Security Information |
|
Online Cell Phone Scams and Spam
They're out there. Individuals trying to make a quick buck at your expense. You labour hours on end to produce quality content on your website only to get repetitive requests for huge numbers of product or promises for the greatest deals online. As a webmaster for a cell phone and PDA site, I've had my share of spam and scams come through, mostly via email, some posted on my forum. The purpose of this article is to provide a few methods of detecting spam and scams, and provide a few examples as well. Take a look over and protect yourself from online cellular fraud. Anybody catch the 60 minutes episode where Andy Rooney teaches faithful viewers how to detect junk mail? Junk email works in much the same way. Items with subject headings 'Great deal', or 'limited time offer' usually can wait, and definitely don't have great offers hidden inside. Webmasters and consumers should have a golden rule, if you don't know where an offer came from (you don't know the sender) then delete it. Plain and simple. Most free email accounts, GMAIL, Hotmail, Yahoo!, have good filters that label incoming spam and scams as, well, spam. However, the majority of webmasters do not use free email accounts for the sake of professionalism. To these individuals, a basic virus detector usually includes email protection and generally will detect possible spam items before they hit your box. Having said this, if you're doing link campaigns, or joining forums, etc., in order to promote your site, it may not be a bad idea to enlist the free online email account and prevent all the unwanted junk from hitting your work emails. It's been my experience that some people out there hand pick contact pages of potential victims, and therefore the email may be somewhat individualised to your site. Your name, the site name, or similar content, may be communicated within the email making it appear somewhat legitimate. Be mindful of your email accounts (contact pages) that are exposed to the world wide web. Some smart scammers have created bots that will automatically harvest emails that are sitting live on the web and input them into a spam list. Remember this when trying to determine whether something from the web is legit. If an questionable email has contact information, Google it. If it's a legitimate company contacting you, they should have some type of online presence. I've noticed that the majority of spam and scams have fake mail addresses, but no online address. Furthermore, emails usually come from online web accounts like Yahoo!. Not only can you search contact information, you can serach content as well. Chances are a webmaster has posted the contents on a forum somewhere wondering about its legitimacy. I can't stress this enough, take 4 seconds and doabout the email before you consider replying. With these simple and quick tips you should be able to identify the majority of scam and spam emails. If in doubt, delete. If something was important that you deleted, or legitimate, the individual will likely try to contact you again. With this in mind, here are some examples of spam and scam emails from the cellular and technology industry, my comments are in brackets. Subject: WE HAVE LOTS OF GSM/NEXTEL MOBILE PHONES AT VERY CHEAP PRICES'''''''' [The subject always varies.] PHONES SELLERS INCORPORATED Dear Sir/Ma, LETTER OF BUSINESS RELATIONSHIP Fola David [A variation of the above is instead of written body content, they will actually send a product list of the cell phones they require asking for a dozen of each. Sounds like great business!...Here's the next one] CONSOLIDATED PHONES LIMITED Dear sir, COMMERCIAL SALE OF BULK MOBILE PHONES WE ARE EXPORTERS AND IMPORTERS OF GSM, TDMA, AND CDMA PHONES. [CDMA Phones do not run the majority of African networks.] WE ARE ONE OF THE LEADING COMPANIES IN NIGERIAN COMMUNICATIONS SECTOR, AND WE GIVE OUT OUR BEST IN SATISFYING OUR NUMEROUS CUSTORMERS. WE SELL IN BULK AND AT A VERY CHEAP RATE. WE WILL LIKE TO USE THIS MEDIUM TO INTRODUCE TO YOU OUR VARIOUS PHONE BRANDS AND ACCESSORIES LISTED IN OUR PRICE LIST. THESE ITEMS ARE READY FOR SALE AND THE PRICE LIST IS AS GIVEN BELOW. WE WILL BE WAITING AND READY TO ASSIST YOU IN ANY INFORMATION REQUIRED BY YOU, AND ALSO, WE ARE READY TO DO BUSINESS WITH ANY COMPANY, INDIVIDUALS OR GROUP AS LONG AS THEY ARE NOT FRAUDULENT. [Of course you wouldn't.] WE WILL SEND OUR RANGE OF PRODUCTS AND PRICE LIST ON DEMAND. BEST REGARD. JULIAN JONES (MISS) But two examples of two spam/scam emails. Keep your eyes peeled webmasters! Barry Nagassar is owner and operator of DiscussWireless an online cell phone and PDA forum that provides the latest cell phone news, reviews, and cell phone fraud discussion. Included is a comprehensive compare and shop section for the latest cellular and PDA phones. Compare competitor prices in one location, or join the forum and post the latest review or service provider issue. Complete cell phone fraud forum included.
