Online Cell Phone Scams and Spam
They're out there. Individuals trying to make a quick buck at your expense. You labour hours on end to produce quality content on your website only to get repetitive requests for huge numbers of product or promises for the greatest deals online. As a webmaster for a cell phone and PDA site, I've had my share of spam and scams come through, mostly via email, some posted on my forum. The purpose of this article is to provide a few methods of detecting spam and scams, and provide a few examples as well. Take a look over and protect yourself from online cellular fraud.
Anybody catch the 60 minutes episode where Andy Rooney teaches faithful viewers how to detect junk mail? Junk email works in much the same way. Items with subject headings 'Great deal', or 'limited time offer' usually can wait, and definitely don't have great offers hidden inside. Webmasters and consumers should have a golden rule, if you don't know where an offer came from (you don't know the sender) then delete it. Plain and simple. Most free email accounts, GMAIL, Hotmail, Yahoo!, have good filters that label incoming spam and scams as, well, spam. However, the majority of webmasters do not use free email accounts for the sake of professionalism. To these individuals, a basic virus detector usually includes email protection and generally will detect possible spam items before they hit your box. Having said this, if you're doing link campaigns, or joining forums, etc., in order to promote your site, it may not be a bad idea to enlist the free online email account and prevent all the unwanted junk from hitting your work emails.
It's been my experience that some people out there hand pick contact pages of potential victims, and therefore the email may be somewhat individualised to your site. Your name, the site name, or similar content, may be communicated within the email making it appear somewhat legitimate. Be mindful of your email accounts (contact pages) that are exposed to the world wide web. Some smart scammers have created bots that will automatically harvest emails that are sitting live on the web and input them into a spam list. Remember this when trying to determine whether something from the web is legit.
If an questionable email has contact information, Google it. If it's a legitimate company contacting you, they should have some type of online presence. I've noticed that the majority of spam and scams have fake mail addresses, but no online address. Furthermore, emails usually come from online web accounts like Yahoo!. Not only can you search contact information, you can serach content as well. Chances are a webmaster has posted the contents on a forum somewhere wondering about its legitimacy. I can't stress this enough, take 4 seconds and doabout the email before you consider replying.
With these simple and quick tips you should be able to identify the majority of scam and spam emails. If in doubt, delete. If something was important that you deleted, or legitimate, the individual will likely try to contact you again. With this in mind, here are some examples of spam and scam emails from the cellular and technology industry, my comments are in brackets.
Subject: WE HAVE LOTS OF GSM/NEXTEL MOBILE PHONES AT VERY CHEAP PRICES'''''''' [The subject always varies.]
PHONES SELLERS INCORPORATED
LETTER OF BUSINESS RELATIONSHIP
[A variation of the above is instead of written body content, they will actually send a product list of the cell phones they require asking for a dozen of each. Sounds like great business!...Here's the next one]
CONSOLIDATED PHONES LIMITED
COMMERCIAL SALE OF BULK MOBILE PHONES
WE ARE EXPORTERS AND IMPORTERS OF GSM, TDMA, AND CDMA PHONES. [CDMA Phones do not run the majority of African networks.] WE ARE ONE OF THE LEADING COMPANIES IN NIGERIAN COMMUNICATIONS SECTOR, AND WE GIVE OUT OUR BEST IN SATISFYING OUR NUMEROUS CUSTORMERS. WE SELL IN BULK AND AT A VERY CHEAP RATE.
WE WILL LIKE TO USE THIS MEDIUM TO INTRODUCE TO YOU OUR VARIOUS PHONE BRANDS AND ACCESSORIES LISTED IN OUR PRICE LIST. THESE ITEMS ARE READY FOR SALE AND THE PRICE LIST IS AS GIVEN BELOW. WE WILL BE WAITING AND READY TO ASSIST YOU IN ANY INFORMATION REQUIRED BY YOU, AND ALSO, WE ARE READY TO DO BUSINESS WITH ANY COMPANY, INDIVIDUALS OR GROUP AS LONG AS THEY ARE NOT FRAUDULENT. [Of course you wouldn't.]
WE WILL SEND OUR RANGE OF PRODUCTS AND PRICE LIST ON DEMAND.
JULIAN JONES (MISS)
But two examples of two spam/scam emails. Keep your eyes peeled webmasters!
