Beware of Imitations! Security, Internet Scams, and the African Real Estate Agenda
Fishing on the Internet has come a long way. However, we TechWeb junkies like to call it Phishing. What I am talking about here is not going after your ordinary, everyday catch. Yet a fine catch it indeed may be to those thieving bandits if they can lure you into giving up your personal and private information. Trickery is vast and common on the World Wide Web. Beware, I say, beware!
Email schemes, called "phishing" or "carding", attempt to trick consumers into disclosing personal and/or financial information. The emails appear to come from legitimate companies with whom consumers may regularly conduct business. I have seen scams appear to come from such noteworthy corporation as AOL, Earthlink, Paypal, eBay, or major credit card issuers. Often times the email threatens termination of accounts unless consumers update billing information.
Phishing comes around in all forms. How many of you have had some Nigerian Prince that just inherited 35 million US dollars offer to share it with you for one reason or another? How many of you have received an e-mail supposedly from your bank that for "security reasons" requests you to click a link that takes you to an online form to fill out, requesting all your personal and confidential information about your bank account?
A word to the wise: there is no Prince in Nigeria that needs your help, and your bank will never ask you for that info in an e-mail!
The latest Internet scam appears to come from the South African Department of Mining. "Resources and we are in dire need of a foreign partner to assist us in the receipt and investment of US$15,500,000.00?" All they request is a secure place to deposit the lump sum on US territory, and you will gain a large piece of the pie. WOW, what a deal!
Another I received comes from Johnson Mgabe, the son of the leader of the Republic of Zimbabwe Agricultural Commission. His father has just been assassinated, and he, the only remaining heir, is trying to escape. If you help him, he will give you lots of dough! Right on! "Please e-mail and tell me of your decision. I am ready to pay you 25% of the money [$45.5 Million] for your help, 5% shall go for expenses you might incur during the transaction. The remainder [70%] shall be mine."
Ok, ok, I am convinced; here is my private bank account, my SSN, DL# and address. Please tell me what I need to do next. Are they for real? Seriously though, if people didn't fall for these types of stunts, there wouldn't be so many floating around. Identity theft has become more and more rampant in this techno traveling world.
Again I say, beware.
Many of these email schemes contain links to "look-alike" websites that are loaded with actual trademarked images. The websites then instruct consumers to "reenter" their credit card numbers, social security numbers, bank PINs, or other personal information. If consumers actually provide the information requested, the data goes to scammers, not the legitimate company whose name is on the site. Thereafter, the data is often used to order goods or services and/or to obtain credit in the name of the consumer and potentially, steal your identity.
Again, I say, beware!
Rule for the road:
If you receive a precarious e-mail asking you for personal information, chances are it is a scam. It is better to be safe than sorry.
By Greg Richburg
Greg Richburg is a Microsoft Certified Systems Engineer and the owner of Netricks, Inc. a network consulting, web design and hosting company located in Fresno, CA.