MORE RESOURCES: Opinion | Banning TikTok Won’t Solve Your Data-Security Problem The Wall Street Journal He’s a Security Guard at the Met. Now His Work Is Showing There. The New York Times Why does Trump want Greenland and the Panama Canal so badly? One reason may surprise you - USA TODAY Japan links Chinese hacker MirrorFace to dozens of cyberattacks targeting security and tech data ABC News Remarks at a UN Security Council Briefing on Nonproliferation and the Democratic People’s Republic of Korea United States Mission to the United Nations Sweet Security Partners with Illustria to Offer Proactive Open-Source Supply Chain Risk Management GlobeNewswire Krebs on Security – In-depth security news and investigation Krebs on Security One week later: New Orleans debates security, memorial grows, more chemicals found FOX 8 Local First New in 2025: Counties Should Prepare Now for the Upcoming HIPAA Security Rule Update National Association of Counties Special ops forces seek to manage digital footprints, achieve ‘security through obscurity’ DefenseScoop Pope to celebrate Jubilees for Communications, security forces Vatican News - English White House program to certify the security of IoT devices goes live Cybersecurity Dive U.S. citizen denied entry into Poland after security staff object to handwritten notes in passport ABC News Remarks at a UN Security Council Briefing on the Political and Humanitarian Situations in Syria United States Mission to the United Nations Stowaways on planes and inside landing gear raise worries about aviation security The Associated Press Brillion Achieves SOC 2 Type 2 Compliance, Reinforcing Commitment to Data Security and Privacy Business Wire Opinion | Biden’s ‘security’ concern about TikTok and U.S. Steel is doubly specious The Washington Post New Orleans Homeland Security criticized during terror attack probe WDSU New Orleans Border security is national security Foundation for Defense of Democracies The Rio Treaty's Security Pact and Unintended Consequences of Threatening Canada, Greenland, and Panama Just Security Tidal Cyber Acquires Zero-Shot Security to Enhance Threat Intelligence Mapping Capabilities Business Wire Swimlane Hero helps solve complex security operations problems Help Net Security Security guard catches DJ molesting 12-year-old boy at California mall, officials say Sacramento Bee UN aviation agency confirms recruitment database security breach BleepingComputer Who is Acronis’ New Chief Information Security Officer? Cyber Magazine AITX's RAD-R Welcomes Steve Danelon as President, Strengthening Leadership for Residential Security Solutions GlobeNewswire Fort Smith Public Schools to integrate AI gun detection software in security cameras Northwest Arkansas Democrat-Gazette Orange Bowl pep rally security includes surveillance cams, law enforcement on the ground - CBS Miami Security Industry Association Welcomes New Perimeter Security Subcommittee Leaders Security Sales & Integration Update on former Vigo County Security Annex demolition MyWabashValley.com BreachLock Unveils Unified Security Testing Platform for PTaaS, ASM, Continuous Pentesting, and Red Teaming PR Newswire Alois Brunner, the Nazi ‘butcher’ who trained Syrian security Al Jazeera English Marine Corps bases take increased security posture The Island News – Beaufort, SC When It Comes to Security, Europe Is Whistling Past the Graveyard World Politics Review Synology Launches ActiveProtect: Simplifying Enterprise Data Protection with Unmatched Security, and Scalability Business Wire Japan links Chinese hacker MirrorFace to dozens of cyberattacks targeting security and tech data The Associated Press Security and Sanctions in Post-Assad Syria The National Interest Online Security consultant denied profiteering in defamation case against CNN WMBB - mypanhandle.com 2025 Security Industry Predictions: Jon Adams, Vice President of Sales, DMP Security Sales & Integration Eric Trager tapped for Mideast slot on Trump’s National Security Council The Times of Israel Can Washington handle two weeks of high-security pomp along with a heavy burst of snow? The Associated Press Washington Township Police to launch security risk assessment program for businesses Bellefontaine Examiner New Orleans hires consultant to review security after Bourbon Street attack. See who has the job. NOLA.com New Orleans attack prompts tighter security in D.C. ahead of inauguration, Carter funeral The Chicago Cusader Newark Airport makes list of Top 10 craziest security catches New Jersey 101.5 FM Base steps up security measures following terrorist attacks Mountain Home News Gov. Ivey mourns security detail member Justin Williams, 42, succumbed to cancer Alabama Political Reporter |
RELATED ARTICLES