Barry Nagassar is owner and operator of DiscussWireless an online cell phone and PDA forum that provides the latest cell phone news, reviews, and cell phone fraud discussion. Included is a comprehensive compare and shop section for the latest cellular and PDA phones. Compare competitor prices in one location, or join the forum and post the latest review or service provider issue. Complete cell phone fraud forum included.
Q&A: How safety and security works in Seattle Schools The Seattle Times
WSU increases security for Apple Cup KREM.com
Israeli coalition makes deal on security post Northwest Arkansas Democrat-Gazette
Addressing security risks with smart devices Government Matters
Security guard fires gunshot inside a Des Moines bar KCCI Des Moines
Roseville Galleria ramps up security as organized retail theft meets holiday shopping season - ABC10.com KXTV
Roseville Galleria ramps up security as organized retail theft meets holiday shopping season ABC10.com KXTV
IOTW: Twitter accused of covering up data breach that affects millions | Cyber Security Hub - Cyber Security Hub
IOTW: Twitter accused of covering up data breach that affects millions | Cyber Security Hub Cyber Security Hub
Iran Bolsters Border Security to Prevent 'Infiltration' Voice of America - VOA News
Canada announces funding for World Food Programme to address global food security crisis - World - ReliefWeb
Canada announces funding for World Food Programme to address global food security crisis - World ReliefWeb
11/26/22 National Security and Korean News and Commentary smallwarsjournal
Education Matters in National Security - ClearanceJobs ClearanceJobs
EV challenges, Mazda PHEV, 5G security – the week just-auto.com
TSA sees 'concerning' rise in number of firearms at security checkpoints – and most are loaded - CNBC
Ex-security guard shot on the Strip opens restaurant in North Las Vegas on Thanksgiving - Fox 5 Las Vegas
Ex-security guard shot on the Strip opens restaurant in North Las Vegas on Thanksgiving Fox 5 Las Vegas
National Security Memorandum on Strengthening the Security and Resilience of United States Food and Agriculture - The White House
National Security Memorandum on Strengthening the Security and Resilience of United States Food and Agriculture The White House
Security questions after Browns’ stadium break-in WJW FOX 8 News Cleveland
20 Years Later, It's Time to Overhaul the Department of Homeland Security | News & Commentary | American Civil Liberties Union - ACLU
20 Years Later, It's Time to Overhaul the Department of Homeland Security | News & Commentary | American Civil Liberties Union ACLU
Fruits Eco-Blockchain Project Completes its Security Audit of their Native Blockchain Conducted by Quantstamp - Business Wire
Fruits Eco-Blockchain Project Completes its Security Audit of their Native Blockchain Conducted by Quantstamp Business Wire
CISA Applauds the Beginning of Infrastructure Security Month Declaring Infrastructure Security is National Security - CISA
CISA Applauds the Beginning of Infrastructure Security Month Declaring Infrastructure Security is National Security CISA
Remarks by Ambassador Linda Thomas-Greenfield at a UN Security Council Briefing on Attacks on Ukraine's Critical Infrastructure - United States Mission to the United Nations
Remarks by Ambassador Linda Thomas-Greenfield at a UN Security Council Briefing on Attacks on Ukraine's Critical Infrastructure United States Mission to the United Nations
Growing Mastodon security community grapples with CISA impersonators Cybersecurity Dive
The Security Service of Ukraine eliminated the escape channel of evaders to the EU through self-proclaimed Transnistria | odessa-journal.com - Odessa Journal
The Security Service of Ukraine eliminated the escape channel of evaders to the EU through self-proclaimed Transnistria | odessa-journal.com Odessa Journal
Zelenskyy vows to help feed Africa and boost global food security with Grain from Ukraine scheme - Yahoo News
Zelenskyy vows to help feed Africa and boost global food security with Grain from Ukraine scheme Yahoo News
Dallas-Fort Worth gay bars address security in response to Club Q shootings - The Dallas Morning News
Dallas-Fort Worth gay bars address security in response to Club Q shootings The Dallas Morning News
Analysis: Surge in Russia's defence and security spending means cuts for schools and hospitals in 2023 - Reuters
Analysis: Surge in Russia's defence and security spending means cuts for schools and hospitals in 2023 Reuters
Remarks at a UN Security Council Annual Tri-Committee Briefing on 1267, 1373, and 1540 - United States Mission to the United Nations
Remarks at a UN Security Council Annual Tri-Committee Briefing on 1267, 1373, and 1540 United States Mission to the United Nations