More of Richburg's work may be seen at http://www.valley411.com
Germany is jeopardising the security of the West The Telegraph
China sends security chief to Germany for key talks as it eyes close cooperation - South China Morning Post
China sends security chief to Germany for key talks as it eyes close cooperation South China Morning Post
Burkina security agencies foil coup attempt against junta leaders Punch Newspapers
Amazon, Microsoft, Google step up cloud computing security - The Washington Post - The Washington Post
Amazon, Microsoft, Google step up cloud computing security - The Washington Post The Washington Post
Ransomed.vc group claims hack on 'all of Sony systems' Cyber Security Connect
What Does Secure by Design Actually Mean? tripwire.com
TSA tips on traveling with pets through a security checkpoint at ... - Transportation Security Administration
TSA tips on traveling with pets through a security checkpoint at ... Transportation Security Administration
Can emerging tech fill the cyber security skills gap? | Cyber Security Hub Cyber Security Hub
National Security Leaders Making an Impact in 2023 Executive Gov
Secretary Mayorkas and Secretary Blinken Announce Designation ... Homeland Security
JPS Hears Recommendations On Safety, Security Enhancements ... Jamestown Post Journal
Moving up: A security officer in the Department of Public Safety is ... Temple University News
Burkina Faso’s junta says its intelligence and security services have foiled a coup attempt - ABC News
Burkina Faso’s junta says its intelligence and security services have foiled a coup attempt ABC News
TSA participating in local Idaho Falls job fair Agency recruiting ... - Transportation Security Administration
TSA participating in local Idaho Falls job fair Agency recruiting ... Transportation Security Administration
Vikings vow to solve their ball security problem, whether by special drills or lineup changes - CBS News
Vikings vow to solve their ball security problem, whether by special drills or lineup changes CBS News
Data-driven cyber: empowering government security with... - NCSC ... - National Cyber Security Centre
Data-driven cyber: empowering government security with... - NCSC ... National Cyber Security Centre
The Future of Homeland Security: Addressing the Rise of Terrorism ... - United States Institute of Peace
The Future of Homeland Security: Addressing the Rise of Terrorism ... United States Institute of Peace
Remarks by Ambassador Linda Thomas-Greenfield at a UN Security ... - United States Mission to the United Nations
Remarks by Ambassador Linda Thomas-Greenfield at a UN Security ... United States Mission to the United Nations
Democratic Republic of the Congo: Briefing and Consultations ... Security Council Report
Real Security | Olney Enterprise Olney Enterprise
Why OT Security Keeps Some Healthcare Leaders Up at Night BankInfoSecurity.com
Sexual Crimes Increased From 2021 to 2022, Annual Security ... - Cornell University The Cornell Daily Sun
Sexual Crimes Increased From 2021 to 2022, Annual Security ... Cornell University The Cornell Daily Sun
Gallego Secures Over $2 Million in Emergency Border Funding from ... Congressman Ruben Gallego
NCAM Seminar: Drone Security and Applications North Carolina A&T
Security guard shot after argument at South Fulton bar FOX 5 Atlanta
New U.S.-Poland Foreign Military Financing Direct Loan Agreement ... Department of State
Resolution to allow security to carry a gun at Parma schools to be ... News 5 Cleveland WEWS
Former Massachusetts government leader joins law firm as Director of National Security & Resiliency - Boston 25 News
Former Massachusetts government leader joins law firm as Director of National Security & Resiliency Boston 25 News
Commodity vs. Security: What's the Difference? Investopedia
Biden Administration Announces Additional Security Assistance for ... Department of Defense
Austin Lauds Mozambique's Leadership on Regional Security > U.S Department of Defense
The NCS4 Publishes Industry Research Report on Spectator ... - The University of Southern Mississippi
The NCS4 Publishes Industry Research Report on Spectator ... The University of Southern Mississippi
GOP senators rail against Biden administration's handling of border security amid spending talks: 'Bulls---' - Fox News
GOP senators rail against Biden administration's handling of border security amid spending talks: 'Bulls---' Fox News
Early Edition: September 28, 2023 Just Security
YOUR GOVERNMENT: Cherriots to hear annual report on bus ... Salem Reporter
Secretary Antony J. Blinken At the Addressing the Urgent Security ... Department of State
Statement by National Security Council Spokesperson Adrienne ... The White House
Stabbing prompts additional security measures at Stall High School Live 5 News WCSC
Scammers find way to bypass new security features on credit cards WGAL Susquehanna Valley Pa.
Restaurant owners near Oriole Park call for increased security amid surge in burglaries - Fox Baltimore
Restaurant owners near Oriole Park call for increased security amid surge in burglaries Fox Baltimore
Best Dividend Stocks: British Giant GSK Offers Yield, Security For ... Investor's Business Daily
Parental Control - Dangers To Your Child Online & Internet Child Safety Tips
Did you know..
The Truth About Hiding Your Tracks on the Internet
Ok, ok, I know you've seen them. All those pop up windows claiming that "You're being watched!" or banner ads saying "Your computer is under surveillance!" And all you need to do is buy their product and your computer's visbility will disappear from the Internet.
