Showing posts with label fraud. Show all posts
Showing posts with label fraud. Show all posts

Preventing Online Fraud


Nowadays, there are a lot of scams aiming at users of the online banking facility. There are several services which offer protection from identity thieves such as LifeLock. However, many identity thieves don't want to simply steal your identity information. They don't want to just take advantage of the good credit history by stealing your checking account. Instead, they want to steal your money. Many banks have take precautions on these cyber criminals by offering various types of online protection services. As an end-user, you have the most responsibility to protect your financial information. You must not solely rely on the bank to protect your financial information. You must take the initiative to look out for fraudsters on the internet. There are two common types of online frauds including keylogging and phishing. Phishing involves installing malware onto the computer while keylogging uses software to capture the keystroke you type onto the keyboard. Both methods will steal the login credentials of the end-user.

Keylogger software, also known as Trojan software is designed to be automatically installed in the user's computer through a virus. Keylogging software is dangerous because the fraudster will know every single word you type into the fields of the online banking login form. With the keylogging software, they can steal all your personal information such as account number, user ID, password and etc. To avoid becoming the victim of keylogging software, you can install the antivirus software on your computer. The antivirus software can detect and inform you about the Trojan software that is operating in the background. Once you detect the antivirus software, you can delete it. There are both free and commercial versions of the keylogger software. The commercial version of the keylogger software is better because it is equipped with a full range of features. You should constantly update your security patch.

In phishing, the internet fraudsters will attempt to request for personal information through email. Usually, the email will state the intention on doing business. The email will look as if it is from an important organization. The email will have similar appearance as the organization's email. The email will ask you to click on a link that redirect you to the login form and update the personal information in the online banking account. Normally, the link will lead to a different website that looks exactly like the bank website. No matter what email you receives, be sure not to click on the link in the email. If you click on the link in the email and type in your login information, they will be able to track your identity information. They can use the login information to access your online banking account. You must pay attention to the URL of the link. Some financial institutions will use watermarks. If you don't see the watermark at the login page, it is advised that you don't login. If you receive a phishing email, you must report it to your financial institution.

If you are not sure whether the request is valid, you can manually type in the web address of the URL listed in the phishing email. To protect yourself from online fraud, you must change the password frequently. You should change the password to your banking account every 6 months. You should never reveal the ID or password to your online banking account. You should not reveal the login credentials to other people. It is important that you only sign up with a financial institution that provides two factor authentications. When accessing the online banking account via a wireless network, you must make sure it is secure.




About the Author: Billy Horner, is a professional writer for the financial industry. Permission to reprint this article is granted if the article is reproduced in its entirety, without modification, including all information. Please include a hyperlink to: Banco Trasatlantico which provides offshore banking and banking blog.




Auction Fraud is Most Reported Cyber Crime, According to IC3


It seems that auction fraud is the new black in the land of cyber crime. According to its website, the Internet Crime Complaint Center (IC3) has recently received a large number of calls reporting fraud involving international automobile auctions online. This particular fraud involves an online auction in which the "winner" pays via wired money for a vehicle that will supposedly be shipped from Europe. The money is wired, and the buyer waits in vain for a vehicle, which, predictably, never shows. Unfortunately, once the money is gone, there is little that can be done in the way of recovering it.

The IC3, a partnership of the FBI and the National White Collar Crime Center, this year released its yearly complaints report, which stated that reports of internet fraud made up 62 percent of crime complaints received, crowning it with the dubious title of most commonly reported cyber crime. Other top complaints include undelivered merchandise or payment, credit and debit fraud, and check, investment, computer, and confidence fraud.

According to IC3, buyers in the United States planning to purchase online a vehicle that is located outside of the United States should exercise caution and thoroughly research any potential sellers or auction houses for legitimacy. Buyers should be aware of the risk of what are known as "second chance auctions," wherein a buyer who lost an "auction" is contacted and told that they may buy the item they bid on at a discount rate, due to the original auction winner defaulting on payment. Buyers should also beware of any monetary transfers requested that don't involve an established and trustworthy method, such as an escrow service.

