www.1001TopWords.com |
Watch Out For That Scam
The IFCC (Internet Fraud Complaint Center) received over 200,000 complaint submissions for 2004, an increase of 66.6% from 2003. The total dollar loss from all referred cases exceeded 68 million dollars, an average loss of $894 per complaint. There are many types of internet frauds that exist including auction, email, foreign investment letters and online dating. Here are some ways to identify a possible scam or fraud that you may have encountered while surfing the internet. Auctions Auction sites are one of the best places to purchase and sell items. They are also one of the easiest places to become an internet fraud victim. Auction fraud represented 71% of the total referred fraud complaints. How the scam works is that you win the auction, but never receive the item. Most of the time the auction site cannot assist you in recovering the money stolen. They will remove the member's account and disqualify the member's email address from their site but are not able to do much else. It is in your best interest to research each seller before making any purchases.Auction sites have a rating system for their members and I would advise you to check this and their profile for certain clues. The first is to check how many sales have been completed and the response from the buyers. I would suggest no less than a hundred transactions for moderately priced items (less than a hundred dollars). A scammer will become a member and sell fifty items for a dollar or less usually in a week or two to build up his member rating. Then they will post twenty auctions ending within a day of each other for items that retail for over a hundred dollars but they are selling them for an unprofitable amount. Again, research a seller's auction history before placing your bid. Also, if Western Union or similar is stated to be the only form of payment, move right on to the next auction. Fraudulent Email Email is a great form of communication and also an easy target for schemers. Electronic mail is the primary mechanism by which a perpetrator makes contact representing 63% compared to just 7% by phone. Fraud victims will receive an email with a link stating that their account information needs to be updated. Upon clicking on the link you are taken to a page that looks almost identical to the member page and asks you to enter in your name, address, social security number, checking account routing number and/or credit card number. When you hit the submit button, your information is instantly shuttled to someone waiting to separate you from your money. Before submitting your information, verify that you are truly on the site that the link states it is taking you. Foreign Investment Letter Another popular email scheme is an email from a foreign country stating that they have millions that need to be transferred to the United States but need a bank account to finalize the transaction. The sender of the email is willing to give you a percentage of the amount transferred in exchange for using your bank account. Never submit your social security number and checking account or credit card number via an email or an unfamiliar website. This is also known as Nigerian letter fraud and among one of the highest dollar loss frauds with an average of $3000. Online Dating You would also be surprised how easily people give their hard earned money away to people they meet over the internet but not in person. The victim meets someone in a chat room or message board and builds a friendship with the perpetrator who usually sends the victim a picture of an attractive person. When the time comes to meet, the schemer admits to not having the money for airfare and expenses, so the victim sends the money via Western Union or similar money transfer service, never to hear back from the person again. Avoiding Scams Here are a few ways to avoid becoming a victim of a scam: Please visit the IFCC or view the annual report at http://www1.ifccfbi.gov/strategy/statistics.asp for more information about internet fraud. James Junior is a freelance writer and web programmer for http://www.jccorner.com
|
RELATED ARTICLES
Its War I Tell You! There are ways to insure security though. You can get the Windows Update CD from Microsoft and install that before you get online, You can also get most Antivirus Definitions downloaded and save them to disk, then install those before you go online, (of course you have to be using that Product in the first place), and you can get Anti-Spyware on a disk and do the same. But how many people do that in their excitement to take their new computer out of the box and hook it and see what it will do? Sans Internet Storm Center says those people will have their computer infected with adware or worse in less than 20 minutes! Virgin computers online are an easy target, open to attack. When that person soon realizes their brand new computer is sick, first comes the shock, then the anger, then the question; how do I fix it? If the new computer owner is lucky they can fix it fairly cheaply. It might involve a lot of time listening to elevator music while you're in the hold queue?. either way it's no fun. Preventing Online Identity Theft Identity theft is one of the most common criminal acts in society today. Criminals will use your personal information such as banking accounts and passwords, to pretend that they are you. They may take out credit cards in your name, mortgages, or even worse. The internet has opened up a whole world of possibilities for these criminals, and the threat is very real. There are things that you can do to help prevent such a crime. It costs very little to protect your information, and it is money well spent. Identity Theft Offline -- So Many Possibilities Chris Simpson, head of Scotland Yard's computer crime unit was unpleasantly surprised to learn how easy it is to cheat anybody out of his or her personal info -- by means of a fake survey. Spyware Symptoms Spyware symptoms happen when your computer gets bogged down with spyware programs running in the background without your knowledge. Spyware, adware, malware and even spamware can cause your computer to behave very strange. 