L O C A L
 
  GoTo... the WEB section!WEB GoTo... the LOCAL section!LOCAL GoTo... the NEWS section!NEWS GoTo... the IMAGE section!IMAGES GoTo... the VIDEO section!VIDEO GoTo... the AUDIO section!AUDIO GoTo... the PRODUCTS section!PRODUCTS  
 Search Tool > Local Links > Online Security > Scams
GoTo... Local Links
 
  Image Image
ALL YOU NEED TO KNOW ABOUT TRYING TO BE
  Go Back... BACK  
SECURE ONLINE.
THIS ARTICLE
Online Security
All about Spyware
All about Viruses
All about Firewalls
All about Scams
 
RELATED LINKS
Pop-up windows
Browser Hijacks
Trojans
Virus Alerts
 
RECOMMENDED READS
Opens a NewWindow Article on Spyware in PCAnswers magazine
Opens a NewWindow Article on PC defence by the MicroMart mag
GoTo...
Safely download software to cover your online security...
AntiSpyware
Pop-up Blocker
AntiVirus
Firewall

Unsure about downloads?
 
Download.com logo
Goto... Download.com
Goto... Download.com
 
SCAMS


On this page...
  • Identity Fraud
  • Phishing e-mails
  • Phishing Filters
  • Other e-mail scams
  • Do's & Dont's
   



Scams have been around for years. History shows that scams flourish with the advent of any new form of communication and the internet is no exception. Some will be new scams made possible by the very nature of the internet but most will be old scams with a little revamping.

There's no anti-scam software that you can install, it's all down to your own awareness but with the proliferation of phishing... see below... 'Phishing Filters' are appearing, as in Internet Explorer 7.



Identity Fraud

Identity fraud is so prolific that the UK police now refer aggrieved victims to their bank, and it's the bank who decides whether to involve the police. Now, that may be a political master stroke, so far as crime figures are concerned but if thoughts of 'creeks' and 'paddles' don't spring to mind, then you're in for a shock.

Banks are businesses and their priority is to recover their losses. They don't give two hoots as too whether anyone is arrested for the crime. They see it as a golden opportunity to sell you a £6.50 per month insurance against identity theft. Need that paddle yet?


PUBLISHED: Mar/2006

UPDATED: Jun/2007
 
GET QUICK INFO ABOUT
 
Click to Reveal/Hide data!  ADWARE
Programs that are installed on your computer with or without your knowledge, intending to deliver adverts to your desktop. More»
 
Click to Reveal/Hide data!  BROWSER HIJACKERS
Malware that covertly installs itself onto your system and changes your web browser settings. You aquire a new StartPage or HomePage that seems impossible to get rid of. More»
 
Click to Reveal/Hide data!  COOKIES
Cookies are small text files that some web sites place in your computer to remind your browser of specific information. For example, they might store your preferences for content so pages can be personalised for you. Have you ever gone back to an online store and found a couple of items that you chose, still at the check out, well that's achieved by a cookie. The vast amount of cookies are designed to enhance your visit to a site. Some sites use session cookies that are deleted when you exit your browser, while others place persistent cookies, which stay on your hard drive for long periods. All good sites outline their policy on cookies, usually within their privacy statement.
 
Click to Reveal/Hide data!  DIALERS
Malware that covertly installs itself onto your system and changes your internet dial-up settings to a Premium Rate number. You may not discover the breach until you query your excessive phone bill. Dialers are NOT a problem if you have a broadband connection.
 
Click to Reveal/Hide data!  FIREWALLS
Designed to prevent unauthorised access to or from a computer or a network. Usually software based but can be hardware based within a network router or a Broadband modem. More»
 
Click to Reveal/Hide data!  HACKERS
Users that spend time attempting to breach online security systems. Some do it just for the devilment whilst others have pure criminal intent. A Firewall helps to stop Hackers entering your system when you are online.
 
Click to Reveal/Hide data!  KEYLOGGERS
Malware that captures all keystrokes made by you and monitors for your bank and card details. It usually has the ability to transmit the captured information to interested parties either via a network connection or email. Your personal data is then used in fraudulent activity. More»
 
Click to Reveal/Hide data!  MALWARE
A generic term becoming popular to describe any form of malicious software. Sometimes referred to as rogue programs, they're the bad side of Spyware. More»
 
Click to Reveal/Hide data!  ONLINE SECURITY
A term that covers all the issues on this list. Whether it's the theft of your personal details, virus riddled emails or invading your privacy.
 
Click to Reveal/Hide data!  PHISHING
Pronounced 'fishing'. Not Spyware or a Virus but a type of scam. It's when fraudsters attempt to obtain your personal information, usually your bank details by duping you into entering your details into either a dummy web site, replying to a false email or even by a phone call to your home. The sites and emails are very convincing and appear genuine, even to the trained eye but give themselves away by the very nature of what they are requesting you to do. More»
 
Click to Reveal/Hide data!  POP-UPs
A new browser window that appears on top of your current window, smaller than normal and containing either information or an advert. You really need to take the time to know how useful and how dangerous they can be. More»
 
Click to Reveal/Hide data!  RATs
Remote Access Trojans. See Trojans below.
 