The IC3 recommends observing the guidelines below to avoid being duped into an online fraud scam:


Educate yourself. Research how the auction works, what your obligations are as a buyer, and what the seller's obligations are before you bid.
Research the seller, especially if the only information you have is an e-mail address. If it is a business, check the Better Business Bureau where the seller/business is located. If you can't find any information, do not place a bid.
Research any feedback from past customers.
Determine the method of payment and where the seller is requesting it be sent.
Be aware that a problem with an international auction transaction may be much more difficult to resolve because of the difference in laws.
Find out the seller's policies on problems, warranties, delivery times, exchanges, and defective merchandise.
Avoid surprise charges by finding out if shipping and delivery are included in the auction price or are charged as separate costs.
Do not give your social security number or drivers license number to the seller. No reputable auction house has any use for them.

One issue that makes an online auction a prime spot for fraudulent exchange is that users can easily be mislead or become confused about the responsibility of the site in question. Some people don't realize that a site such as eBay does not sell the items up for auction; what eBay does is provide a forum for sellers to hock their own goods. Most online auction sites will not reimburse a buyer's losses, and emphasize the importance of using caution when engaging in online commerce.

eBay's Trust and Safety policy states that the site has put in place a safety team dedicated to keeping their "marketplace a safe, well-lit place for people around the world to trade with one other." The site features a number of protection methods in place to benefit users:


Feedback - Users can rate each other, establishing marketplace reputations and acting as watchdogs for dishonest or unfair auction practices (defective merchandise, late payment, inordinately long shipping time, etc.)
Buyer Protection - eBay is set up so that users can pay for their merchandise in a fashion that offers more security than wired cash.
Fraudulent Web Site Protection - eBay offers users a toolbar that alerts users in the event they stumble upon a fraudulent site.
Security Center Features - eBay offers tips on practicing good marketplace habits, as well as information on reporting fraud or other online criminal activity.

Other ways to protect oneself in the world of online auctions include avoiding both buyers and sellers who seem suspicious:


If the seller claims to be located in the United States but wants the payment sent overseas or to someone else, beware. Also, if the seller claims he suddenly had to leave the country for whatever reason, don't conduct business until he is back in the country.
If the seller requests cash payment or wire transfer, do not send it. Using these services leaves virtually no paper trail and no way to recover the money in the event of fraud.
Avoid dealing with sellers who claim to be authorized dealers or factory representatives in countries where you know such positions don't exist.
Do not trust buyers request the merchandise be shipped using methods that avoid customs or taxes.

Sellers should be suspicious of any credit card purchases if the address of the cardholder does not match the shipping address, and be sure to receive the cardholder's authorization before shipping any products.

Users who suspect they may have been a victim of internet fraud are encouraged to contact the IC3 at http://www.ic3.gov/.




http://home.stopsign.com




Report: Combined Consumer Education and Increased Security Measures Equal Reduced Identity Fraud


While surfing the 'net, I came across a report about the reduction of identity theft and identity fraud. Obviously, it caught my attention. Following, in part, is that report which was produced by Javelin Strategy & Research, and co-sponsored by CheckFree Corporation, Visa Card, and Wells Fargo & Co.

While identity theft remains a multi-billion-dollar problem for businesses, organizations, and individuals, incidents of the fraud dropped significantly last year, according to a report.

Identity fraud occurring in the United States declined in 2006 by 12 percent over the year before, from $55.7 billion to $49.3 billion, according to the third-annual survey by Javelin Strategy & Research. The survey, which involved 5,000 telephone interviews, estimated the number of victims dropped for the fourth consecutive year by about 500,000 to 8.4 million persons.

Researchers attributed the decline to better consumer education and awareness and increased use of online banking and financial sites that allow closer monitoring of accounts. "Businesses are doing a lot more, law enforcement is doing more, and so are consumers," said James Van Dyke, president of Javelin, a research company in Pleasanton, Calif., specializing in financial services and payments.

Tena Friery, research director at the Privacy Rights Clearinghouse, a nonprofit consumer organization in San Diego, said she was surprised by the size of the decline but said there is much greater public awareness. "We still have a long way to go," she said.

According to the report, there was a significant reduction in fraudulent new-account openings, traditionally one of the most common kinds of fraud. It occurs when a criminal uses a victim's personal data to open a new account.

The survey also found that it takes on average less time and expense to resolve a fraud case than last year. When fraudulent accounts are opened, the average fraud amounts dropped from more than $10,000 in 2005 to $7,260 in 2006. Resolution times dropped from an average of 25 hours in 2005 to five hours in 2006.

