Internet Fraud

by Rudolf Faix Saturday, July 11, 2015 2:56 AM

three monkeys: don't see, don't speak, don't hearScammers can use the Internet to promote fraud through unsolicited or junk emails, known as spam and advertisings. Even if they only get a handful of replies from the millions of emails they send out, it is still worth their while. Be wary of replying, even just to "unsubscribe", because that will give a scammer confirmation that they have reached a real email address. Any email you receive that comes from a sender you do not know, is not specifically addressed to you, and promises you some benefit is likely to be spam.

Malicious software - also referred to as malware, spyware, key loggers, trojan horses or trojans - poses online security threats. Scammers try to install this software on your computer so that they can gain access to files stored on your computer and other personal details and passwords.

Phishing scams are all about tricking you into handing over your personal and banking details to scammers. The emails you receive might look and sound legitimate but in reality genuine organizations like a bank or a government authority will never expect you to send your personal information by an email or online.

Scammers use a wide range of tricks to get their software onto your computer. They may trick you into clicking on a link or pop-up message in a spam email, or by getting you to visit a fake website set up solely to infect people’s computers.

Scammers can easily copy the logo or even the entire website of a genuine organization. So don’t just assume an email you receive is legitimate. If the email is asking you to visit a website to "update", "validate" or "confirm" your account information, be sceptical.

Delete phishing emails. They can carry viruses that can infect your computer. Do not open any attachments or follow any links in phishing emails.

Online auctions and Internet shopping can be a lot of fun and can also help you find good deals. Unfortunately, they also attract scammers.

Scammers will often try to get you to deal outside of online auction sites. They may claim the winner of an auction that you were bidding on has pulled out and offer the item to you. Once you have paid, you will never hear from them again and the auction site will not be able to help you.

Listed below are tips to protect yourself and your family from various forms of Internet fraud:

  • If you choose to shop online or participate in online auctions, make sure you know about refund policies and dispute-handling processes, and be careful that you are not overcharged. Also, you may want to use an escrow service, such as PayPal. This service will hold your payment and only release it to the seller once you have confirmed that you received what you paid for. There is usually a small fee for this service. A legitimate bank or financial institution will never ask you to click on a link in an email or send your account details through an email or website.

  • Never buy from bidders with poor ratings on auction sites, and do your best to ensure that you are only making purchases from genuine shopping sites. Never provide your personal, credit card or account information unless you are certain the site is genuine.

  • Don’t reply to spam emails, even to unsubscribe, and do not click on any links or call any telephone number listed in a spam email. Make sure you have current protective software or get advice from a computer specialist.

  • If an email or pop-up offers you a product or service that genuinely interests you and it seems reasonable, be sure that you understand all the terms and conditions and costs involved before making a purchase or providing your details.

  • Ask yourself: By opening this suspect email, will I risk the security of my computer? Are the contact details provided in the email correct? Telephone your bank or financial institution to ask whether the email you received is genuine.

 

Identity Theft

by Rudolf Faix Thursday, July 9, 2015 4:08 PM

Comic Identity TheftIdentity theft occurs when someone assumes your identity to perform a fraud or other criminal act. Criminals can get the information they need to assume your identity from a variety of sources, including by stealing your wallet, rifling through your trash, or by compromising your credit or bank information. They may approach you in person, by telephone, or on the Internet and ask you for the information.

Identity fraud can be described as the use of that stolen identity in criminal activity to obtain goods or services by deception.

Fraudsters can use your identity details to: 

  • Open bank accounts.
  • Obtain credit cards, loans and state benefits.
  • Order goods in your name.
  • Take over your existing accounts.
  • Take out mobile phone contracts.
  • Obtain genuine documents such as passports and driving licences in your name.
  • Stealing an individual’s identity details does not, on its own, constitute identity fraud. But using that identity for any of the above activities does. 

The first you know of it may be when you receive bills or invoices for things you haven’t ordered, or when you receive letters from debt collectors for debts that aren’t yours.

The sources of information about you are so numerous that you cannot prevent the theft of your identity. But you can minimize your risk of loss by following a few simple hints.

Tips for Avoiding Identity Theft:

  • Never throw away ATM receipts, credit statements, credit cards, or bank statements in a usable form.

  • Never give your credit card number over the telephone unless you make the call.

  • If you receive an unsolicited email or phone call from what appears to be your bank or building society asking for your security details, never reveal your full password, login details or account numbers. Be aware that a bank will never ask for your PIN or for a whole security number or password.

  • Reconcile your bank account monthly, and notify your bank of discrepancies immediately.

  • If you’re expecting a bank or credit card statement and it doesn’t arrive, tell your bank or credit card company.

  • Keep a list of telephone numbers to call to report the loss or theft of your wallet, credit cards, etc.

  • Report unauthorized financial transactions to your bank, credit card company, and the police as soon as you detect them.

  • If you move house, ask your mail service to redirect your post for at least a year.

  • Review a copy of your credit report at least once each year. Notify the credit bureau in writing of any questionable entries and follow through until they are explained or removed.

  • If your identity has been assumed, ask the credit bureau to print a statement to that effect in your credit report.

  • If you know of anyone who receives mail from credit card companies or banks in the names of others, report it to local or federal law enforcement authorities.

 

Tag cloud

AboutMe

I'm since more then 35 years in the computer business (programming and technical support) and using the Internet since it has started. Since 2002 I'm programming solutions for Asterisk and since 2004 I'm in the call center industry.

Disclaimer

All data and information provided on this site is for informational purposes only. I make no representations as to accuracy, completeness, currentness, suitability, or validity of any information on this site and will not be liable for any errors, omissions, or delays in this information or any losses, injuries, or damages arising from its display or use. All information is provided on an as-is basis. By browsing or using content from this site you accept the full legal disclaimer of this website.


web page counter code