![]() | |
![]() | |
![]() |
Security Information |
|
![]() |
Watch Out For That Scam
The IFCC (Internet Fraud Complaint Center) received over 200,000 complaint submissions for 2004, an increase of 66.6% from 2003. The total dollar loss from all referred cases exceeded 68 million dollars, an average loss of $894 per complaint. There are many types of internet frauds that exist including auction, email, foreign investment letters and online dating. Here are some ways to identify a possible scam or fraud that you may have encountered while surfing the internet. Auctions Auction sites are one of the best places to purchase and sell items. They are also one of the easiest places to become an internet fraud victim. Auction fraud represented 71% of the total referred fraud complaints. How the scam works is that you win the auction, but never receive the item. Most of the time the auction site cannot assist you in recovering the money stolen. They will remove the member's account and disqualify the member's email address from their site but are not able to do much else. It is in your best interest to research each seller before making any purchases.Auction sites have a rating system for their members and I would advise you to check this and their profile for certain clues. The first is to check how many sales have been completed and the response from the buyers. I would suggest no less than a hundred transactions for moderately priced items (less than a hundred dollars). A scammer will become a member and sell fifty items for a dollar or less usually in a week or two to build up his member rating. Then they will post twenty auctions ending within a day of each other for items that retail for over a hundred dollars but they are selling them for an unprofitable amount. Again, research a seller's auction history before placing your bid. Also, if Western Union or similar is stated to be the only form of payment, move right on to the next auction. Fraudulent Email Email is a great form of communication and also an easy target for schemers. Electronic mail is the primary mechanism by which a perpetrator makes contact representing 63% compared to just 7% by phone. Fraud victims will receive an email with a link stating that their account information needs to be updated. Upon clicking on the link you are taken to a page that looks almost identical to the member page and asks you to enter in your name, address, social security number, checking account routing number and/or credit card number. When you hit the submit button, your information is instantly shuttled to someone waiting to separate you from your money. Before submitting your information, verify that you are truly on the site that the link states it is taking you. Foreign Investment Letter Another popular email scheme is an email from a foreign country stating that they have millions that need to be transferred to the United States but need a bank account to finalize the transaction. The sender of the email is willing to give you a percentage of the amount transferred in exchange for using your bank account. Never submit your social security number and checking account or credit card number via an email or an unfamiliar website. This is also known as Nigerian letter fraud and among one of the highest dollar loss frauds with an average of $3000. Online Dating You would also be surprised how easily people give their hard earned money away to people they meet over the internet but not in person. The victim meets someone in a chat room or message board and builds a friendship with the perpetrator who usually sends the victim a picture of an attractive person. When the time comes to meet, the schemer admits to not having the money for airfare and expenses, so the victim sends the money via Western Union or similar money transfer service, never to hear back from the person again. Avoiding Scams Here are a few ways to avoid becoming a victim of a scam: Please visit the IFCC or view the annual report at http://www1.ifccfbi.gov/strategy/statistics.asp for more information about internet fraud. James Junior is a freelance writer and web programmer for http://www.jccorner.com
MORE RESOURCES: Opinion | What Happens When There’s a Real National Security Crisis? The New York Times AI Adoption in the Enterprise: Breaking Through the Security and Compliance Gridlock The Hacker News Trump moves to fire several national security officials deemed insufficiently loyal, AP sources say Star Tribune Trump fires NSC officials a day after far-right activist raises concerns to him about staff loyalty AP News Trump ousts members of National Security Council staff The Washington Post Trump fires six national security staffers after meeting with far-right activist Laura Loomer The Guardian NCS⁴ Announces 16th Annual National Sports Safety and Security Conference & Exhibition Agenda The University of Southern Mississippi Advisory warns of fast flux national security threat, urges action to protect critical infrastructure Industrial Cyber Lebanon-Syria Border Talks Can Restrain Hezbollah and Boost Security The Washington Institute Trump fires national security officials after Laura Loomer ‘excoriated’ them in Oval Office meeting AL.com Global health security Gavi, the Vaccine Alliance Trump Moves to Fire Several National Security Officials Deemed Insufficiently Loyal, AP Sources Say Military.com Utimaco Launches Post Quantum Security App Package The Quantum Insider Trump fired at least one national security aide following pressure from far-right activist Laura Loomer NBC Los Angeles Homeland Security Investigations expects more victims in Bartow Co. labor trafficking case Atlanta News First Congo War Security Review, April 3, 2025 Critical Threats House Democrats to head to U.S.