Van Dyke said one reason the numbers are down is that businesses are "screening account applicants much more closely."

Individuals and consumer groups have long argued that extra screening was needed because conflicting application information, such as two addresses, could indicate identity fraud.

One group that isn't doing better, according to the report, is 18- to 24-year olds. This age group was more likely to become a victim of identity theft than other age groups. (See sure to read my related article, Your Child's First Year at College: Prime Target for Identity Theft?).

The report references offline criminal activities; however, I do believe that incidents of identity theft have remained unchanged online. One example is stated above, with cybercriminals targeting recent high school graduates and college freshmen. Unfortunate victims, these graduates and college freshmen provide extremely lucrative opportunities for the cybercriminals to obtain their personal information. Even before they start their first careers, these graduates and college students will, most likely, be crippled by identity theft.

To protect yourself, you need an internet security team of experts making sure that you, your family, and your business computer are always safe and secure. The best protection you can have in today's rapidly changing world of cyber-attacks is to have expert support for all your Internet security needs that will provide technical support without any hassles and without charging you extra fees. It will become even more critical than it is today as time goes on. You need to find your own personal team of experts to rely on. If you ever have a security problem, you will want to have a trusted expert you can call for professional help, without any hassles and extra costs!

Because cybercriminals are becoming smarter and more sophisticated in their operations, they are real threats to your personal security and privacy. Your money, your computer, your family, and your business are all at risk.

These cybercriminals leave you with three choices:

1. Do nothing and hope their attacks, risks, and threats don't occur on your computer.

2. Do research and get training to protect yourself, your family, and your business.

3. Get professional help to lockdown your system from all their attacks, risks, and threats.

Remember: When you say "No!" to hackers and spyware, everyone wins! When you don't, we all lose!

� MMVII, Etienne A. Gibbs, MSW, The Internet Safety Advocate and Educator




Etienne A. Gibbs, Independent Internet Security Advocate and Educator , consults with individuals, small business owners, and home-business entrepreneurs regarding online protection against spyware, viruses, malware, hackers, and other pc-disabling cybercrimes. For more information, visit http://www.SayNotoHackersandSpyware.com/.




Activity Internet 0nline Marketing Information, Computer, Fraud Tips


NETWORKING

You didn't learn it at school, or at the office. Would you believe your mother?

Networking is more then shaking hands, and giving out business cards. Forget about the endless networking skills you may have learned at the office. We just have to put the few lessons mother taught us into practice. As a kid we were always in a hurry to find something better. Our mothers taught us patience.

If your in a hurry you miss the value that can be built taking time with building relations in networking. Establishing a relationship by taking time, gives you a solid framework in networking building.

Your mother worked hard as an example. This is one of the better examples in networking she gave you. That's why it is called networking, not sit work. For networking to be successful you have to work hard and put out the effort.

Remember her telling you to share your things with others? Some of our best resources are time, money, and information we are willing to give to the relationship. They appreciate us when we are willing to give to the relationship.

She always made you clean up after yourself. In networking, follow-up is required. Whether it's a promise to meet someone, or just a thank you is one of the most important lessons of networking. These life lessons we learned from mother during childhood are a solid basis's for strong networking skills.

Thank you mother for all your help.

The biggest time spend in selling, more so in mail order or on the Internet is developing a relationship with your customer and building trust. If you did a good job in the first two, closing a sale will take the smallest of your time spend with your customer.

CARD TRANSACTIONS REPORT TO IRS

Starting in 2011, banks or other companies that process credit cards must report the amount of the payments a merchant receives on card transactions to the IRS. The law will not apply to merchants doing less than 200 transactions totalling less than $20,000.

SCREENSAVERS

If you are looking for something different remember windows has a great choice. Don't unload any free ones from anywhere, could have bugs, and almost impossible to delete.

For windows screen savers, right click on a blank area of desktop. Click "properties", "screen savers". Click the arrow to the right of "screen savers" just below the monitor. Pick the one you want.

For the best information for your site or to check your competitors for persons who use Google AdWords, try out the Google AdWords Keyword Tool.

Just enter keyword and choose from four possible data display types.

https://adwords.google.com/select/KeywordToolExternal

ADVANCED NEWS SEARCHES

A new offering from Google - Advanced News Search, allows visitors to scour headlines by date, location, exact phrases or publication. People can use it retrieve articles from more than 4,500 news outlets publishing on the Web.