Click to Reveal/Hide data!  SPYWARE
A generic term for programs that are installed on your computer without your knowledge with the intent of gathering information about you, whether for commercial or criminal reasons. More»
 
Click to Reveal/Hide data!  TROJANS
Also known as Trojan Horses or RATs (Remote Access Trojans) it's a way of delivering Spyware onto your system. The malicious code is hidden within a seemingly harmless program. Trojans are often used to infect you with Keyloggers or Dialers. A favourite with Hackers to allow them to open a backdoor to your system. More»
 
Click to Reveal/Hide data!  VIRUSES
A small program designed to make copies of itself over and over again. The effects of a virus can range from harmless messages to the destruction of data and can be exucuted at any given time and date. Seev this page for more info.
 
Click to Reveal/Hide data!  WORMS
Very similar to viruses in their replication but exploit a users email system to send themselves around the world.
 
 
 
Download.com logo
Goto... Download.com
Goto... Download.com
 
GRISOFT logo
Goto... Download.com
Goto... Download.com
 
Zone Labs logo
Goto... Zone Labs
 
THIS ARTICLE
Online Security
All about Spyware
All about Viruses
All about Firewalls
All about Scams

Until recently most identity fraud involved an unsuspecting retailer being duped into supplying goods in your name, everyone accepted that you haven't had the goods and the banks quickly recover their losses from the retailer, so you don't loose any money. But as retailers become more vigilant the fraudsters are having to turn to other methods of making money from your name. When you find a £250 debit from your account that's for an online bet with a gambling site that's untraceable then there's no retailer for the bank to recover their losses from... sorry your losses. It's your loss because the bank will insist that it was only possible as a result of your lack of security. If you've any doubt that this could happen, ask any retailer who accepts debit/credit cards.

Be under no illusion... if the banks can't recover the losses from a retailer then they will try every trick in the book to make you responsible and if you think the insurance they sold you from the last incident will cover you, then you really do need a paddle.

There's little doubt that
the internet provides a huge opportunity for scams and you must always be on your guard. A good example of how even someone from one of the more intelligent sections of our society was duped into giving out his details, not via the internet but the internet was undoubtedly used by the criminals to get fast and accurate information on the victim. It's worth reading and a warning to us all... click here!


It's important to remember that all legitimate companies that use online profiles or hold bank information will never ask for your details - it just doesn't happen. They will never e-mail requesting your details nor will they telephone or write to you, asking you to go online to fill in your details. Thoroughly read the Do's & Dont's section at the bottom of this page.



Fraud E-mails (Phishing)

Phishing (pronounced Fishing) is used to commit identity theft. It's a means of getting your bank and credit card details or any other accounts you may have. Phishing has been going on for years, well before the internet was born, it just took the internet to give it a name. Rummaging in the dustbins of banks is hard work when with just the click of a key a scammer can send millions of e-mails posing to be from a legitimate company like an Internet Bank or an online auction site. The correspondence usually asks the recipient to update their records or verify their usernames and passwords by clicking a link to a web site. These fake sites (which can be very accurate copies of the real thing) can collect all the information needed to steal your online, and in some cases your offline, identity.



Phishing Filters

Unique to IE7 is it's built-in phishing filter. This optional feature checks the authenticity of web addresses against a database in order to warn users of potential phishing websites. If you are using IE7 make sure your phishing filter is turned on... how?



Other e-mail scams

Here are some other common e-mail scams, all linked to Wikipedia for further information...
Advance Fee scam, or '419' scam/Nigerian scam
Employment Scam
Lottery scam



Do's & Dont's

Do read the claims made by any e-mail carefully, or any mail for that matter. If they seem suspicious, exaggerated or too good to be true, ignore them and delete or bin them.
Do ask if you are in any doubt. Even if an e-mail seems to be from your bank or another familiar company you use, it's safer to contact them to confirm they sent the e-mail, before submitting any details!
Do hang-up your telephone if any 0800 number that you have dialled informs you that some non-members may get charged for the call. Even if you've been informed that you are a member and it is free to you... hang-up.

Don't reply or click any links on a suspicious e-mail.
Don't ever provide your personal or financial information or username and password for any of your online accounts, to anyone.
Don't open or hastily respond to emails from unknown sources. Fraudsters play on the fact that many people tend to open emails by habit or curiosity. .



More information

You'll find more in-depth information about scams on Wikipedia.


  Go Back... BACK  
 Search Tool > Local Links > Online Security > Scams
  GoTo... the WEB section!WEB GoTo... the LOCAL section!LOCAL GoTo... the NEWS section!NEWS GoTo... the IMAGE section!IMAGES GoTo... the VIDEO section!VIDEO GoTo... the AUDIO section!AUDIO GoTo... the PRODUCTS section!PRODUCTS  
    ©2007 SteveBurgin