Grayscale refuses to share proof of reserves due to 'security concerns' as shares trade at a 45% discount to bitcoin - CNBC
Grayscale refuses to share proof of reserves due to 'security concerns' as shares trade at a 45% discount to bitcoin CNBC
New attacks use Windows security bypass zero-day to drop malware BleepingComputer
Homeland Security Secretary Mayorkas says he's not quitting as Republicans prepare to escalate attacks against him - CNN
Homeland Security Secretary Mayorkas says he's not quitting as Republicans prepare to escalate attacks against him CNN
Retailers Install Security Cameras, Steel Cables as Stores Brace for Holiday Crime Wave - Washington Free Beacon
Retailers Install Security Cameras, Steel Cables as Stores Brace for Holiday Crime Wave Washington Free Beacon
'Our security here is a joke': Election workers lament lack of federal spending on security ahead of crucial midterms - CNN
'Our security here is a joke': Election workers lament lack of federal spending on security ahead of crucial midterms CNN
U.N. Supplied Qatar With Tech to ‘Prevent Nuclear Security Incident’ at 2022 World Cup - Washington Free Beacon
U.N. Supplied Qatar With Tech to ‘Prevent Nuclear Security Incident’ at 2022 World Cup Washington Free Beacon
Meta Employees, Security Guards Fired for Hijacking User Accounts - WSJ The Wall Street Journal
Security Cameras Make Us Feel Safe, but Are They Worth the Invasion? The New York Times
Social security update: First of two checks totaling $1755 to arrive in seven days - Washington Examiner
Social security update: First of two checks totaling $1755 to arrive in seven days Washington Examiner
Press Gaggle by Press Secretary Karine Jean-Pierre and National Security Advisor Jake Sullivan En Route Phnom Penh, Cambodia - The White House
Press Gaggle by Press Secretary Karine Jean-Pierre and National Security Advisor Jake Sullivan En Route Phnom Penh, Cambodia The White House
Foxconn workers clash with security in China Yahoo! Voices
Top Twitter executives quit amid Elon Musk takeover The Washington Post
This Foreign Company Wants To Mine Massive Amounts of Lithium in Nevada. First, It Must Overcome Its China Problem. - Washington Free Beacon
This Foreign Company Wants To Mine Massive Amounts of Lithium in Nevada. First, It Must Overcome Its China Problem. Washington Free Beacon
SSI Schedule Reminder: Supplemental Security Income Recipients Receive Two Payments in December 2022 - Yahoo Finance
SSI Schedule Reminder: Supplemental Security Income Recipients Receive Two Payments in December 2022 Yahoo Finance
FTC Accuses Chegg Homework Help App of ‘Careless’ Data Security The New York Times
House Republicans Warn TikTok May Have Misled Congress Over China Data Sharing - Washington Free Beacon
House Republicans Warn TikTok May Have Misled Congress Over China Data Sharing Washington Free Beacon
Iranians Face Internet Blackouts as Regime Clamps Down on Protesters Washington Free Beacon
Dem Mark Kelly Says His Party ‘Not Even Close’ To Understanding Border Crisis - Washington Free Beacon
Dem Mark Kelly Says His Party ‘Not Even Close’ To Understanding Border Crisis Washington Free Beacon
Dropbox discloses breach after hacker stole 130 GitHub repositories BleepingComputer
FSB works to undermine pro-Western government in Moldova The Washington Post
U.S. privately asks Ukraine to show it's open to negotiate with Russia The Washington Post
Government Panel Calls on Congress To Review China’s Trade Status Washington Free Beacon
Is Adware - Spyware Putting Your Privacy at Risk
Do you sometimes notice your computer running slower. Is your computer acting strange almost like its possessed? Well, it just may be plagued with Spyware.
Make Money Online - Defend Against The Latest Scam
First, let's do a little recap'. As I stated in the first part of the article, "Make Money Online - The Latest Scam Disclosed", "refund policy scammers" affect the websites that make money online by selling digital products by buying the product and asking for refunds, while keeping the product.
Fishing for Fortunes. Scam!
Spelt phishing, but pronounced as above, this despicable act is an effort to batter your bankroll or commandeer your cash.To put it simply, you can get emails from account administrators, which strongly urge you to update details attached to that account.
Is Spyware Watching You?
Imagine my surprise when I received a phone call from afriend who told me he'd been the victim of a "spyware"attack that left him shaking at his loss of privacy.I listened to his horror story with a sympathetic ear, butI felt secure since I carry anti-virus software and afirewall (both by Norton).