WEB PAGE TRANSLATION

This feature is particularly helpful if your search has non-English results. Google offers a facility to auto-martially translate a page for you in English. Currently, Google supports Italian, French, Spanish, German, and Portuguese languages.

LIGHTSIDE

A GOOD NIGHT'S SLEEP

All the rooms were taken when the soldier got into town. After pleading with the desk clerk, the clerk remarked. "Well, I do have a double room with only one occupant, but to tell you the truth he snores so loudly that people in adjoining room have complained. I am not sure it would be worth it to you". "No problem." The tired army guy assured him, "I will take it'.

When he came down for breakfast the next morning the clerk asked, "How did you sleep?" "Never better", replied the soldier. The desk clerk was impressed. "No problem with the other guy snoring", the clerk asked?" "No I shut him up in no time", explained the soldier. "How did you manage that?" asked the clerk.

"Well, he was already in bed, snoring away, when I walked into the room, so I gave him a kiss on the cheek", explained the soldier". "Then, I whispered in his ear Good night beautiful, and he sat up all night watching me.

COMPUTER WARNING

The tip on unplugging your computer from the wall outlet during a thunderstorm was sound advice. And we're coming to the season when thunderstorms become more frequent. But let's take that advice one small step further. Take the time to also unplug your modem from the telephone line! Surges can also pass through the telephone lines and even a small surge of static electricity can fry the delicate circuitry in your modem.

Your Clipboard can be seen by any hacker. For your protection you should not copy passwords, credit card numbers or other sensitive information. To prevent this from happening go to: Internet Explorer: Click Tools, Internet Options, Security tab, Internet section. Go down to the Security level box, and click the Custom Level button. Scroll down to Scripting, and find the entry, "Allow Programmatic clipboard access" or "Allow paste operations via script".

Click Disable or Prompt. Click OK.

The American Federal Bureau of Investigation (FBI) is warning that hitman scam is back in a big way. The hacker behind it is sending out a flood of emails threatening to kill the recipient if he does not receive several thousand dollars.

This scam first popped up in December 2006, then again this last February. Some personal info is included in the emails, to make it look like the crook knows all about you.

The FBI advises that you just ignore the email. Report it to the Internet Crime Complaint Center.

ONLINE RENTAL FRAUD

June, August, September, January are competitive months for rental suites.

There are a lot of fraudulence ads being placed free on Craigslist etc. Crooks ply on the shortage of apartments by placing ads on these sites. When someone answers they are informed owner had to go out of the country for a funeral or what ever. They had no one that they could have left the keys with so the apartment could be checked.

Now comes the kicker. If you're interested in renting the apartment, send $900.00 as damage deposit, and $1200.00 for the first month's rent and the key would be courier to them.

There is a limited supply of apartments on the market, so this is a huge target for scammers.

Don't fall for this scam. People need to do their homework, physically see the apartment, talk to the owners' and have a written contract.

WARNING, CAR JACKERS IN MALL

CST. Eric Doran #656 Chatham - Kent Police Court Services

Here's the latest tactic by car thieves.

Heads up everyone! Please keep this circulating. You walk across the parking lot, unlock your car and get inside. You start the engine and shift into reverse when you look into the rear-view mirror to back out of your parking space. You notice a piece of paper stuck to the middle of the rear window. So, you shift into Park, unlock your doors and jump out of your car to remove that paper (or whatever it is) that is obstructing your view.

When you reach the back of your car, that is when the car jackers appear out of nowhere, jumps into your car and take off. They practically mow you down as they speed off in your car. And guess what, ladies? I bet your purse is still in the car. So now the carjacker has your car, your home address, your money, and your keys. Your home and your whole identity are now compromised!

Men, you too are at risk. You can say good bye to your briefcase, and if your like many guys, who keep their wallet in the glove compartment, with your driver's licence, credit cards, plus.

If you see a piece of paper stuck to your back window, just drive away, remove the paper later and be thankful that you read this e-mail. I hope you will forward this to friends and family, especially to women. A purse contains all kinds of personal information and identification documents, and you certainly do NOT want this to fall into the wrong hands.

