![]() | |
![]() | |
![]() |
Security Information |
|
![]() |
A New Low
A new variation of the Nigerian Scam theme This is particularly despicable because not only are people losing their money but dogs are being abandoned in freight terminals or being killed to get rid of them. Unsuspecting dog breeders have been caught off guard by this now well advertised scams as complaints are still numerous. These are usually high value dogs so the losses are often substantial. These thieves are very clever and are well prepared. They have fine tuned this system of fraud, so it's easy for the unwary to be duped. They're extremely persuasive and carefully execute their plans. Unfortunately it's virtually impossible to catch them as they operate from overseas and are expert in covering their tracks. Their method of operation is to claim that they are from some foreign country and they want to buy the item you have for sale, whether it's a car or a dog or some other relatively high value item. They tell you that someone in USA owes them money and that they will send you a check for an amount far in excess of your asking price. They don't haggle over the price in fact offers a bonus. You are supposed to cash the check then send them a money order for the difference. The problem is that the checks are counterfeit, but so well done that bank tellers can't detect that they're bogus. If you've sent the money when the check fails to clear, you are responsible, not the bank. I read a recent article by a reformed con artist who claims that Americans are stupid, just waiting to be fleeced. This is not true. The problem is that we are the most generous, trusting people on earth, consequently we are often easy prey for these despicable predators.I think this is particularly true of animal lovers who just don't anticipate this kind of behavior. We have to learn to become more wary and know how to combat these thieves. Caveat Emptor, let the buyer beware. For more information on this subject visit: http://www.caveatemptorus.com Written by: George W. Cannata, author and publisher of the web site http://www.caveatemptorus.com July 29, 2005. You may copy this article in its entirety so long as you include credit to the author.
MORE RESOURCES: Why NHIs Are Security's Most Dangerous Blind Spot The Hacker News Security Alert: Los Cabos and La Paz, Baja California Sur U.S. Embassy & Consulates in Mexico (.gov) Belarus Weekly: Russian, Belarusian security services plan violent attacks on Belarusian diaspora The Kyiv Independent Remarks at a UN Security Council Briefing on the Political and Humanitarian Situations in Syria United States Mission to the United Nations (.gov) Summit on the Future of Energy Security IEA – International Energy Agency Defense Officials Outline AI's Strategic Role in National Security U.S. Department of Defense (.gov) He was an undercover cop and Dennis Rodman’s security guard. Now, he keeps the Phillies safe Police1 Everything You Need to Know About the Air Defenses Protecting World Leaders at the Pope’s Funeral The Aviationist Signalgate lessons learned: If creating a culture of security is the goal, America is screwed theregister.com NSA targets OT cyber risks with new smart controller security standards for national security systems Industrial Cyber Allegiant flight attendant finds bomb threat just before St. Pete-Clearwater International departure: Sheriff FOX 13 Tampa Bay Get to know new security leaders at OSU-CHS Oklahoma State University Legislature should provide lobbyists with key fobs to bypass new Capitol security screening The Alaska Landmine US House Committee subpoenas Chinese state telecoms over data privacy, national security concerns Industrial Cyber Inside the Fiasco at the National Security Council The Atlantic Safeguarding Your Corporate Leaders Against Rising Security Threats: FP’s Guide on Executive Protection Fisher Phillips ATA Transportation Security Council Recognizes Fleets American Trucking Associations Mobile Applications: A Cesspool of Security Issues Dark Reading Ukraine, allies working on security guarantees potentially similar to NATO Article 5, Zelensky says The Kyiv Independent New Security Perimeter Around Mt. Kolang Gaz La Secret Nuclear Tunnel Complexes Institute for Science and International Security (ISIS) Hyosung Urges Operators of All ATMs to Follow Previous Security Guidance Due to Large-Scale Cyberattacks Business Wire Court grants NM Tech student temporary restraining order against Homeland Security Source New Mexico US Donates Decommissioned Cutters to Tunisia to Bolster Regional Security The Maritime Executive DOJ’s Data Security Program Final Rules Effective – Implications for Telecom Providers NatLawReview.com Remarks at a UN Security Council Briefing on Haiti United States Mission to the United Nations (.gov) UN Security Council condemns Jammu and Kashmir terror attack Department of Political and Peacebuilding Affairs Trump Should Have Stuck With Border Security, Not Mass Deportations New York Magazine King County Security Tips – “Google” yourself kcemployees.com Fiesta goers can expect increased security at main events Texas Public Radio Homeland Security, Riverside County deputies raid business in Pomona FOX 11 Los Angeles Security increased in disputed Kashmir as India vows to punish perpetrators of attack that killed 26 PBS California security firm CEO, workers charged after woman forcibly removed from Republican town hall Los Angeles Times Footage Reveals New York-To-Paris Delta Flight Stowaway Getting Through Airport Security Travel Noire National Security Commission on Emerging Biotechnology’s Final Report Includes Recommendations to Boost Economy and Protect National Security NatLawReview.com Judges Worry Trump Could Tell U.S. Marshals to Stop Protecting Them The New York Times Rome Health to install new security systems Rome Sentinel Joint Press Statement on United States-Japan-Republic of Korea Trilateral Security Coopera U.S. Department of Defense (.gov) Pete Hegseth’s bad calls: Unfit defense secretary is a major security risk New York Daily News Anton’s Security Blog Quarterly Q1 2025 Security Boulevard Associated Press: Civil rights groups sue to restore jobs at Homeland Security oversight offices that were gutted Robert F. Kennedy Human Rights Climate and National Security: Bridging the Divide in Energy Policy Columbia Business School NSA Publishes Recommendations for Smart Controller Security Controls and Technical Require National Security Agency (.gov) Yes, You Can Take Water Through Airport Security—Here's How Travel + Leisure Temple University stepping up security after several students assaulted near campus last week CBS News Trump administration highlights economic growth and national security wins in April 2025 Fingerlakes1.com Windows "inetpub" security fix can be abused to block future updates BleepingComputer Verkada launches executive protection offering Security Systems News New Syrian foreign minister attends UN Security Council in first US appearance since Assad's fall AJC.com Linux 'io_uring' security blindspot allows stealthy rootkit attacks BleepingComputer Increased Security at City Courthouses? Unanswered Questions Baltimore Witness The Role of Smart Security Systems in Addressing Healthcare Demands Security Sales & Integration Hegseth’s Personal Phone Use Created Vulnerabilities The New York Times |
