Featured Posts

Wtach out fo the things.. Things to Every new day brings its delivery of electronic mails. Much people are undergoing an increase of the messages that contain the content that seems to be......

Avoid Fake Check ScamsHere are five things you should know to avoid fake check scams....

Sunday, December 25, 2011

iYogi - Scammers now devising iYogi Scam to get access to your personal data: Beware

From booking airline tickets to doing research, from academics to music, you name it, and the Internet is the go-to source for everything. The beauty of the Internet is that you get access to a vast pool of resources which the pre-Internet generation might never have even dreamed of. However, the downside of an all-powerful and omnipresent Internet is that it is now playing into the hands of unscrupulous elements who device malicious scams to dupe you, a prime example being the iYogi scam.

If you are yet to come across the iYogi scam, don’t get misled by the mention of iyogi in the scam. For, it is the scammers exploiting the name of the company to fulfill their perverse needs without the consent and knowledge of the company. Also, iYogi is just one of the many establishments exploited by these scammers; you must by now be familiar with the charity scam where the perpetrators impersonate themselves as some reputed charity organizations and solicit money and other help. One reason why scams like the iYogi scam flourishes is that users sometimes don’t bother to do the background check of the organization mentioned in the e-mail, especially when it bears all the designs of a well-established company. The iYogi scam has been thriving on the ignorance of users and if you are well informed you can avoid it. Let me share my mother-in-law’s horrible encounter with these scammers.

My mother-in-law is a retired school teacher, and is very active on the Internet. For her, the Internet means the world and something that keeps her going. An active member of many online forums like forums for the elderly people, for animal rights, human rights violation and a couple others, she also has a close group of friends that she communicates on the Internet. So, if the Internet is down even for a day, it is enough to make her go crazy. It so happened that this guy, calling himself a technician, and representing himself as a representative of iyogi, one day called my mother-in-law and started claiming that her system is infected and that if it is not fixed immediately, it will be permanently damaged. It was sufficient to make her panic. Seizing the opportunity, the guy said that he can fix the problem but that he needs to have remote access to the system. And for that he needs her to go to a certain site and download and install specific software on the system. By this time, the guy was having a firm hold over her senses and convinced her to do as he wanted. Actually, she had no prior experience of such a situation and since the guy was also claiming to be a representative of iyogi, she thought that there were few reasons to suspect his bona fides. But, after the remote connection was established, and the technicians worked on her system, she had a lot of heart burn and tragedy. Many files on her system were missing and the computer became almost inoperable. Even some of her profiles were compromised. For, as we found out later, the guy was not associated with iYogi and remote tech support was the last thing on his mind. It was a case of iyogi scam, which is increasingly targeting unsuspecting and elderly people.

When we approached iYogi, they categorically denied having anything to do with the iyogi scam saying that they follow strict moral and ethical policies. We too found no evidence to prove otherwise. They though showed genuine concern that malicious elements are using the company’s name to harass and rip off people. Making it clear that they don’t make cold calls, it has urged people not to entertain remote tech support from people identifying themselves as iyogi technicians until and unless their credentials are verified.

In fact, to raise awareness among Internet users about the perils of Internet scams and to provide users tips on how to avoid these scams, iyogi has been publishing iYogi scam alerts and iYogi fraud alerts for quite some time now. You can get to know a great deal about the latest and most malicious scams out there like online software scam, iyogi scam, online video scam, online dating scams, and inheritance scams through these alerts. It can be a good way to understanding the modus operandi of the scammers that will help users like you and I stand in good stead.

If you have any questions or doubts about the services offered by iyogi or about the iYogi scam, sharing them on the iYogi complaints form (the company has its own complaints form) would be a good idea.  This way you can seek a direct clarification from the company regarding any activity that you feel suspicious about and that involves the company’s name.

Dos and don’ts when an imposter lends at your door representing himself as an iYogi technician:

  • Before going too far into the discussion, figure out who you are dealing with. Don’t hesitate to ask as many questions you want to be sure. 
  • Don’t let him control the conversation. It is the most conducive scenario for him to manipulate you. If he is too smart for you, take help of a responsible and intelligent friend. 
  • Where did he find your number and how did he know that there is problem with your system? Let him explain.
  • Study his offer, whether he is offering too much for too little. If yes, it is sure sign of danger. Immediately shut shop!
  • If he is asking you to download programs from unheard of sites, or sites that are not dependable. Stop. First check his bona fides.

Remember, the premise ‘Prevention is better than cure’ equally applies to iYogi scam!

Friday, December 16, 2011

Top Five Online Scams

Here's a list of the Top 5 scams and schemes you're most likely to find on internet.

1. Auction Fraud
The setup: Online auction fraud accounts for three-quarters of all complaints registered with the FBI's Internet Crime Complaint Center (formerly the Internet Fraud Complaint Center). There are many types of eBay chicanery, but the most common one is where you send in your money and get nothing but grief in return.

