![]() | |
![]() | |
![]() |
Security Information |
|
![]() |
Online Shoppers, Beware of a New Scam
Beware of a New Scam Aimed at Bargain-Hunters Trying to buy something cheap is absolutely natural--and online crooks set traps for unwitting bargain-hunters. On April 6 Panda Software warned Internet users of a new particularly brazen scam aimed at stealing confidential information. Several websites offering cheap airline tickets in fact weren't selling anything; the aim was to cheat users out of credit card details. Of course, these sites have already been identified and disabled, but who knows whether (or better to say when) other ones will appear again, this time offering all kinds of products. The scam is very simple; the thieves simply wait until some unsuspecting user who is searching for airline ticket offers, finds their site offering dirt-cheap airline tickets. Really pleased with himself and looking forward to the trip, the user fills in the form, entering his credit card number, expiry date and verification value (CVV). As soon as these details have been entered, an error page appears; it tells the user that the transaction has been unsuccessful, and offers instructions on how to pay for the ticket by postal money order. So the user may well be fooled twice. He loses his credit card details, putting them right into the hands of cyber-crooks, and then loses money, if decides to buy the ticket by money order. Luis Corrons, the director of PandaLabs, comments on this scam: "This kind of online fraud differs from those witnessed previously. The malicious user does not contact the person interested in buying the product, but it is actually the buyer, in searching for the best prices online, who goes to the fraudulent web page. This creates a false sense of security that can lead users to proceed with the transaction". This makes such a scam very dangerous. It is the user who finds the "bargain"; no spam or pop-up ad is involved-- actually, nobody either forces or tries to persuade the user to buy something. This tactic is bound to be "effective", if such a word is appropriate here. That is why it is extremely likely that there will be other websites and other scams using the same pattern. Too Cheap to be a Bargain? You'd Better Steer Clear How to avoid this kind of fraud? "Users are best advised to treat 'bargains' with suspicion, and only make online purchases from trusted sites. In any event, if in doubt, it is a good idea to search for information about the website in question on the Internet. Users should be able to find opinions and experiences of other users who have used the same service," says Luis Corrons. That's all users can do so far -- to steer clear of suspicious bargains and to check the firm one is going to buy from. Of course, the authorities are informed; these cybercriminals will be tracked, caught and sent to jail. But this entire story gives a strong impression that cybercrooks are becoming more and more shameless. People get cheated when they expect it the least -- just remember bogus appeals to make donations for tsunami victims. Such criminals are impudently taking advantage over majority of people -- over those who remember the Golden rule and expect others to behave the same way. That is why everybody who either falls the victim of this --or any other--scam, or learns about such incidents, should make this information public. This will be a small contribution that may help to curb growing cybercrime. Alexandra Gamanenko currently works at Raytown Corporation, LLC -- an independent software developing company that provides various solutions for information security. Learn more -- visit the company's websitehttp://www.anti-keyloggers.com
MORE RESOURCES: Security expert: Nashville school shooting should serve as a wake up call for similar schools in Nor CBS News Harris Pledges Security Assistance, Partnership in Ghana Visit Voice of America - VOA News When it comes to database security it's down to people, not tech fixes, to save the day The Register Executive Order on Prohibition on Use by the United States ... The White House Biden bans government use of commercial spyware that may pose a ... SiliconANGLE News Running a security program before your first security hire Help Net Security Japan’s new security policies: A long road to full implementation Brookings Institution Roof replacements, security vestibules among improvements in ... Alaska Public Media News Counter-Terrorism: High-level Debate : What's In Blue Security Council Report Survey Surfaces Need to Change SecOps Priorities Security Boulevard Boycott a Russia-led UN Security Council POLITICO Europe Importance of school security FOX 13 Tampa Explanation of Vote Following the Failure of a UN Security Council ... United States Mission to the United Nations WCPS starts security assistants program to curb student misbehavior Herald-Mail Media Tausight expands its AI-based PHI Security Intelligence platform to ... Help Net Security What you need before the next vulnerability hits Help Net Security NEW: Shaheen Leads 37 Senators in Letter to Pentagon ... Senator Jeanne Shaheen Why cybersecurity risks matter - and how to raise security World Economic Forum SLED investigating after late-night shooting at SC State, university adds security measures WIS News 10 Commerce Department Outlines Proposed National Security ... US Department of Commerce Israel defense minister’s firing triggers security fears, reservist call-ups and greater protests Breaking Defense Secretary Mayorkas, Administrator Criswell Visit Devastated Areas ... Homeland Security Under pressure, St. Louis' Railway Exchange boosts security to ... St. Louis Post-Dispatch Meandering Moose Breaches Security At Sinclair Oil Refinery Cowboy State Daily Rising Rate of Drug Shortages Is Framed as a National Security Threat The New York Times Maryland native works to help others with food security News 13 Orlando Las Cruces Police Department advises against posting doorbell security footage online - KFOX El Paso Microsoft pushes OOB security updates for Windows Snipping tool flaw BleepingComputer German Leopard 2 tanks have reached Ukraine Reuters.com Pasquotank officials discuss county courthouse repairs, security ... The Daily Advance Opinion: Sensible legislation would 'sentence' gun security violators ... Chattanooga Times Free Press Senators Introduce Bipartisan Bill to Tackle National Security ... Senator Mark Warner Ukraine-Russia updates: Kyiv seeks UN Security Council meeting Al Jazeera English FACT SHEET: President Biden Signs National Security ... The White House TSA issues new cybersecurity requirements for airport and aircraft ... Transportation Security Administration Remarks by Ambassador