![]() | |
![]() | |
![]() |
Security Information |
|
![]() |
Online Shoppers, Beware of a New Scam
Beware of a New Scam Aimed at Bargain-Hunters Trying to buy something cheap is absolutely natural--and online crooks set traps for unwitting bargain-hunters. On April 6 Panda Software warned Internet users of a new particularly brazen scam aimed at stealing confidential information. Several websites offering cheap airline tickets in fact weren't selling anything; the aim was to cheat users out of credit card details. Of course, these sites have already been identified and disabled, but who knows whether (or better to say when) other ones will appear again, this time offering all kinds of products. The scam is very simple; the thieves simply wait until some unsuspecting user who is searching for airline ticket offers, finds their site offering dirt-cheap airline tickets. Really pleased with himself and looking forward to the trip, the user fills in the form, entering his credit card number, expiry date and verification value (CVV). As soon as these details have been entered, an error page appears; it tells the user that the transaction has been unsuccessful, and offers instructions on how to pay for the ticket by postal money order. So the user may well be fooled twice. He loses his credit card details, putting them right into the hands of cyber-crooks, and then loses money, if decides to buy the ticket by money order. Luis Corrons, the director of PandaLabs, comments on this scam: "This kind of online fraud differs from those witnessed previously. The malicious user does not contact the person interested in buying the product, but it is actually the buyer, in searching for the best prices online, who goes to the fraudulent web page. This creates a false sense of security that can lead users to proceed with the transaction". This makes such a scam very dangerous. It is the user who finds the "bargain"; no spam or pop-up ad is involved-- actually, nobody either forces or tries to persuade the user to buy something. This tactic is bound to be "effective", if such a word is appropriate here. That is why it is extremely likely that there will be other websites and other scams using the same pattern. Too Cheap to be a Bargain? You'd Better Steer Clear How to avoid this kind of fraud? "Users are best advised to treat 'bargains' with suspicion, and only make online purchases from trusted sites. In any event, if in doubt, it is a good idea to search for information about the website in question on the Internet. Users should be able to find opinions and experiences of other users who have used the same service," says Luis Corrons. That's all users can do so far -- to steer clear of suspicious bargains and to check the firm one is going to buy from. Of course, the authorities are informed; these cybercriminals will be tracked, caught and sent to jail. But this entire story gives a strong impression that cybercrooks are becoming more and more shameless. People get cheated when they expect it the least -- just remember bogus appeals to make donations for tsunami victims. Such criminals are impudently taking advantage over majority of people -- over those who remember the Golden rule and expect others to behave the same way. That is why everybody who either falls the victim of this --or any other--scam, or learns about such incidents, should make this information public. This will be a small contribution that may help to curb growing cybercrime. Alexandra Gamanenko currently works at Raytown Corporation, LLC -- an independent software developing company that provides various solutions for information security. Learn more -- visit the company's websitehttp://www.anti-keyloggers.com
MORE RESOURCES: Why NHIs Are Security's Most Dangerous Blind Spot The Hacker News Inside the Fiasco at the National Security Council The Atlantic Britain Lifts Sanctions on Syrian Security Agencies The New York Times Summit on the Future of Energy Security IEA – International Energy Agency Defense Officials Outline AI's Strategic Role in National Security U.S. Department of Defense (.gov) Remarks at a UN Security Council Briefing on the Political and Humanitarian Situations in Syria United States Mission to the United Nations (.gov) He was an undercover cop and Dennis Rodman’s security guard. Now, he keeps the Phillies safe Police1 RSAC highlights security markets in transition SiliconANGLE Everything You Need to Know About the Air Defenses Protecting World Leaders at the Pope’s Funeral The Aviationist New Security Perimeter Around Mt. Kolang Gaz La Secret Nuclear Tunnel Complexes Institute for Science and International Security (ISIS) Signalgate lessons learned: If creating a culture of security is the goal, America is screwed theregister.com Remarks at a UN Security Council Briefing on Haiti United