![]() |
![]() |
![]() |
RELATED ARTICLES
Fishing for Fortunes. Scam! Spelt phishing, but pronounced as above, this despicable act is an effort to batter your bankroll or commandeer your cash.To put it simply, you can get emails from account administrators, which strongly urge you to update details attached to that account. What is Hacking? Are You a Hacker? WHAT IS HACKING?Hacking, sometimes known as "computer crime" has only recently been taken very seriously. The activities undertaken by the real hackers have been criminalized and they are now being legally persecuted on a scale disproportional to the actual threat they pose. The 5 Critical Steps to Protecting Your Computer on the Internet Spyware, viruses and worms.. 8 Surefire Ways to Spot an EBAY Scam E-Mail and Protect Yourself from Identity Theft Ebay is a great site and is used by many to buy and sell new and used Items. It truly is the worlds Largest Garage Sale Unfortunately when an online site becomes as big and popular as E-Bay the scam artists seem to just naturally follow. Dont Allow Hackers to Take Out Money from Your Bank Account If you know what is the 'Fishing' then it's very easyto understand the definition of 'Phishing'. Justreplace letter 'F' from the word Fishing with 'Ph'. Social Engineering - The Real E-Terrorism? One evening, during the graveyard shift, an AOL technical support operator took a call from a hacker. During the hour long conversation the hacker mentioned he had a car for sale. 3 Pervasive Phishing Scams Scams involving email continue to plague consumers across America, indeed the world. These so called "phishing" scams involve "spoofed" emails meant to draw the unwary to bogus internet sites masquerading as legitimate sites. Virus Prevention 101 Blaster, Welchia, Sobig, W32, Backdoor, Trojan, Melissa, Klez, Worm, Loveletter, Nimda? Do these names sound Familiar?Have you been as bothered by viruses this past year as I have? Does it seem like there are more viruses, worms and Trojans out now then ever before? It is only getting worse.For the general public, "virus" has become a catchall term for any unwanted program that spreads from computer-to-computer; yet, in reality, there are differences between viruses, worms and Trojan horses. The Truth About Hiding Your Tracks on the Internet Ok, ok, I know you've seen them. All those pop up windows claiming that "You're being watched!" or banner ads saying "Your computer is under surveillance!" And all you need to do is buy their product and your computer's visbility will disappear from the Internet. Arming Yourself Against Spyware While clicking from site to site on the internet you are likely to land yourself on a website that downloads spyware onto your computer system. Even while using familiar or unlikely and secure web site you run the risk of being infected with unwanted spyware. Internet Privacy Over the past few years as the internet has become more and more popular, privacy has become a major issue.Just as if you are walking down the street and can be watched, every click of your mouse every website you browse, or file you download, is traceable. How To Avoid Hackers From Destroying Your Site? Recently, my site and other internet accounts ( http://www.nabaza. How to Protect Yourself from Viruses, Spyware, Adware, and Other Nuisances Spyware/adware is a new major concern for PC users everywhere. Infecting your computer silently (usually installed with programs that seem harmless), spyware and adware can collect personal information about you, as well as cause pop up ads to come up all of the time, changing your browsers home page, sometimes even completely disabling your computer's usability. Online Shopping: 10 Tips For Safe Online Shopping Have you ever bought a product or service from the internet?Yes? Me too. You're not alone?Some of the reasons why most people are shopping online are: they can buy anything at anytime because Internet shopping is available 24 hours, all the time. Phishing-Based Scams: A Couple of New Ones Phishing in its "classic" variant is relatively well-known. Actually, 43. Phishing - Identity Theft & Credit Card Fraud What is Phishing?Phishing is a relatively newly coined term for a kind of method for harvesting information for identity theft. Phishing is quite simply providing a person with false information or credentials to trick them in to giving you their personal information. Why Corporations Need to Worry About Phishing Phishing is a relatively new form of online fraud that focuses on fooling the victim into providing sensitive financial or personal information to a bogus website that bears a significant resemblance to a tried and true online brand. Typically, the victim provides information into a form on the imposter site, which then relays the information to the fraudster. What is Spyware? The most frustrating part of having Spyware on your computer is the sheer feeling of helplessness that is invoked. Your computer slows down, it no longer does what you instructed it to, it seems to have a mind of its own. Internet Identity Theft - How You Can Shield Yourself With the advent of the World Wide Web, a whole new breed of criminals have surfaced, posing threats to more than just our material assets, but also to our very identities. Although there are a number of effective methods for protecting yourself from internet identity theft, not everyone takes the necessary steps to initiate such a plan. Click Here To Defeat Evil Microsoft routinely releases new security updates, many of which are given it's highest severity rating "critical". Here's a typical announcement:"A security issue has been identified that could allow an attacker tocompromise a computer running Internet Explorer and gain control over it. ![]() |
home | site map |
© 2006 |