-Mexico border in California to scrutinize Trump security policies Fox News IDF, Israel Police ignored all security dangers leading to Nova festival massacre The Jerusalem Post White House national security officials fired, sources say Honolulu Star-Advertiser Observers say IDF abandoned Gaza border outpost in 12-hour security lapse The Jerusalem Post Trump purges national security team after meeting conspiracist Nonstop Local News Apple Head of Global Security found not guilty in bribery trial tied to concealed gun permits NBC Bay Area Commission presents a European internal security strategy European Commission Annual Assessment Lists Primary Threats to U.S. National Security AFCEA International Ivanti patches Connect Secure zero-day exploited since mid-March BleepingComputer Netanyahu says Israel will establish a new security corridor across Gaza to pressure Hamas - AP News Senate GOP's blueprint for Trump's 'big, beautiful' agenda includes tax cuts, border security and more — here's what's inside New York Post White House National Security Officials Fired, Sources Say, in Trump's First Purge U.S. News & World Report Trump's national security adviser reportedly used his personal Gmail account to do government work TechCrunch DHS arrests man in McKinney accused of making terroristic threats against Homeland Security Secretary, ICE NBC 5 Dallas-Fort Worth Wayne Board of Education President Don Pavlak, Provides Update on School Security Measures - TAPinto ISC West 2025 Show Floor Spotlight: BOSCH SECURITY AND SAFETY SYSTEMS Security Info Watch Trump Fires Three White House National Security Officials WBZ NewsRadio 1030 Trump said to fire several National Security Council officials The Times of Israel |
![]() |
![]() |
![]() |
RELATED ARTICLES
Top Spyware Removers Considerations Only the top spyware removers are successful at detecting and removing spyware and adware from your computer. You should look for complete protection against these threats: spyware, adware, keyloggers browser hijackers and Remote Access Trojans. Watch Out For That Scam The IFCC (Internet Fraud Complaint Center) received over 200,000 complaint submissions for 2004, an increase of 66.6% from 2003. With the Rise of Internet Crimes, Users are Turning to High-Tech "PI's" for Solutions High-tech private investigators are becoming the answer for many Internet users who have been victimized online. The use of e-mail by that unethical element lurking in cyberspace rings all too common these days. Parental Control - Dangers To Your Child Online & Internet Child Safety Tips Did you know.. SCAMS - Be Aware - And Report When Necessary The Internet is a vast International Network of people and businesses - and a place where people can make a fairly decent living. However, it is also a place where certain unsavory characters can freely roam - to take your dollars and run. How to Protect Your Child from the Internet When the Internet first came about, it was realized it could be quite the multi-tasking machine. These days people use it for just about everything, from downloading music to checking e-mail, and virtually making the rest of the globe closer all the time. The Saga of the Annoying Adware When we think of adware, what comes to mind are those annoying and pesky ads that pop up out of nowhere whenever we are surfing the net. Anybody who has surfed through the net has encountered those irritating pop-up adwares advertising everything from computer software down to Viagra. How to Thwart the Barbarian Spyware! Today,on most internet user's computers, we have theability to employ software, along with ourintelligence, to prevent viruses and spyware.To put this article into proper perspective, we'll useMedieval defense tactics. The Truth About Hiding Your Tracks on the Internet Ok, ok, I know you've seen them. All those pop up windows claiming that "You're being watched!" or banner ads saying "Your computer is under surveillance!" And all you need to do is buy their product and your computer's visbility will disappear from the Internet. The Move to a New Anti-Virus Model This is the second in a series of articles highlighting reasons why we need a new model for anti-virus and security solutions.Reason #1: the Basic ModelAnti-virus software vendors still rely on yesterday's methods for solving today's problems: they wait for the next virus to wreak havoc and then produce a solution. A New Era of Computer Security Computer security for most can be described in 2 words, firewall and antivirus.Until recently could one install a firewall and an antivirus program and feel quite secure. Identity Theft - Beware of Phishing Attacks! "Dear Bank of the West customer", the message begins. I've just received an e-mail message, purportedly from the security department at the Bank of the West. Eliminate Adware and Spyware Everyone should eliminate spyware and adware from your hard drive for your computer privacy protection. Spyware and adware programs also slow down the speed of your computer by cluttering your hard drive with annoying programs. 40 Million People Hacked - YOU as Identity Theft Victim Saturday, MasterCard blamed a vendor of ALL credit cardproviders called CardSystems Solutions, Inc., a third-partyprocessor of payment card data, as the source of loss of 40million consumers credit card information. How To Prevent Spyware Attacking Your Computer Spyware is software or hardware installed on a computerwithout a user's knowledge. It gathers information andreports it back to its source. Website Security - Creating a Bulletproof Site in 5 Easy Steps When it comes to a secure website and passwords it is all in your hands to create a password that a hacker simply cannot crack. However, this will require that you be creative and use everything at your fingertips to create the strongest password possible for a secure web site. Virus Prevention 101 Blaster, Welchia, Sobig, W32, Backdoor, Trojan, Melissa, Klez, Worm, Loveletter, Nimda? Do these names sound Familiar?Have you been as bothered by viruses this past year as I have? Does it seem like there are more viruses, worms and Trojans out now then ever before? It is only getting worse.For the general public, "virus" has become a catchall term for any unwanted program that spreads from computer-to-computer; yet, in reality, there are differences between viruses, worms and Trojan horses. Is Your Email Private? Part 1 of 3 In a word, no - an email message has always been nothing more than a simple text message sent unencrypted to a recipient we choose. So all the email that we so blithely send all over the Internet everyday is neither private nor secure. New Mass Mailing Spamming Internet Trojan for the Windows Platform May. 16th 2005 - MicroWorld has reported the discovery of Troj/Sober-Q, which is a mass mailing spamming internet Trojan for the Windows platform. Be Aware of Phishing Scams! If you use emails actively in your communication, you must have received various messages claiming to be from Ebay, Paypal and a number of banks. A recent email as if from U. ![]() |
home | site map |
© 2006 |