Phishing still catches millions of persons who give out their personal information, believing the e-mail they received was from a bank, PayPal, taxation branch, or some other Government

Department. Further, instead of typing in the URL supplied by the Phisher they just clink on it. Just because the URL has the proper heading doesn't mean it is going to a legit URL. In phishing they have it redirected if you click on the URL and they get your personal information.

We trust our Government to safeguard the information we give them. But did you know that the government is among the biggest sources of ID leaks and that penalties for ID theft are rarely imposed on those who are negligent.

For more information on how to protect your computer and ID theft check out the website below.

NEW WEBSITE FIGHTING CRIME

The B.C. Crime Prevention Association has just launch a new website last week. Originally set up to support law enforcement, now available to everyone.

Information on cyber bulling, resource guides, blogs, printed materials including copyright law, staking, fraud awareness, I.D.theft, senior safety, and crime-proofing property.

Check out: http://www.bccpa.org/library

PROTECT YOURSELF AND YOUR COMPUTER TOO.

Internet Explorer sorts web sites for you, Internet, local Internet, trusted sites, restricted sites.

If you don't see the slider in any zone, click the default button. For restricted sites zones, I would suggest the slider to be at the very top, on high. It is the safest way to browse. It also is the most restricted. But with all the sites that could have harmful content that may damage your computer, necessary.

Don't forget to click OK to exit.

COMPUTER SECURITY TERMS

Adware is software that causes advertising to pop up on your computer display; without your permission.

Malware is malicious software that includes viruses, spyware, and other types of harmful programs.

Badware is adware or spyware that tracks your online activities and provides that information to others without your knowledge.

Spyware is software that's installed on your PC via downloaded programs. It transmits data to others about your business, behaviour on line.

A virus is typically a small, malicious program that can infect programs and replicate itself.

Spam, Virus, Spyware, Phishing, is still big headaches for people online.

Consumers have lost over $9 billion; more then 3 million computers have had to be replaced because of viruses.

DROP SHIP, WHOLESALE

SaleHoo makes importing easy. SaleHoo is a leading directory of drop ship, wholesale, liquidation and manufacturing distributors, and presents a constant and reliable supply of wanted items. Start your importing adventure with SaleHoo, and then spread your wings over the world.

ADVANCED NEWS SEARCHES

A new offering from Google - Advanced News Search, allows visitors to scour headlines by date, location, exact phrases or publication. People can use it retrieve articles from more than 4,500 news outlets publishing on the Web.

WEB PAGE TRANSLATION

This feature is particularly helpful if your search has non-English results. Google offers a facility to auto-martially translate a page for you in English. Currently, Google supports Italian, French, Spanish, German, and Portuguese languages.

Learn and Earn. Good luck.




What the Fraud! Part 3


Linda: It depends, you can be safe banking and bill paying online if you know how; failing to act appropriately can significantly increase your risks when banking online. Many of the precautions needed here are the same as we've already discussed. Learn to minimize your two risk areas - your personal computing environment, and gaps in your internet safety skills - to use online transaction services safely.

Remove risks in your computing environment. Ask yourself:

Is the computer you are using secure? You must have up-to-date security software, which means antivirus and anti-spyware protection.

Is your connection secure? Make sure the firewall is on. If you use a wireless network, it needs to be encrypted so someone outside the house can't collect your information.

Do you have a secure password? Weak passwords are bypassed in a matter of minutes. You might as well use a strip of scotch tape to lock your front door.

Your biggest threat, once you have secured your computer, is through your own actions online. Cyber-criminals are masters in fooling unsuspecting consumers into exposing themselves to risks. Financial criminals use a thousand ploys, but each ploy has the same key elements. They need to know who you are, where you transact business, and how to access your account(s). So don't give them this information.

Don't assume, require proof. A classic method for swindling is to use what appears to be one piece of information to collect more. For example, a scammer sends out a fake email pretending its from a bank notifying recipients that they need to re-enter their account information. Some percentage of recipients will make one or more of the following assumptions.

That the sender knows them

That the sender knows where they bank

That the sender is the bank

That there is in fact a problem with their account

None of these statements is true. But criminals count on a certain percentage of recipients to assume these inferred connections are true. Those that fall for the assumptions in reality provide the criminal with all three critical pieces of data. By responding, they confirm who they are, where they transact business, and provide their credentials to 'fix' the problem.

