![]() | |
![]() | |
![]() |
Security Information |
|
![]() |
Avoiding Scams: If It Sounds Too Good to Be True, It Probably Is
A week or so ago, I received an inquiry from a man in Indonesia about buying multiple copies of certain items on my website. I immediately suspected fraud, so I explained that I only had one piece of each. The man, who wrote impeccable English, said that was fine. I asked why he wanted to buy so much money's worth of jewelry (it was around $250). He said it was for his wife and daughters. He then asked if he could email me the billing and shipping info instead of using the catalog. I told him the catalog was better, since it was more secure, and figured if he was a scammer, it would be too much work for him. No such luck. He was unusually together. He placed an order for the same items he had asked about (most scammers forget). I started allowing myself to feel happy about such a large order and the money that would bring. At the same time, I started researching shipping to Indonesia, as well as fraud protection, and found that a) Indonesia is second only to Nigeria in credit card fraud levels, and b) jewelry is prohibited to ship to Indonesia. Per suggestions on another site, I asked the customer for a CVV number, the bank listed on the credit card, and the customer service number on the card. He sent me the CVV and customer service number. He also said he had just received a diamond ring sent to him, so he didn't think the prohibition existed. Today I started checking. I called the customer service phone number he gave me; it was for a Canadian bank, and the number didn't belong to one of their cards. The fishy smell grew stronger. I then contacted an American bank to find out where the number originated. They gave me the runaround for a while until someone there gave me the number for Visa International, 800-847-2911, since the card number started with a 4. Visa International told me which bank to call. When I finally got to the right bank, and told them I was a merchant checking on fraud, they confirmed my suspicions. The card was at an American address, and it had no other suspicious charges on it. I asked if there were any tiny charges, like for penny amounts. Indeed there were. This part is important! In Indonesia, they are very sophisticated; one of the ways they get credit card numbers is to run random computer-generated numbers with expiration dates until they get some that go through. They put through charges for tiny amounts that people won't bother to contest, and if the charge goes through, they know it's good. So do watch out for penny amounts showing up on your credit card bills. I asked the woman to check the CVV number as well, and she said it did not check out. So the charge would not have gone through anyway, but I feel better having checked, even if it took way too much time. Lesson: the scammers are getting more sophisticated all the time. They can also read materials on the internet that give warning signs about scammers. So they are trying to avoid some of the more obvious signs. If it sounds too good to be true, it probably is! Author Susan Midlarsky of Aspiring Arts handcrafts jewelry with stones that harmonize well and are beneficial to the human body, color combinations that are connected to refinement, and sometimes offerings from nature. She has also recently started making glass beads; you can see her progress at her online blog. Susan loves the magical glow people feel upon finding a piece of jewelry that is exactly right for them.
MORE RESOURCES: The forgotten Black woman who invented the video home security system The Washington Post Turkey slams West for security warnings 'harming' tourism The Associated Press - en Español Security guard shocked with Taser after macing Lauderhill Police officer during traffic stop WSVN 7News | Miami News, Weather, Sports | Fort Lauderdale Air Force sees national security threat in Chinese-owned corn mill Successful Farming CBP proposes efforts to strengthen aviation security | U.S Customs and Border Protection Security Principles: Addressing underlying causes of risk in complex ... Federal Trade Commission News Memphis Police Chief Trained With Israel Security Forces The Intercept DHS Expands Abraham Accords to Cybersecurity Homeland Security Redbot Security Promotes Keith Cox to Principal Security Engineer Kansas City Star Justice Center's $50000 security upgrades come in midst of call for ... Tullahoma News and Guardian US. Department of Homeland Security and Finnish Ministry of the ... Homeland Security FTC approves order requiring Chegg to tighten data security Higher Ed Dive AI, Processor Advances Will Improve Application Security Security Boulevard Is There Liability from In-Home Security Monitoring? Security Sales & Integration MPD asking for security video from area when unidentified teen was found KMID - Local 2 News Enforcement of Fisheries Rules Will Enhance Maritime Governance ... The Pew Charitable Trusts Bates Security acquires Florida-based Performance Security | Security Security Systems News Lazarus Group Attack Identified After Operational Security Fail Infosecurity Magazine Dallas Zoo making 'significant changes' to security FOX 4 News Dallas-Fort Worth ZURIK: Mayor Cantrell's security officers clocked time while nowhere ... FOX 8 Local First TikTok's Transparency Campaign Echoes Effort by Huawei to Ease ... The Wall Street Journal ImagineIF Libraries Adds Security Presence to Kalispell Branch Flathead Beacon Texas Republicans spar over border security differences Spectrum News NY1 NTT and Palo Alto Networks join forces to improve security ... Help Net Security WTO Reform Should Include Clarification of National Security ... Sandler, Travis & Rosenberg, PA Gigamon Appoints Chaim Mazal Chief Security Officer Business Wire The best smart home security systems of 2023 Popular Science Hong Kong's largest national security trial to begin with 47 in dock FRANCE 24 English Checkmarx CEO on Bringing Application, API Security Together BankInfoSecurity.com The Week in Security: Russia takes aim at Ukraine with Sandworm, the truth about Russia’s top search ... Security Boulevard Dragos CEO on Opening Execs' Eyes to OT Security Threats BankInfoSecurity.com ‘Disturbing’ force used at Fresno homeless shelters by private security. Here’s what happened Fresno Bee Suspects sought after security guard interrupts smash-and-grab robbery at Dior pop-up on Melrose KABC-TV A look inside Columbus City Schools security and safety efforts ABC6OnYourSide.com Should iPhone users use security keys and Advanced Data ... The Washington Post How Will ChatGPT Impact Web2, Web3 and Online Security? Spiceworks News and Insights SBA, DoD expand collaboration around national security startups Federal News Network USENIX Security ’22 – Sebastian Roth, Stefano Calzavara, Moritz Wilhelm, Alvise Rabitti, Ben S... Security Boulevard Unlawful Southwest Border Crossings Plummet Under New Border ... Homeland Security Biden Administration Announces Additional Security Assistance for ... Department of Defense DHS Announces Process Enhancements for Supporting Labor ... Homeland Security DHS Continues to Prepare for End of Title 42; Announces New ... Homeland Security |