Computer Viruses, Worms, and Hoaxes In recent days, I was one of the unfortunate persons to receive the "Mydoom" worm emails. Not just one, but at least forty appeared in my popserver mailbox. Securing Your Accounts With Well-Crafted Passwords In the past I've never really paid much attention to security issues when it comes to user names and passwords. Frankly I figured it was all a lot of overblown hype. Is Your Music Player Spying On You? In today's times spyware is a very serious issue and all computer users should be aware of the possible damage it can cause. It is estimated by well known industry insiders that nearly 90% of all computers are infected with some kind of spyware. Secure Your PC From Hackers, Viruses, and Trojans Viruses, Trojans and Spyware: Protecting yourself.No user on the internet is safe from assault. Personal Firewalls - Secure Your Computer There has not been a time in the history of the personal computer that firewalls and anti-virus programs have been more necessary and in-demand. Today, personal computer security is not only threatened by viruses and worms, but also by spyware - those severely annoying programs that are illegally loaded onto your computer from the internet. How to Manage Your Username and Password The Easy and Secure Way Have been an Internet user for more than 9 years, I have 100's of logins and passwords to keep. I'm paranoid. How To Clean the Spies In Your Computer? Manual Spy Bot Removal > BookedSpaceBookedSpace is an Internet Explorer Browser Helper Object used to show advertising.Free PC Health Check - find bad files fast! How many corrupt and redundant files are lurking inside your PC ready to cause harmful errors? Find these harmful "time-bomb" files instantly and keep your computer ERROR FREE 24 hours a day!VariantsBookedSpace/Remanent : early variant (around July 2003) with filename rem00001. Are You Surfing Safe? Ok, you've got a computer, and you get online. You surf your favorite sites, Sports, Shopping, Cowchip Tossing Blogs, and so on. How to Know Whether an Email is a Fake or Not A few nights ago I received an email from "2CO" asking me to update my personal data. The sender did not forget to insert a link to log in, too. Click Here To Defeat Evil Microsoft routinely releases new security updates, many of which are given it's highest severity rating "critical". Here's a typical announcement:"A security issue has been identified that could allow an attacker tocompromise a computer running Internet Explorer and gain control over it. Is My PC Vulnerable on the Internet? No longer are viruses the only threat on the internet. In recent years other threats have evolved which include spyware, adware, hacking, identity theft, information theft, pop-ups and the loss of information. Hacked: Who Else Is Using Your Computer? A friend called me one day and asked if I would stop by to look at his computer. He said it was running abnormally slow and he had found something on his hard-drive he could not explain. Internet Scams: Dont be a Victim As the number of people using the Internet as an integral part of their daily life grows, it is inevitable that the number of Internet Scams will grow. Unfortunately there are many forms of scams but in this article we will look at three of the most prominent. Do You Know What your Kids Are Doing Online? It's a sad statistic, but hundreds of unsuspecting kids are lured away from home every year by strangers they meet in online chat rooms.As frightening as this seems, it gets scarce attention in the media. Protect Your Little Black Book The movie Little Black Book features a young woman, Stacy, who is frustrated when her boyfriend refuses to share information about his past relationships. When his PDA, a Palm Tungsten C, falls into her hands, she is faced with a conundrum. Mail Forwarding - Why Would You Do It? First of all we need to get some terms stated. I have been in the business for just over two years and there is still some confusion over the topic. Email Scams - Ten Simple Steps To Avoiding Them According to the Anti-Phishing Working Group (APWG) email scams also known as phishing attacks claim more than 2,000 victims each day from more than 75 million phishing emails that are sent each day. The APWG also claims that these email scams steal close to $1 billion a year from its victims. Phishing Recently I have received email from my bank/credit Card Company, eBay & pay pal saying that my account has possibly been compromised and I need to confirm my details and password in order to get continued access.Spam email now has a new and more frightening variant, it's called phishing and it has been made by criminals and hackers who aim at getting unwitting consumers to reveal account numbers and passwords. The Move to a New Anti-Virus Model This is the second in a series of articles highlighting reasons why we need a new model for anti-virus and security solutions.Reason #1: the Basic ModelAnti-virus software vendors still rely on yesterday's methods for solving today's problems: they wait for the next virus to wreak havoc and then produce a solution. Its Time to Sing the Encryption Song - Again! Yes, I'm wearing my encryption hat again. Why you may ask? Well I just finished reading about the newest security hole in Microsoft's latest server product. |
home | site map |
© 2006 |