Don't misplace trust. Identifying the trustworthiness - or lack of trustworthiness - of the people, email, Websites, content, and businesses you interact with is a critical life skill in any environment - trust the wrong entity and you can loose your life savings.

Steer don't be pulled. Stay in the driver's seat and get to websites on your own by searching, don't be pulled by links that may or may not be legitimate.

Protect personal information. Though it is relatively rare that email is intercepted, never share passwords, social security numbers, credit card information, and the like. What you post online is another potential 'leak-point', protect personal and financial information everywhere.

Learn to spot scams. Don't respond to any e-mail requesting that personal or account information. That "urgent" message may look like it's from your bank, but it's bogus. A financial institution would never send you an e-mail asking for your personal information, PIN or password. Never!

If you do all of the above, you have a reasonably strong chance of having only positive experiences. For the record, I use online banking services.

By Jessica Walker

Until next time, here's to keeping you Safer in the City!

- Jessica




About Jessica Walker~"Safer in the City" columnist I was very excited when asked to write a column for http://www.saferdates.com/ I've been influenced by safety and self-defense pretty much my whole life. While other girls were making macaroni necklaces in Girl Scouts, I was sparring with boys, breaking boards and doing knuckle push-ups on cement in Tae Kwon Do class. Read my column at [http://saferdates.com/blog/] to learn more.




Auction Fraud is Most Reported Cyber Crime, According to IC3


It seems that auction fraud is the new black in the land of cyber crime. According to its website, the Internet Crime Complaint Center (IC3) has recently received a large number of calls reporting fraud involving international automobile auctions online. This particular fraud involves an online auction in which the "winner" pays via wired money for a vehicle that will supposedly be shipped from Europe. The money is wired, and the buyer waits in vain for a vehicle, which, predictably, never shows. Unfortunately, once the money is gone, there is little that can be done in the way of recovering it.

The IC3, a partnership of the FBI and the National White Collar Crime Center, this year released its yearly complaints report, which stated that reports of internet fraud made up 62 percent of crime complaints received, crowning it with the dubious title of most commonly reported cyber crime. Other top complaints include undelivered merchandise or payment, credit and debit fraud, and check, investment, computer, and confidence fraud.

According to IC3, buyers in the United States planning to purchase online a vehicle that is located outside of the United States should exercise caution and thoroughly research any potential sellers or auction houses for legitimacy. Buyers should be aware of the risk of what are known as "second chance auctions," wherein a buyer who lost an "auction" is contacted and told that they may buy the item they bid on at a discount rate, due to the original auction winner defaulting on payment. Buyers should also beware of any monetary transfers requested that don't involve an established and trustworthy method, such as an escrow service.

The IC3 recommends observing the guidelines below to avoid being duped into an online fraud scam:


Educate yourself. Research how the auction works, what your obligations are as a buyer, and what the seller's obligations are before you bid.
Research the seller, especially if the only information you have is an e-mail address. If it is a business, check the Better Business Bureau where the seller/business is located. If you can't find any information, do not place a bid.
Research any feedback from past customers.
Determine the method of payment and where the seller is requesting it be sent.
Be aware that a problem with an international auction transaction may be much more difficult to resolve because of the difference in laws.
Find out the seller's policies on problems, warranties, delivery times, exchanges, and defective merchandise.
Avoid surprise charges by finding out if shipping and delivery are included in the auction price or are charged as separate costs.
Do not give your social security number or drivers license number to the seller. No reputable auction house has any use for them.

One issue that makes an online auction a prime spot for fraudulent exchange is that users can easily be mislead or become confused about the responsibility of the site in question. Some people don't realize that a site such as eBay does not sell the items up for auction; what eBay does is provide a forum for sellers to hock their own goods. Most online auction sites will not reimburse a buyer's losses, and emphasize the importance of using caution when engaging in online commerce.

eBay's Trust and Safety policy states that the site has put in place a safety team dedicated to keeping their "marketplace a safe, well-lit place for people around the world to trade with one other." The site features a number of protection methods in place to benefit users:


Feedback - Users can rate each other, establishing marketplace reputations and acting as watchdogs for dishonest or unfair auction practices (defective merchandise, late payment, inordinately long shipping time, etc.)
Buyer Protection - eBay is set up so that users can pay for their merchandise in a fashion that offers more security than wired cash.
Fraudulent Web Site Protection - eBay offers users a toolbar that alerts users in the event they stumble upon a fraudulent site.
Security Center Features - eBay offers tips on practicing good marketplace habits, as well as information on reporting fraud or other online criminal activity.

