I am ready to pay you 25% of the money [$45.5 Million] for your help, 5% shall go for expenses you might incur during the transaction. The remainder [70%] shall be mine." Ok, ok, I am convinced; here is my private bank account, my SSN, DL# and address. Please tell me what I need to do next. Are they for real? Seriously though, if people didn't fall for these types of stunts, there wouldn't be so many floating around. Identity theft has become more and more rampant in this techno traveling world. Again I say, beware. Many of these email schemes contain links to "look-alike" websites that are loaded with actual trademarked images. The websites then instruct consumers to "reenter" their credit card numbers, social security numbers, bank PINs, or other personal information. If consumers actually provide the information requested, the data goes to scammers, not the legitimate company whose name is on the site. Thereafter, the data is often used to order goods or services and/or to obtain credit in the name of the consumer and potentially, steal your identity. Again, I say, beware! Rule for the road: If you receive a precarious e-mail asking you for personal information, chances are it is a scam. It is better to be safe than sorry. By Greg Richburg All past articles written by Greg Richburg are available at http://www.netricks.com/news. Please address article suggestions to: info@netricks.com. Greg Richburg is a Microsoft Certified Systems Engineer and the owner of Netricks, Inc. a network consulting, web design and hosting company located in Fresno, CA. Visit Netricks at http://www.netricks.com Richburg also runs KlickCommerce, anInternet based marketing system for Ujena brand clothing. See http://www.klickcommerce.com for details. More of Richburg's work may be seen at http://www.valley411.com
|
RELATED ARTICLES
Three-pronged Trojan Attack Threatens Security on the Internet Glieder (Win32.Glieder.AK), Fantibag (Win32.Fantibag.A) and Mitglieder (Win32.Mitglieder.CT) are not names of a modern day version of The Three Musketeers. These are Trojans engineered for a hacker attack that will infect computers and open them for use in further attacks. Technology and Techniques Used in Industrial Espionage Industrial Espionage. These methodologies are being used on a daily basis by competitors maybe even against you. I knew a Private Investigator who used to break into other firm's voicemail boxes. He was suspected of erasing messages and stealing potential clients. I know you may bethinking that is not right. Maybe so but if a Private Investigator cannot protect him/herself than what use are they to a client. Preventing Online Identity Theft Identity theft is one of the most common criminal acts in society today. Criminals will use your personal information such as banking accounts and passwords, to pretend that they are you. They may take out credit cards in your name, mortgages, or even worse. The internet has opened up a whole world of possibilities for these criminals, and the threat is very real. There are things that you can do to help prevent such a crime. It costs very little to protect your information, and it is money well spent. Make Money Online - Defend Against The Latest Scam First, let's do a little recap'. As I stated in the first part of the article, "Make Money Online - The Latest Scam Disclosed", "refund policy scammers" affect the websites that make money online by selling digital products by buying the product and asking for refunds, while keeping the product. 6 Ways To Prevent Identity Theft These six ways to prevent identity theft offer you valuable tips against the fastest growing crime in America today. In 2004, more than 9.9 million Americans fell victim to many types of identity theft scams, costing them nearly $5 billion. Data Security; Are Your Company Assets Really Secure? Is your data secure? Think again. Securing data is unlike any other corporate asset, and is likely the biggest challenge your company faces today. You may not see it, but almost all of your company's information is in digital form somewhere in the system. These assets are critical because they describe everything about you; your products, customers, strategies, finances, and your future. They might be in a database, protected by data-center security controls, but more often than not, these assets reside on desktops, laptops, home computers, and more importantly in email or on some form of mobile computing device. We have been counting on our firewall to provide protection, but it has been estimated that at least fifty percent of any given organization's information is in email, traveling through the insecure cyberspace of the Internet. Do You Know What your Kids Are Doing Online? It's a sad statistic, but hundreds of unsuspecting kids are lured away from home every year by strangers they meet in online chat rooms. Spyware, What It Is, What It Does, And How To Stop It Spyware is software that runs on a personal computer without the knowledge or consent of the owner of that computer. The Spyware then collects personal information about the user or users of the infected computer. The personal information collected is usually the name of the user; the users email address, Websites visited, online shopping habits, as well as various other information about the user. Watching the Watchers: Detection and Removal of Spyware If spyware were a person and he set himself up in yourhouse, you are likely going to do one of two things. You'llkick him out yourself or you'll call someone (such as thepolice) to do it for you. Information Security for E-businessmen: Just a Couple of Ideas If you constantly deal with bank or electronic accounts, it must beyour worst nightmare--to wake up and learn that you are a bankrupt.Some crook stole your personal data and all the money you have beensweating blood for years has flown to somebody else's account. Almosteverybody must have heard that such a tradegy is called identity theftand millions of people in the USA alone suffer the same every year.Poor consolation for its victims, isn't it? How Spyware Blaster Can Protect Your Computer From Harm By browsing a web page, you could infect your computer withspy ware, ad ware, dialers and hijackers. These, unwelcomeguests, are some of the fastest growing threats on theInternet today. It is important to protect your computerand one of the most powerful software products, availablefor this, is Spy ware Blaster, a program created by Javacool. How to Protect Your Child from the Internet When the Internet first came about, it was realized it could be quite the multi-tasking machine. These days people use it for just about everything, from downloading music to checking e-mail, and virtually making the rest of the globe closer all the time. Mall Protection The Loss Prevention Manager should be receptive to the needs and objectives of upper management and work to prevent and reduce loss from crime, fire accidents etc. What Every Internet Marketer Should Know About Spyware If you run any type of Internet business, Adware and Spyware can be a very serious issue. These programs hide themselves on your computer and do all sorts of annoying and potentially dangerous things. Adware and Spyware: The Problems and Their Solutions The Threat Computer Viruses and Other Nasties: How to Protect Your Computer from These Invaders Can you protect your computer from all possible viruses and other invasions? Five Excellent Indie Encryption And Security Solutions You Have Not Heard About 1. Geek Superherohttp://www.deprice.com/geeksuperhero.htm Free Spyware Removal - Its Not As Easy As It Sounds Nobody wants to pay to remove spyware. At the very least, I don't. The blasted stuff shouldn't be on my computer anyway, so what ever would make me want to shell out cash to get rid of something that I shouldn't have in the first place? HackAttack P C. owners are constantly at risk from attacks by hackers.Spy ware, viruses, trogan horses, and all sorts of other malevolent programs are all trying to take control of your computer. How to Know Whether an Email is a Fake or Not A few nights ago I received an email from "2CO" asking me to update my personal data. The sender did not forget to insert a link to log in, too. |
© Athifea Distribution LLC - 2013 |