Linda Thomas-Greenfield at a UN Security ... United States Mission to the United Nations The Case for a Security Guarantee for Ukraine Foreign Affairs Magazine TikTok Pushed by U.S. to Resolve National Security Concerns The New York Times FACT SHEET: President Biden’s Budget Strengthens Border ... The White House Biden’s Cybersecurity Strategy Assigns Responsibility to Tech Firms The New York Times Biden Administration Announces Additional Security Assistance for ... Department of Defense After Denver school shooting, an outcry erupts over security The Associated Press Topeka senator calls for security as frustrations flare at Kansas anti ... The Topeka Capital-Journal Feds Charge NY Man as BreachForums Boss “Pompompurin ... Krebs on Security US Cyber Challenge offers online competitions in information ... Veterans Affairs (.gov) Climate Security & Resilience Program State Magazine TikTok CEO's Message to Washington: A Sale Won't Solve Security ... The Wall Street Journal Officials are preparing security in case of Trump indictment The Associated Press Microsoft Patch Tuesday, March 2023 Edition – Krebs on Security Krebs on Security |
![]() |
![]() |
![]() |
RELATED ARTICLES
Internet Scams: Dont be a Victim As the number of people using the Internet as an integral part of their daily life grows, it is inevitable that the number of Internet Scams will grow. Unfortunately there are many forms of scams but in this article we will look at three of the most prominent. Hacking the Body Via PDA Wireless Device First I would like to stress I am condoning the art of hacking. Nor am I condoning the control and manipulation of the human race by way of frequencies interacting with the biological systems, which run the human body. The Bad Guys Are Phishing For Your Personal Information Do you know what "phishing" is?No, it doesn't mean you grab a pole and head to the late to catchsome phish.The official Webopedia definition of "phishing" is as follows:The act of sending an e-mail to a user falsely claiming to be anestablished legitimate enterprise in an attempt to scam the userinto surrendering private information that will be used foridentity theft. Web Conferencing Readers - So What Do We Do with the PAYPAL SPAMMER From: "Paypal Security"Subject: New Security RequirementsDate: Tue, 26 Jul 2005 19:20:51 -0800Dear valued PayPal® member,Due to recent fraudulent transactions, we have issued the following security requirements.It has come to our (attion)**Spelling Mistake**, that 98% of all fraudulent transactions are caused by members using stolen credit cards to purchase or sell non existant items. Spy Scanners - Don't Compromise your Privacy Spies, spyware, internet parasites are among what they are usually called. These are scouts that monitor your web activities. How To Clean the Spies In Your Computer? Manual Spy Bot Removal > BookedSpaceBookedSpace is an Internet Explorer Browser Helper Object used to show advertising.Free PC Health Check - find bad files fast! How many corrupt and redundant files are lurking inside your PC ready to cause harmful errors? Find these harmful "time-bomb" files instantly and keep your computer ERROR FREE 24 hours a day!VariantsBookedSpace/Remanent : early variant (around July 2003) with filename rem00001. Web Browsing - Collected Information You may not realize it, but as you are surfing the web all sorts of details are being left behind about your computer and where you have been. Most of this information is used harmlessly in website statistics, but it could also be used to profile you, or identify you as a vulnerable target for an exploit. DOS Attacks: Instigation and Mitigation During the release of a new software product specialized to track spam, ACME SoftwareInc notice that there was not as much traffic as they hoped to receive. During furtherinvestigation, they found that they could not view their own website. Lottery Scam, What It is and how to Avoid It? Internet scams and frauds are on the rise! The quantity of scam emails with various fraud schemes any email account receives today is simply overwhelming! There is this infamous Nigerian 419 scam, which is by far the most widely circulated one. I wrote about it in one of our ezine articles not long ago. 8 Surefire Ways to Spot an EBAY Scam E-Mail and Protect Yourself from Identity Theft Ebay is a great site and is used by many to buy and sell new and used Items. It truly is the worlds Largest Garage Sale Unfortunately when an online site becomes as big and popular as E-Bay the scam artists seem to just naturally follow. Dont be a Dork - Protect Yourself There are folks out there who use their powers for evil, not good. Let's not give them the opportunity to sneak into our lives and wreak havoc. Viruses and Worms: The Problems and Their Solutions History and BackgroundThe virus was one of the first ever threats to computer security. It brought a whole new fear upon computer users. I Spy...Something Terribly Wrong (In Your Computer) This really chapped my lips.. The Top Twelve Threats No Computer User Should Ignore The internet is undoubtedly a fantastic resource for families and offers a rich vein of educational content.However, there are potential dangers - welcome to the seedy world of viruses, spam, trojans, pornography, spyware and other nasties. Internet/Network Security AbstractHomogeneous symmetries and congestion control have garnered limited interest from both cryptographers and computational biologists in the last several years [1]. In fact, few steganographers would disagree with the investigation of spreadsheets. Wells Fargo Report Phishing Scam First off I should explain what phishing is. Phishing is basically the act of tricking a victim into divulging information. How To Be Your Own Secret Service Agency So you want to know who your kids are chatting with. Or if your spouse has a blossoming e-mail romance. Social Engineering - The Real E-Terrorism? One evening, during the graveyard shift, an AOL technical support operator took a call from a hacker. During the hour long conversation the hacker mentioned he had a car for sale. A New Low A new variation of the Nigerian Scam themeThe scam artists are employing the Nigerian Scam to fleece unwary sellers who advertise pets for sale.This is particularly despicable because not only are people losing their money but dogs are being abandoned in freight terminals or being killed to get rid of them. Delete Cookies: New-Age Diet or Common Sense Internet Security? No, this article isn't about some new, lose-20-pounds-in-a-week, certified-by-some-tan-Southern-California-doctor diet. It's about cookies on your computer - what they are, why they are there, and what to do about them. ![]() |
home | site map |
© 2006 |