States Mission to the United Nations (.gov) Legislature should provide lobbyists with key fobs to bypass new Capitol security screening The Alaska Landmine California security firm CEO, workers charged after woman forcibly removed from Republican town hall Los Angeles Times Ukraine, allies working on security guarantees potentially similar to NATO Article 5, Zelensky says The Kyiv Independent Joint Press Statement on United States-Japan-Republic of Korea Trilateral Security Coopera U.S. Department of Defense (.gov) Punxsutawney native begins serving as special assistant in Department of Homeland Security The Courier Express National Security Commission on Emerging Biotechnology’s Final Report Includes Recommendations to Boost Economy and Protect National Security NatLawReview.com NSA targets OT cyber risks with new smart controller security standards for national security systems Industrial Cyber NSA Publishes Recommendations for Smart Controller Security Controls and Technical Require National Security Agency (.gov) Allegiant flight attendant finds bomb threat just before St. Pete-Clearwater International departure: Sheriff FOX 13 Tampa Bay Yes, You Can Take Water Through Airport Security—Here's How Travel + Leisure Get to know new security leaders at OSU-CHS Oklahoma State University Security Alert: Los Cabos and La Paz, Baja California Sur U.S. Embassy & Consulates in Mexico (.gov) Anton’s Security Blog Quarterly Q1 2025 Security Boulevard D51 security officials discuss increased assault, weapon incidents in schools The Grand Junction Daily Sentinel US House Committee subpoenas Chinese state telecoms over data privacy, national security concerns Industrial Cyber US security agency TSA seizes mobile phone charger because it looks like a Call of Duty Monkey Bomb Eurogamer Safeguarding Your Corporate Leaders Against Rising Security Threats: FP’s Guide on Executive Protection Fisher Phillips DOJ’s Data Security Program Final Rules Effective – Implications for Telecom Providers NatLawReview.com UN Security Council condemns Jammu and Kashmir terror attack Department of Political and Peacebuilding Affairs Fiesta goers can expect increased security at main events Texas Public Radio Linux 'io_uring' security blindspot allows stealthy rootkit attacks BleepingComputer Mobile Applications: A Cesspool of Security Issues Dark Reading Rome Health to install new security systems Rome Sentinel Homeland Security, Riverside County deputies raid business in Pomona FOX 11 Los Angeles Trump Should Have Stuck With Border Security, Not Mass Deportations New York Magazine ATA Transportation Security Council Recognizes Fleets American Trucking Associations How To Build A Data Center Security Strategy For 2025 And Beyond CybersecurityNews Palestinian supporters confront far-right Israeli security minister as he leaves an event near Yale CNN Two state officials follow Noem to Homeland Security; Rhoden names new tribal relations head South Dakota Searchlight Local Advocates, Officials and Faith Leaders Speak Out Against Homeland Security Letter Falsely Telling Thousands They Must Leave US River Journal Online Security guard takedown exposes questions over $11 million contract with Metro Transit 5 EYEWITNESS NEWS Footage Reveals New York-To-Paris Delta Flight Stowaway Getting Through Airport Security Travel Noire King County Security Tips – “Google” yourself kcemployees.com Court grants NM Tech student temporary restraining order against Homeland Security Source New Mexico Exploding Cargo. Hacked GPS Devices. Spoofed Coordinates. Inside New Security Threats in the Skies. Vanity Fair Our National Debt is a Security Threat HubCitySPOKES Department of Homeland Security points to another agency when asked about court-barred deportations AP News Hyosung Urges Operators of All ATMs to Follow Previous Security Guidance Due to Large-Scale Cyberattacks Business Wire Temple University stepping up security after several students assaulted near campus last week CBS News |
![]() |
![]() |
![]() |
RELATED ARTICLES
Data Security; Are Your Company Assets Really Secure? Is your data secure? Think again. Securing data is unlike any other corporate asset, and is likely the biggest challenge your company faces today. Website Security - Creating a Bulletproof Site in 5 Easy Steps When it comes to a secure website and passwords it is all in your hands to create a password that a hacker simply cannot crack. However, this will require that you be creative and use everything at your fingertips to create the strongest password possible for a secure web site. Wells Fargo Report Phishing Scam First off I should explain what phishing is. Phishing is basically the act of tricking a victim into divulging information. Click Here To Defeat Evil Microsoft routinely releases new security updates, many of which are given