Desktop Security Software Risks - Part 1
This is the second in a series of articles highlighting reasons why we need a new model for anti-virus and security solutions.Reason #2: the Desktop Security Software RisksThe risks of placing software on the desktop are such that I will be breaking this article into two parts.
Over the past few years as the internet has become more and more popular, privacy has become a major issue.Just as if you are walking down the street and can be watched, every click of your mouse every website you browse, or file you download, is traceable.
Pharming - Another New Scam
Pharming is one of the latest online scams and rapidly growing threat that has been showing up on the Internet. It's a new way for criminals to try to get into your computer so they can steal your personal data.
Firewall Protection - Does Your Firewall Do This?
The first thing people think about when defending their computers and networks is an up-to-date antivirus program. Without this most basic protection, your computer will get a virus, which could just slow it down or potentially bring the pc to a complete standstill!So anti-virus software is the answer?An anti-virus solution on it's own is not the answer to all of your problems, it can only protect you so much; in fact test have shown that a new pc running Windows XP if left connected to the Internet unprotected will be infected with viruses and remotely controlled via unauthorised persons within 20 minutes! To protect you against hackers and often to prevent spyware and 'scumware' from communicating directly with their servers about information it may have picked up from your pc, a firewall should form the key part of your e-security solution.
Technology and Techniques Used in Industrial Espionage
Industrial Espionage. These methodologies are being used on a daily basis by competitors maybe even against you.
Wireless Network Security
Working from home has its advantages, including no commute, a more flexible work schedule and fresh coffee and home-cooked meals whenever you want.But working from home while using a wireless local area network (WLAN) may lead to theft of sensitive information and hacker or virus infiltration unless proper measures are taken.
Phishing - Identity Theft & Credit Card Fraud
What is Phishing?Phishing is a relatively newly coined term for a kind of method for harvesting information for identity theft. Phishing is quite simply providing a person with false information or credentials to trick them in to giving you their personal information.
Is The Internet Over Regulated
Today's Internet or World Wide Web is being over regulated.But, are you being taken for a ride, are you lead to believe that Governments World Wide are creating new legislation for your benefit or are there underlying factors that these laws are more beneficial to Governments and big business?First we had the Can-Spam and other laws passed regulating the sending of unsolicited commercial e-mail, that contains false or deceptive subject information, or that is sent from invalid e-mail addresses, but for me, my inbox still seems to always be full of junk mail.
Be Alert! Others Can Catch Your Money Easily!
So called phishers try to catch the information about the account numbers and passwords of internet users. They deceive people with faked emails and websites that resembles exactly the originals of well known banks or electronic payment systems.
Reporting Internet Scams
When it comes to reporting Internet scams most of us either don't have a clue who to contact or just ignore them in our email. But according to an FBI report in December 2004, nearly ten million people last year didn't ignore them and fell for the latest Internet scams.
Cybercriminals Trick: Targeted Trojan-Containing Emails
Threats we ordinary Web users face online leave us no choice but learn. Haven't you noticed how many new things you learned lately? We are much better informed about malicious programs than just a year ago.
Phishing: An Interesting Twist On A Common Scam
After Two Security Assessments I Must Be Secure, Right?---------------------------------------Imagine you are the CIO of a national financial institution and you've recently deployed a state of the art online transaction service for your customers. To make sure your company's network perimeter is secure, you executed two external security assessments and penetration tests.
What Can Be Done About Spyware And Adware
Having a good Spyware eliminator on your computer is vital now a days with all of the different Spyware, Adware, and other malicious computer parasites that are out there. Most of them are reasonably priced and very easy to use.
Online Shopping: 10 Tips For Safe Online Shopping
Have you ever bought a product or service from the internet?Yes? Me too. You're not alone?Some of the reasons why most people are shopping online are: they can buy anything at anytime because Internet shopping is available 24 hours, all the time.
Road Warrior At Risk: The Dangers Of Ad-Hoc Wireless Networking
Airport Menace: The Wireless Peeping Tom----------------------------------------As a network security consultant, I travel quite frequently. At times, it seems like the airport is my second home.
5 Tips For An Unbreakable Password
Despite the current wave of identity theft and corporate security breaches it's amazing how very few people treat their passwords with any level of seriousness. Most computers users, both at home and in the office, see passwords as a nuisance and therefore make them as easy to remember as possible.
|home | site map|