Is Shopping Online For Your Horse Gifts Safe?
Shopping for horse gifts or other gift items on the internetis quick, convenient and is probably safer than you think.However, you still need to be aware that it is essential tovigorously protect your privacy and financial informationwhen making purchases online.
Can I Guess Your Password?
We all know that it's dangerous to use the same password for more than one program. If you sign up for a program run by someone of low moral fibre, what is to stop them running through various programs with your username and password to see what they can access? But of course remembering all the different passwords can be a headache.
Temporary Internet Files - the Good, the Bad, and the Ugly
A little bit of time invested into learning about internet security can go a long way in preventing mishaps on your computer. Temporary internet files are not something we should be afraid of, but we should certainly be careful in how much we trust them and how we deal with them.
Computer Viruses, Worms, and Hoaxes
In recent days, I was one of the unfortunate persons to receive the "Mydoom" worm emails. Not just one, but at least forty appeared in my popserver mailbox.
How to Thwart the Barbarian Spyware!
Today,on most internet user's computers, we have theability to employ software, along with ourintelligence, to prevent viruses and spyware.To put this article into proper perspective, we'll useMedieval defense tactics.
Internet Scams: Dont be a Victim
As the number of people using the Internet as an integral part of their daily life grows, it is inevitable that the number of Internet Scams will grow. Unfortunately there are many forms of scams but in this article we will look at three of the most prominent.
Why Corporations Need to Worry About Phishing
Phishing is a relatively new form of online fraud that focuses on fooling the victim into providing sensitive financial or personal information to a bogus website that bears a significant resemblance to a tried and true online brand. Typically, the victim provides information into a form on the imposter site, which then relays the information to the fraudster.
Pharming - Another New Scam
Pharming is one of the latest online scams and rapidly growing threat that has been showing up on the Internet. It's a new way for criminals to try to get into your computer so they can steal your personal data.
Phishing - Learn To Identify It
Phishing: (fish'ing) (n.)This is when someone sends you an email falsely claiming to be a legitimate business - like your bank or credit card company - in an attempt to scam you into giving them your personal, private information that they can use to access your accounts.
Corporate Security for Your Home Business
The words Corporate Security may conjure up images of a group of techies working in a wire-filled basement room of Microsoft or HP, combating hackers and terrorists online using words like algorithm and encryption. If you own your own business, do not allow yourself to think that security is only for big corporations.
Steganography - The Art Of Deception & Concealment
The Message Must Get Through-----------------------------The year is 300A.D.
Is Spyware Watching You?
Imagine my surprise when I received a phone call from afriend who told me he'd been the victim of a "spyware"attack that left him shaking at his loss of privacy.I listened to his horror story with a sympathetic ear, butI felt secure since I carry anti-virus software and afirewall (both by Norton).
Eliminate Adware and Spyware
Everyone should eliminate spyware and adware from your hard drive for your computer privacy protection. Spyware and adware programs also slow down the speed of your computer by cluttering your hard drive with annoying programs.
Beware of Imitations! Security, Internet Scams, and the African Real Estate Agenda
Fishing on the Internet has come a long way. However, we TechWeb junkies like to call it Phishing.
Hacking the Body Via PDA Wireless Device
First I would like to stress I am condoning the art of hacking. Nor am I condoning the control and manipulation of the human race by way of frequencies interacting with the biological systems, which run the human body.
The Top Twelve Threats No Computer User Should Ignore
The internet is undoubtedly a fantastic resource for families and offers a rich vein of educational content.However, there are potential dangers - welcome to the seedy world of viruses, spam, trojans, pornography, spyware and other nasties.
How To Avoid Hackers From Destroying Your Site?
Recently, my site and other internet accounts ( http://www.nabaza.
If You Sell Anything Online Your ePockets Are Being Picked
You and I are a lot alike. We are both software publishers and eBook authors getting hosed on a regular basis.
|home | site map|