it's highest severity rating "critical". Here's a typical announcement:"A security issue has been identified that could allow an attacker tocompromise a computer running Internet Explorer and gain control over it. Protect Your Little Black Book The movie Little Black Book features a young woman, Stacy, who is frustrated when her boyfriend refuses to share information about his past relationships. When his PDA, a Palm Tungsten C, falls into her hands, she is faced with a conundrum. Corporate Security for Your Home Business The words Corporate Security may conjure up images of a group of techies working in a wire-filled basement room of Microsoft or HP, combating hackers and terrorists online using words like algorithm and encryption. If you own your own business, do not allow yourself to think that security is only for big corporations. Reducing Fraudulent Transations - 5 Simple Ways To Protect Yourself The money being spent online is steadily growing. With billions of dollars being spent each year online, the opportunity to make money on the internet has never been bigger. Personal Firewalls for Home Users What is a Firewall?The term "firewall" illustrates a system that protects a network and the machines on them from various types of attack. Firewalls are geared towards keeping the server up all the time and protecting the entire network. 8 Surefire Ways to Spot an E-Mail Identity Theft Scam! The E-Mail Identity Theft Scam is running Rampant. These E-Mail Scam artists will go to great lengths to Get Your Bank Account information and Steal your Identity. 3 Pervasive Phishing Scams Scams involving email continue to plague consumers across America, indeed the world. These so called "phishing" scams involve "spoofed" emails meant to draw the unwary to bogus internet sites masquerading as legitimate sites. Free Ways to Tackle Threats to Your Computer Protect Your PCHaving problems with your pc?Do your kids, family or friends fill it with all the stuff they find on the internet?Your computer, just like your car, needs to be serviced regularly to keep it running efficiently. You wouldn't fill your car up with petrol from an old rusty can with a layer of dirty water on the bottom, so you shouldn't allow your pc to be treated that way either. Firewalls: What They Are And Why You MUST Have One! A firewall is a system or gateway that prevents unauthorized access to your computer or private network. It is usually the first line of defense in protecting your private information or data. Dont be a Dork - Protect Yourself There are folks out there who use their powers for evil, not good. Let's not give them the opportunity to sneak into our lives and wreak havoc. Online Shopping: 10 Tips For Safe Online Shopping Have you ever bought a product or service from the internet?Yes? Me too. You're not alone?Some of the reasons why most people are shopping online are: they can buy anything at anytime because Internet shopping is available 24 hours, all the time. How Did This Happen to Me? Top 10 Ways to Get Spyware or Viruses on Your Computer If you use the internet, you have probably been infected with a virus, trojan or spyware. According to the SANS Internet Storm Center, the average unprotected PC is infected within 20 minutes of normal internet usage. The Risk Of Electronic Fraud & Identity Theft Electronic Fraud and Identity Theft-----------------------------------Human beings are pretty sensible when presented with an imminent threat or risk. That is, if it's staring us directly in the face. Adware and Spyware: The Problems and Their Solutions The Threat10 years ago you could probably have run no Internet security applications and still have come out after a browse of the Internet with a virus and malware free computer, but this situation is no longer apparent. Several years ago, before I knew of the dangers of the Internet, I had absolutely no spyware or adware protection. How Can Someone Get Private Information From My Computer? From the "Ask Booster" column in the June 17, 2005 issue of Booster's Auction News, a free ezine for online auction sellers and enthusiasts.Dear Booster,How can someone get private information from my computer?Thank you,Evan S. Reporting Internet Scams When it comes to reporting Internet scams most of us either don't have a clue who to contact or just ignore them in our email. But according to an FBI report in December 2004, nearly ten million people last year didn't ignore them and fell for the latest Internet scams. Phishing - Learn To Identify It Phishing: (fish'ing) (n.)This is when someone sends you an email falsely claiming to be a legitimate business - like your bank or credit card company - in an attempt to scam you into giving them your personal, private information that they can use to access your accounts. ![]() |
home | site map |
© 2006 |