Featured Posts

Wtach out fo the things.. Things to Every new day brings its delivery of electronic mails. Much people are undergoing an increase of the messages that contain the content that seems to be......

Avoid Fake Check ScamsHere are five things you should know to avoid fake check scams....

Friday, December 16, 2011

Fake Scam Steve Jobs Charitable Foundation

If you received an email from "Steve Jobs Charitable Foundation", it is a scam. The email, written in poor English, asked for donation to help young web coders. There is no such "charitable trust".

Other scams in the past 2 - 3 weeks after Steve Jobs death include an announcement about giving away free iPads in remembrance of Steve Jobs. The main objective to this scam is to drive traffic to the website, and when you click to such links you’ll be asked to fill surveys online to get free iPad.

It is not uncommon for criminals and cyber-crooks to take advantage of title-grabbing events to spread their creations and affect the maximum number of victims possible in a short period of time.

These scams work by tricking users into visiting websites where they are told they have won a valuable prize, such as an iPad, an iPhone or apple products. Obviously, the unsuspecting victim will never get the prize, but rather a series of costly spam messages. In addition, malicious websites like these leverage geo-location data to display messages in different languages depending on the user's location.

Please stay away from such scams like Fake Steve Jobs Charitable Foundation Scam. Have safe internet browsing and stay away from such scammers online.

Good Luck

Stay Safe from Identity Theft

Here are some tips to protect yourself against identity theft:

1.    Protect your personal information. It's a valuable commodity.
2.    Only share your credit card or other personal information when you're buying from a company you know and trust.
3.    Know who you're dealing with.
4.    Walk away from any company that doesn't clearly state its name, physical address, and telephone number. A Web site alone or a mail box drop should raise suspicions.
5.    Don't rely on verbal promises. Get all promises in writing and evaluate them carefully before you make any payments or sign any contracts.
6.    Read and understand the fine print in any written agreement.
7.    Don't pay "up-front" for a loan or credit. Remember that legitimate lenders never "guarantee" a loan or a credit card before you apply, especially if you have bad credit, no credit, or a bankruptcy.

Thursday, December 15, 2011

THE VAMPIRE BYTE SEARCH ENGINE SCAM

This scam targeted users searching “Stephenie Meyer”


• A result for “Stephenie Meyer at 365Multimedia.com” returned with a description of “Stephenie Meyer interview on Twilight the movie starring Robert Pattinson and Kristen Stewart”.

• When clicked on, this link redirected users to a window informing them that they are infected with malware and they are then advised to download a phony antivirus software product to get rid of the infection.

• As Victims downloaded and installed the phony antivirus software they are asked for credit card information.

• Malware was then installed on the user’s computer and any financial information entered is sent off to cyber criminals.

Source: en.twilightpoison.com

Tuesday, June 28, 2011

How to identify phishing


Defining Phishing:
Phishing (pronounced fishing) is a way for fraudulent companies and con artists use to steal important information from unsuspecting people online. The main concept of phishing is through spoof emails and websites based on legitimate businesses. Email and web sites that will be used in a phishing attempt to look legit, but take a website that has nothing to do with the company you're imitating. An example and phishing technique is consistently used online banking.

How to identify email phishing or scam:
  1. Email scammer sends a large number of people indicating that there is any problem or issue with your account and orders them to the fake site to fix a convenient link in the email for easy access. 
  2. Do not worry about whether these people actually have emails a real account at the institution, known to greatly affect the mass email from them.
  3. These emails often use scare tactics. These emails try to force customers into action by saying that account is about to be closed if one takes into account information is not verified. Forever suspicious email that seems to generate a sense of urgency.
  4. Sometimes, send e-mails of phishing attachment in the e-mail to install viruses or spyware on your computer. Suspect e-mail with all such attachment.
Therefore, you should always suspect to information in such e-mail and check the links-mail requesting personal information.

Thursday, June 23, 2011

How to Avoid Fake Check Scams

Here are five things you should know to avoid fake check scams:

   1. If someone sends by you checking or money order and asks, that you send money somewhere in the return, then it' a shady transaction A.S. This is isn't as the legitimate operators of sweepstakes or other companies work. If you' d actually won, you' the tax of pay d immediately to Uncle Sam. Legitimate works also of don' the buyer of secret or of chief accountant;includes wiring money.

   2. A trusted mark or a company name is no guarantee of legitimacy. The swindlers claim frequently companies well-known of be for people' to reach; s trust. Find company' s the contact information, or online or by means of folder aid, and verified the information before you pass something else.

   3. The check or the money order can false be even if your bank or credit union you have the cash late. YOU can your money rapidly, usually within one up to two days, but your bank or credit union won' to get; t weet or it' S.A. rubber control or money order up to it' s processes, that can demand weeks. By the time that the fraud has been discovered, the swindlers have taken money already your and looppas.

   4. When the bad check or the money order plays at marbles, you' ll are your bank or credit union the money chargeable. Since you' re is in the best position know or the person whom you the control sent is reliable, you' ll are left the keeping pocket if he or they isn' t. if you refuse pay, your account is able be frozen or closed. YOU could be also even continued with fraud and charged.

   5. Sending money that the service of the wire transfer has been used as sending cash - once swindler pockets it, it' s gone for good. The transfers aren' of the wire; t such as controls which can be stopped or creditcardlasten which can be disputed. But as the money hasn' t improved, you can the operation are able cancel. Contact immediately the service of the money transfer as you you' thinks; ve scammed.

Phishing Email Safety Tips

Phishing e-mails, websites and phone calls are designed to steal money. Cyber ​​criminals can do this by installing malicious software on your computer or steal personal data from your computer.

Cyber criminals also use social engineering to convince you to malicious software or hand over your personal information under false pretenses to install. They can e-mail, call you on the phone, or convince you to something like a website download.

We all have received phishing messages. They are mixed with the hundreds of emails many of our daily process. Processing time email takes time and it's a job that we can rush through, but it is essential that we rather think that responding to email and be absolutely sure that the sender of the email are legitimate.

As you process your email, remember…

   1. Never click through to a website that claims it needs you to verify your password.
   2. Be suspicious of any email requesting your password or sensitive information. Reputable companies will not randomly email you asking for sensitive information.
   3. If you receive an email from a company and you’re not sure if it’s legitimate, do not follow the link in the website, instead go directly to the website you know to be real or call the company to inquire about the request.

Tuesday, June 21, 2011

Watch out for the things before you leap

Things to Every new day brings its delivery of electronic mails. Much people are undergoing an increase of the messages that contain the content that seems to be

* too good for being truth; rule #1 of or -- If it seems too good for being truth… IT IS probably!

* on the strange people or events that are something;

* warnings on the things that COULD happen to their computer unless you take measures to prevent them;

* histories on the things that " all know to be true" ,… unless by all means it is not truth!

How many of the resource where the file it takes the thorough necessary measures of your computer in deletion or takes, or changes constitution before, in 37 of your close friend E-mail message, is frequently before you and can utilize that " In order to try the fact that it decides, inspecting it is wise, but copy; facts" . [Namely, don' It crosses t with the virus, or does not investigate and it does not become the part of problem by drawing up many hysteria, -- It can take, or either one 2 minutes a little.