www.1001TopWords.com |
A Personal Experience with Identity Theft
Some months ago, before there was much publicity regarding phishing and identity theft, I became a victim. My first inkling that I'd been scammed came from a telephone call from my bank asking if I had been to Italy or Roumania. Of course I had not. I was informed by the bank that a number of charges for hotel bills and cash withdrawals had been made from my account.Thieves had made a counterfeit Debit Card with which to rifle my account. I had in the vicinity of $1900.00 in the account so I had to have the bank transfer enough from my savings to cover these charges, so as not to have my other checks "bounce". We closed the old account and opened a new one. At first I could not imagine how it happened, then I remembered. I've been an eBayer for several years and I use Paypal frequently. Some weeks previously I had received e-mail from eBay stating that there were some attempts to fraudulently access my account and they wanted to verify my account information. They said the matter was urgent and if I didn't respond promptly my account would be suspended. I thought this was a bit odd, so I clicked on several links to see if it was a legitimate message and the links worked so I complied with the request. The result was that my checking account was cleaned out. Since then I have found out ways to verify whether these messages are bogus or not. If you visit my web site http://www.caveatemptorus.com you will find detailed information in this regard. Checking a few links is not sufficient to verify the validity of a document. Here in a nutshell is the best way to avoid this type scam: DO NOT ANSWER ANY E-MAIL asking for personal financial data.EBay, Paypal, banks and other institutions never use e-mail for such purposes. If you are concerned about your accounts initiate the contact yourself, then you'll know you're dealing with the right party. NEVER GIVE YOUR PIN NUMBER to anyone for any reason. The only purpose it has is to relieve you of your money. Merchants don't need it when you make purchases. DO NOT USE DEBIT CARDS or your checking account for online or phone transactions, in spite of Paypal's inducements. Use a consumer protected Credit Card. You have much better protection. I recovered my money from the bank as this was a case of fraud, but it took several months. Since then I have received any number of similar messages, purportedly from eBay and Paypal. You can forward them to www.spoof@ebay.com for verification. All the ones I sent were bogus. By: George W. Cannata You have permission to publish this aticle in its entirety without changes and it must contain all links and credits to the author.
|
RELATED ARTICLES
Web Conferencing Readers - So What Do We Do with the PAYPAL SPAMMER From: "Paypal Security"Subject: New Security RequirementsDate: Tue, 26 Jul 2005 19:20:51 -0800 Eliminate Adware and Spyware Everyone should eliminate spyware and adware from your hard drive for your computer privacy protection. Spyware and adware programs also slow down the speed of your computer by cluttering your hard drive with annoying programs. Once you eliminate adware and spyware, your computer speed will improve immediately. Computer Viruses, Worms, and Hoaxes In recent days, I was one of the unfortunate persons to receive the "Mydoom" worm emails. Not just one, but at least forty appeared in my popserver mailbox. As frustrating as it was deleting all of these nasty little boogers, I realized that some of these "worm" emails even came from persons I knew - or so I thought I knew. I Spy...Something Terribly Wrong (In Your Computer) This really chapped my lips... 5 Simple Steps to Protect your Digital Downloads A couple of days ago, I was searching for a popular eBook online. How to Protect Yourself Against Online Criminals Credit card fraud is a growing problem for online businesses and can hurt your business in many ways. Dont Get Hacked - A Guide to Protecting Your Business from Thieves You've seen it in the news - 40 million credit cards exposed! Are You Surfing Safe? Ok, you've got a computer, and you get online. You surf your favorite sites, Sports, Shopping, Cowchip Tossing Blogs, and so on. Your kids download songs and IM their friends. But are you being tracked? Is your personal information stored safe on your computer or is it being mined to a geeky looking guy sitting in the dark half a continent away? Do you know for sure you are secure? Many people don't. Is Shopping Online For Your Horse Gifts Safe? Shopping for horse gifts or other gift items on the internetis quick, convenient and is probably safer than you think.However, you still need to be aware that it is essential tovigorously protect your privacy and financial informationwhen making purchases online. Spyware Symptoms Spyware symptoms happen when your computer gets bogged down with spyware programs running in the background without your knowledge. Spyware, adware, malware and even spamware can cause your computer to behave very strange. Consumers: Shop Online and Get Information Safely Do you really have to know how feeds work? Not really. But you do need to understand how they can benefit you as a consumer or as an information seeker. Email Scams ? Ten Simple Steps To Avoiding Them According to the Anti-Phishing Working Group (APWG) email scams also known as phishing attacks claim more than 2,000 victims each day from more than 75 million phishing emails that are sent each day. The APWG also claims that these email scams steal close to $1 billion a year from its victims. Phishing - A High Tech Identity Theft With A Low Tech Solution Have you ever got an email asking you to confirm your account information from a bank or a company that you have never done business with? The email looks official and it even has a link that appears to take you to the company's website. The email you have received is actually from an identity thief. These crooks are hoping people that have an account with the business will click on the link and submit their account information for verification purposes. These thieves are phishing for account information. Phishing is a sophisticated way to lure you to phony websites where you voluntarily surrender your passwords and account information to identity thieves without realizing it. Identity Theft -- 10 Simple Ways to Protect Your Good Name! Identity Theft is one of the most serious problems facing Internet users. Identity Theft is exactly as the name states -- someone steals your Identity and commits fraud in your name. It can result in untold financial and legal problems that may literally ruin your peace of mind and/or your life. Someone gaining control of your most personal details can reck havoc and result in dire consequences for you and your family. A Painless Plagiarism Solution A crowded marketplace can lead to unethical webmasters using underhand techniques to get ahead of their competitors and online plagiarism is one of the easiest. Reporting Internet Scams When it comes to reporting Internet scams most of us either don't have a clue who to contact or just ignore them in our email. But according to an FBI report in December 2004, nearly ten million people last year didn't ignore them and fell for the latest Internet scams. The money those victims lost totaled nearly $5 billion. Computer Security What is computer security?Computer security is the process of preventing and detecting unauthorized use of your computer. Prevention measures help you to stop unauthorized users (also known as "intruders") from accessing any part of your computer system. Detection helps you to determine whether or not someone attempted to break into your system, if they were successful, and what they may have done. With the Rise of Internet Crimes, Users are Turning to High-Tech ?PI?s? for Solutions High-tech private investigators are becoming the answer for many Internet users who have been victimized online. The use of e-mail by that unethical element lurking in cyberspace rings all too common these days. With law enforcement agencies overwhelmed and under trained to address these issues, victims have often been left to deal with them on their own. How To Cover Your Tracks On The Internet Every single time you access a website, you leave tracks. Tracks that others can access. If you don't like the idea, find out what software can help you cover them. Anti-Spyware Protection: Behind How-To Tips There is no doubt that "how-to articles" have become a separate genre. One can find such an article about almost anything; there are even some entitled "How to Write a How-To Article". And, of course, the Web is swarming with the ones like "10 Steps to Protect Your PC from Spyware"(if not 10, any number will do; odd ones like 5,7,9 are most popular) or "How to Forget About Spyware For Good". Please don't accuse me of being sarcastic -- I am not; all these articles by all means are informative and so very useful. They all include really handy tips to protect you from this recently emerged plague called spyware. But? |
© Athifea Distribution LLC - 2013 |