2. Phishing Scams
The setup: You receive an e-mail that looks like it came from your bank, warning you about identity theft and asking that you log in and verify your account information. The message says that if you don't take action immediately, your account will be terminated.

The risk: Your account information will be sold to criminals, who'll use it to ruin your credit and drain your account. According to Gartner, phishing scammers took consumers (and their banks, who had to cover the charges) for $1.2 billion in 2003.

3. Nigerian 419 Letter
The setup: You receive an e-mail, usually written in screaming capital letters that starts out like this:
"DEAR SIR/MADAM: I REPRESENT THE RECENTLY DEPOSED MINISTER OF AGRICULTURE FOR NODAMBIZIA, WHO HAS EMBEZZLED 30 MILLION DOLLARS FROM HIS STARVING COUNTRYMEN AND NOW NEEDS TO GET IT OUT OF THE COUNTRY..."

4. Postal Forwarding/Reshipping Scam
The setup: You answer an online ad looking for a "correspondence manager." An offshore corporation that lacks a U.S. address or bank account needs someone to take goods sent to their address and reship them overseas. You may also be asked to accept wire transfers into your bank account, then transfer the money to your new boss's account. In each case, you collect a percentage of the goods or amount transferred.

5. "Congratulations, You've Won an Xbox (IPod, plasma TV, etc.)"
The setup: You get an e-mail telling you that you've won something cool--usually the hot gadget du jour, such as an Xbox or an IPod. All you need to do is visit a Web site and provide your debit card number and PIN to cover "shipping and handling" costs.

Source: pcworld.com

Facebook: Win free iPad Promotion Scam

If you received any email saying that you have won an iPad from a "hotmail" account, it is a scam. Also note that scammers may fake any email account, including name@facebook.com, or something similar.

All the names used in the email are FAKE; Here is an example for the same:

On Thu, Oct 15, 2011 at 8:33 AM, James **** <palm****@hotmail.com> wrote:


Hello Friend,


My name is James ****, Chief technology officer of Facebook. We have recently partnered up with the apple company for a one-time promotional event today; we are giving away complimentary Apple iPads to randomly selected individuals who have been fortunate to be chosen as one of our newest winners for today. We randomly selected users from our systems database and you have matched with our latest drawing.

 We have partnered up with Apple Inc to advertise their hottest product yet, the Apple iPad. Once again, we are running this promotion for one-day only. All you need to do is CLICK HERE to go to our web site made for this promotion and key in your email to receive yours for free. Simply make sure you enter your email so we can locate our records to ensure that we have reserved one for you. That is it!

Congrats on winning a free Apple iPad2. In case you have any question or concerns, feel free to e-mail me back. However, you should claim your free iPad 1st to ensure one will be set-aside for you before the deadline ends. We do understand that you may possibly not receive this email until after the deadline, but, we suggest you check out the website and enter your email to see if we still have yours on hold, which we often-times do because others have not claimed theirs in time.

James
CTO, Facebook

Fake Scam Steve Jobs Charitable Foundation

If you received an email from "Steve Jobs Charitable Foundation", it is a scam. The email, written in poor English, asked for donation to help young web coders. There is no such "charitable trust".

Other scams in the past 2 - 3 weeks after Steve Jobs death include an announcement about giving away free iPads in remembrance of Steve Jobs. The main objective to this scam is to drive traffic to the website, and when you click to such links you’ll be asked to fill surveys online to get free iPad.

It is not uncommon for criminals and cyber-crooks to take advantage of title-grabbing events to spread their creations and affect the maximum number of victims possible in a short period of time.

These scams work by tricking users into visiting websites where they are told they have won a valuable prize, such as an iPad, an iPhone or apple products. Obviously, the unsuspecting victim will never get the prize, but rather a series of costly spam messages. In addition, malicious websites like these leverage geo-location data to display messages in different languages depending on the user's location.

Please stay away from such scams like Fake Steve Jobs Charitable Foundation Scam. Have safe internet browsing and stay away from such scammers online.

Good Luck

Stay Safe from Identity Theft

Here are some tips to protect yourself against identity theft:

1.    Protect your personal information. It's a valuable commodity.
2.    Only share your credit card or other personal information when you're buying from a company you know and trust.
3.    Know who you're dealing with.
4.    Walk away from any company that doesn't clearly state its name, physical address, and telephone number. A Web site alone or a mail box drop should raise suspicions.
5.    Don't rely on verbal promises. Get all promises in writing and evaluate them carefully before you make any payments or sign any contracts.
6.    Read and understand the fine print in any written agreement.
7.    Don't pay "up-front" for a loan or credit. Remember that legitimate lenders never "guarantee" a loan or a credit card before you apply, especially if you have bad credit, no credit, or a bankruptcy.

Thursday, December 15, 2011

THE VAMPIRE BYTE SEARCH ENGINE SCAM

This scam targeted users searching “Stephenie Meyer”


• A result for “Stephenie Meyer at 365Multimedia.com” returned with a description of “Stephenie Meyer interview on Twilight the movie starring Robert Pattinson and Kristen Stewart”.