Other ways to protect oneself in the world of online auctions include avoiding both buyers and sellers who seem suspicious:


If the seller claims to be located in the United States but wants the payment sent overseas or to someone else, beware. Also, if the seller claims he suddenly had to leave the country for whatever reason, don't conduct business until he is back in the country.
If the seller requests cash payment or wire transfer, do not send it. Using these services leaves virtually no paper trail and no way to recover the money in the event of fraud.
Avoid dealing with sellers who claim to be authorized dealers or factory representatives in countries where you know such positions don't exist.
Do not trust buyers request the merchandise be shipped using methods that avoid customs or taxes.

Sellers should be suspicious of any credit card purchases if the address of the cardholder does not match the shipping address, and be sure to receive the cardholder's authorization before shipping any products.

Users who suspect they may have been a victim of internet fraud are encouraged to contact the IC3 at http://www.ic3.gov/.




http://home.stopsign.com




What the Fraud! Part 3


Linda: It depends, you can be safe banking and bill paying online if you know how; failing to act appropriately can significantly increase your risks when banking online. Many of the precautions needed here are the same as we've already discussed. Learn to minimize your two risk areas - your personal computing environment, and gaps in your internet safety skills - to use online transaction services safely.

Remove risks in your computing environment. Ask yourself:

Is the computer you are using secure? You must have up-to-date security software, which means antivirus and anti-spyware protection.

Is your connection secure? Make sure the firewall is on. If you use a wireless network, it needs to be encrypted so someone outside the house can't collect your information.

Do you have a secure password? Weak passwords are bypassed in a matter of minutes. You might as well use a strip of scotch tape to lock your front door.

Your biggest threat, once you have secured your computer, is through your own actions online. Cyber-criminals are masters in fooling unsuspecting consumers into exposing themselves to risks. Financial criminals use a thousand ploys, but each ploy has the same key elements. They need to know who you are, where you transact business, and how to access your account(s). So don't give them this information.

Don't assume, require proof. A classic method for swindling is to use what appears to be one piece of information to collect more. For example, a scammer sends out a fake email pretending its from a bank notifying recipients that they need to re-enter their account information. Some percentage of recipients will make one or more of the following assumptions.

That the sender knows them

That the sender knows where they bank

That the sender is the bank

That there is in fact a problem with their account

None of these statements is true. But criminals count on a certain percentage of recipients to assume these inferred connections are true. Those that fall for the assumptions in reality provide the criminal with all three critical pieces of data. By responding, they confirm who they are, where they transact business, and provide their credentials to 'fix' the problem.

Don't misplace trust. Identifying the trustworthiness - or lack of trustworthiness - of the people, email, Websites, content, and businesses you interact with is a critical life skill in any environment - trust the wrong entity and you can loose your life savings.

Steer don't be pulled. Stay in the driver's seat and get to websites on your own by searching, don't be pulled by links that may or may not be legitimate.

Protect personal information. Though it is relatively rare that email is intercepted, never share passwords, social security numbers, credit card information, and the like. What you post online is another potential 'leak-point', protect personal and financial information everywhere.

Learn to spot scams. Don't respond to any e-mail requesting that personal or account information. That "urgent" message may look like it's from your bank, but it's bogus. A financial institution would never send you an e-mail asking for your personal information, PIN or password. Never!

If you do all of the above, you have a reasonably strong chance of having only positive experiences. For the record, I use online banking services.

By Jessica Walker

Until next time, here's to keeping you Safer in the City!

- Jessica




About Jessica Walker~"Safer in the City" columnist I was very excited when asked to write a column for http://www.saferdates.com/ I've been influenced by safety and self-defense pretty much my whole life. While other girls were making macaroni necklaces in Girl Scouts, I was sparring with boys, breaking boards and doing knuckle push-ups on cement in Tae Kwon Do class. Read my column at [http://saferdates.com/blog/] to learn more.




 
Support : Creating Website | Johny Template | Mas Template
Copyright © 2011. Information Computer and Technology - All Rights Reserved
Template Modify by Creating Website
Proudly powered by Blogger