![]() |
![]() |
![]() |
RELATED ARTICLES
Another Fine Mess! I'm in the Anti-Spyware business, and I'm doing a lot of advertising to promote my website, but here I am online and on the phone, giving my personal information to.. Burning Bridges is Bad, But Firewalls are Good When you signed up for that ultra-fast DSL or Cable connection there was probably one very important piece of information that your ISP failed to mention. By accessing the Internet via a high-speed connection, you have tremendously increased your chances of being victimized by a computer hacker. Breaking Into Your PC: News... You'd better learn news from media, not from emails, security experts warn us users again.Numerous emails with "breaking news" in subject lines are appearing in users' inboxes. Technology and Techniques Used in Industrial Espionage Industrial Espionage. These methodologies are being used on a daily basis by competitors maybe even against you. Viruses, Trojans, and Spyware - Oh My! Have you ever had to call Symantec or McAfee to ask them how to remove a virus? Or have you spent hours online trying to figure out how to remove spyware, only to find out that you did something wrong and now your computer won't boot? I know your pain and frustration with just trying to use your computer without worry. As a computer technician at ARCH Computing Services, I know how hard it can be to pay someone to remove viruses and spyware. Dont Get Hacked - A Guide to Protecting Your Business from Thieves You've seen it in the news - 40 million credit cards exposed!With all the news about web sites being hacked and cyberthieves stealing credit card numbers and other personal data,it's no wonder that some shoppers are still hesitant to providepayment information online. You don't have to be. Wireless Network Security Working from home has its advantages, including no commute, a more flexible work schedule and fresh coffee and home-cooked meals whenever you want.But working from home while using a wireless local area network (WLAN) may lead to theft of sensitive information and hacker or virus infiltration unless proper measures are taken. Phishing, Fraudulent, and Malicious Websites Whether we like it or not, we are all living in the Information Age. We have nothing left but adapt to rapidly developing information technology, no matter who we are and what we do for living. Make Money Online - Latest Scam Disclosed Before we start, I want to make it clear that this article is about scammers that affect people who make money online by selling digital products, like e-books, software, etc. and have a refund policy, because we have a rather long way until the end and, if you are selling physical product or you money online through affiliate programs that don't involve a refund policy it's probably just a waste of time. Are They Watching You Online? When surfing the Internet you probably take your anonymityfor granted, most of us do.Tapping phones, listening to confidential conversations,reading others' e-mail messages seems like something thatonly happens in spy movies to "other" people. New CipherSend Online Security Service Thwarts Email Address Theft And Soothes Password Fatigue In 1997, I decided after 15 years as a practicing CPA that it was time to put down my pencil and explore a new venture on the exciting new internet which, while perhaps not exactly in its infancy at that point, was still at least a pimply faced teenaged medium still unexplored by most accountants.I founded CPAsites. Why Malicious Programs Spread So Quickly? It seems that nowadays cybercriminals prefer cash to fun. That is why malicious programs of various kinds (viruses, worms, Trojan horses, etc. A Basic Introduction To Spyware Spyware is the most troublesome software to appear on theInternet in recent times. When spyware infects a computersystem, it may be relatively harmless or it may bedevastating. Be Alert! Others Can Catch Your Money Easily! So called phishers try to catch the information about the account numbers and passwords of internet users. They deceive people with faked emails and websites that resembles exactly the originals of well known banks or electronic payment systems. 3 Steps to Ending Scams and Virus Problems Watching how the traditional media covers the latest virus or scam would make one think we are all innocent victims and it is the "evil Internet" at work once again. News flash! Innocent? More like uninformed. Keeping Worms Out of Your Network... No auntie Sookie, not earth worms, computer virus worms that can get to you computer and slowly dig deep into your files and eat them away. Put that eggnog down and I'll tell you some more about these new worms. Dont Fall Victim to Internet Fraud-10 Tips for Safer Surfing The Internet offers a global marketplace for consumers and businesses. However, criminals also recognize the potential of cyberspace. Internet Privacy Over the past few years as the internet has become more and more popular, privacy has become a major issue.Just as if you are walking down the street and can be watched, every click of your mouse every website you browse, or file you download, is traceable. How To Cover Your Tracks On The Internet Every single time you access a website, you leave tracks. Tracks that others can access. Firewall Protection - Does Your Firewall Do This? The first thing people think about when defending their computers and networks is an up-to-date antivirus program. Without this most basic protection, your computer will get a virus, which could just slow it down or potentially bring the pc to a complete standstill!So anti-virus software is the answer?An anti-virus solution on it's own is not the answer to all of your problems, it can only protect you so much; in fact test have shown that a new pc running Windows XP if left connected to the Internet unprotected will be infected with viruses and remotely controlled via unauthorised persons within 20 minutes! To protect you against hackers and often to prevent spyware and 'scumware' from communicating directly with their servers about information it may have picked up from your pc, a firewall should form the key part of your e-security solution. ![]() |
home | site map |
© 2006 |