• When clicked on, this link redirected users to a window informing them that they are infected with malware and they are then advised to download a phony antivirus software product to get rid of the infection.

• As Victims downloaded and installed the phony antivirus software they are asked for credit card information.

• Malware was then installed on the user’s computer and any financial information entered is sent off to cyber criminals.

Source: en.twilightpoison.com

Tuesday, June 28, 2011

How to identify phishing


Defining Phishing:
Phishing (pronounced fishing) is a way for fraudulent companies and con artists use to steal important information from unsuspecting people online. The main concept of phishing is through spoof emails and websites based on legitimate businesses. Email and web sites that will be used in a phishing attempt to look legit, but take a website that has nothing to do with the company you're imitating. An example and phishing technique is consistently used online banking.

How to identify email phishing or scam:
  1. Email scammer sends a large number of people indicating that there is any problem or issue with your account and orders them to the fake site to fix a convenient link in the email for easy access. 
  2. Do not worry about whether these people actually have emails a real account at the institution, known to greatly affect the mass email from them.
  3. These emails often use scare tactics. These emails try to force customers into action by saying that account is about to be closed if one takes into account information is not verified. Forever suspicious email that seems to generate a sense of urgency.
  4. Sometimes, send e-mails of phishing attachment in the e-mail to install viruses or spyware on your computer. Suspect e-mail with all such attachment.
Therefore, you should always suspect to information in such e-mail and check the links-mail requesting personal information.

Thursday, June 23, 2011

How to Avoid Fake Check Scams

Here are five things you should know to avoid fake check scams:

   1. If someone sends by you checking or money order and asks, that you send money somewhere in the return, then it' a shady transaction A.S. This is isn't as the legitimate operators of sweepstakes or other companies work. If you' d actually won, you' the tax of pay d immediately to Uncle Sam. Legitimate works also of don' the buyer of secret or of chief accountant;includes wiring money.

   2. A trusted mark or a company name is no guarantee of legitimacy. The swindlers claim frequently companies well-known of be for people' to reach; s trust. Find company' s the contact information, or online or by means of folder aid, and verified the information before you pass something else.

   3. The check or the money order can false be even if your bank or credit union you have the cash late. YOU can your money rapidly, usually within one up to two days, but your bank or credit union won' to get; t weet or it' S.A. rubber control or money order up to it' s processes, that can demand weeks. By the time that the fraud has been discovered, the swindlers have taken money already your and looppas.

   4. When the bad check or the money order plays at marbles, you' ll are your bank or credit union the money chargeable. Since you' re is in the best position know or the person whom you the control sent is reliable, you' ll are left the keeping pocket if he or they isn' t. if you refuse pay, your account is able be frozen or closed. YOU could be also even continued with fraud and charged.

   5. Sending money that the service of the wire transfer has been used as sending cash - once swindler pockets it, it' s gone for good. The transfers aren' of the wire; t such as controls which can be stopped or creditcardlasten which can be disputed. But as the money hasn' t improved, you can the operation are able cancel. Contact immediately the service of the money transfer as you you' thinks; ve scammed.

Phishing Email Safety Tips

Phishing e-mails, websites and phone calls are designed to steal money. Cyber ​​criminals can do this by installing malicious software on your computer or steal personal data from your computer.

Cyber criminals also use social engineering to convince you to malicious software or hand over your personal information under false pretenses to install. They can e-mail, call you on the phone, or convince you to something like a website download.

We all have received phishing messages. They are mixed with the hundreds of emails many of our daily process. Processing time email takes time and it's a job that we can rush through, but it is essential that we rather think that responding to email and be absolutely sure that the sender of the email are legitimate.

As you process your email, remember…

   1. Never click through to a website that claims it needs you to verify your password.
   2. Be suspicious of any email requesting your password or sensitive information. Reputable companies will not randomly email you asking for sensitive information.
   3. If you receive an email from a company and you’re not sure if it’s legitimate, do not follow the link in the website, instead go directly to the website you know to be real or call the company to inquire about the request.

Tuesday, June 21, 2011

Watch out for the things before you leap

Things to Every new day brings its delivery of electronic mails. Much people are undergoing an increase of the messages that contain the content that seems to be

* too good for being truth; rule #1 of or -- If it seems too good for being truth… IT IS probably!

* on the strange people or events that are something;

* warnings on the things that COULD happen to their computer unless you take measures to prevent them;

* histories on the things that " all know to be true" ,… unless by all means it is not truth!

How many of the resource where the file it takes the thorough necessary measures of your computer in deletion or takes, or changes constitution before, in 37 of your close friend E-mail message, is frequently before you and can utilize that " In order to try the fact that it decides, inspecting it is wise, but copy; facts" . [Namely, don' It crosses t with the virus, or does not investigate and it does not become the part of problem by drawing up many hysteria, -- It can take, or either one 2 minutes a little.