3 Pervasive Phishing Scams Scams involving email continue to plague consumers across America, indeed the world. These so called "phishing" scams involve "spoofed" emails meant to draw the unwary to bogus internet sites masquerading as legitimate sites. These scam artists -- phishers -- attempt to hook visitors in by having them divulge certain critical and personal bits of information. Once the information has been divulged the phishers start their dirty work and you have been conned. Several phishing scams continue to persist, the following are three of the most pervasive ones. Reporting Internet Scams When it comes to reporting Internet scams most of us either don't have a clue who to contact or just ignore them in our email. But according to an FBI report in December 2004, nearly ten million people last year didn't ignore them and fell for the latest Internet scams. The money those victims lost totaled nearly $5 billion. The Attack of the Advertiser - Spy Mother Spy The menacing campaigns that drive the corporate spyware and adware market is developing way out of hand. Who are these companies and how do they get away with it? They are costing computer users millions with their sneakware system of promotional crap! Secrets On Security: A Gentle Introduction To Cryptography Let us take the example of scrambling an egg. First, crack the shell, pour the contents into a bowl and beat the contents vigorously until you achieved the needed result - well, a scrambled egg. This action of mixing the molecules of the egg is encryption. Since the molecules are mixed-up, we say the egg has achieved a higher state of entropy (state of randomness). To return the scrambled egg to its original form (including uncracking the shell) is decryption. Impossible? Phishing and Pharming: Dangerous Scams As soon as almost all computer users already got used to -- or at least heard about -- the word "phishing", another somewhat confusing word appeared not long ago. Pharming. Does it differ from phishing -- and if yes, how? A Personal Experience with Identity Theft Some months ago, before there was much publicity regarding phishing and identity theft, I became a victim. Corporate Security for Your Home Business The words Corporate Security may conjure up images of a group of techies working in a wire-filled basement room of Microsoft or HP, combating hackers and terrorists online using words like algorithm and encryption. If you own your own business, do not allow yourself to think that security is only for big corporations. Every company, big or small, technological or traditional, has two major security concerns: protecting information, and protecting hardware. How to Protect Yourself Against Online Criminals Credit card fraud is a growing problem for online businesses and can hurt your business in many ways. Viruses and Worms, Protection from Disaster Virus damage estimated at $55 billion in 2003. "SINGAPORE - Trend Micro Inc, the world's third-largest anti-virus software maker, said Friday that computer virus attacks cost global businesses an estimated $55 billion in damages in 2003, a sum that would rise this year. Companies lost roughly $20 billion to $30 billion in 2002 from the virus attacks, up from about $13 billion in 2001, according to various industry estimates." This was the story across thousands of news agencies desk January 2004. Out of $55 billion, how much did it cost your company? How much did it cost someone you know? The Important Steps To Protect Your Kids on the Internet Internet is the ocean of knowledge. In this ocean youwill find beautiful pearls of knowledge. Also you mustnot forget the lethal sharks (x rated sites) in thisocean, especially when you allow your innocentchildren to surf on it. The children are morevulnerable when they are using the Internet withoutclose vigil of their parents. Instant Messaging ? Expressway for Identity Theft, Trojan Horses, Viruses, and Worms Never before with Instant Messaging (IM) has a more vital warning been needed for current and potential IM buddies who chat on line. Web Conferencing Readers - So What Do We Do with the PAYPAL SPAMMER From: "Paypal Security"Subject: New Security RequirementsDate: Tue, 26 Jul 2005 19:20:51 -0800 Online Cell Phone Scams and Spam They're out there. Individuals trying to make a quick buck at your expense. You labour hours on end to produce quality content on your website only to get repetitive requests for huge numbers of product or promises for the greatest deals online. As a webmaster for a cell phone and PDA site, I've had my share of spam and scams come through, mostly via email, some posted on my forum. The purpose of this article is to provide a few methods of detecting spam and scams, and provide a few examples as well. Take a look over and protect yourself from online cellular fraud. Avoid Internet Theft, Fraud and Phishing Since its birth, the Internet has grown and expanded to unprecedented, unmanageable proportions. Information, software, news, and much more flow freely through its twisted pathways. Online services such as Internet banking save time and money. However, from the depths of its vast expanse have come the dregs of society intent on preying on the new, the naïve, and the less informed. How Free Scripts Can Create Security Problems With the Internet entering our lives in such an explosive manner, it was inevitable that Internet security issues would follow as well. While credit card frauds are an offline security problem that has been carried over to the Internet as well, spamming and phishing are uniquely Internet security hazards. Crack The Code - Thats A Direct Challenge I Challenge You To Crack The Code-------------------------------------I had quite an interesting experience recently. I was hired by a company to perform a vulnerability assessment and penetration test on their network. During the initial meeting, one of the key technical staff presented me with a challenge; He handed over the NTLM hash of the domain Administrator account and challenged me to decipher it. He explained that the complexity and length of the password would prevent me from deciphering it during the time allotted for the project. He was actually quite confident in my impending failure. |
© Athifea Distribution LLC - 2013 |