Security Information |
|
Online Cell Phone Scams and Spam
They're out there. Individuals trying to make a quick buck at your expense. You labour hours on end to produce quality content on your website only to get repetitive requests for huge numbers of product or promises for the greatest deals online. As a webmaster for a cell phone and PDA site, I've had my share of spam and scams come through, mostly via email, some posted on my forum. The purpose of this article is to provide a few methods of detecting spam and scams, and provide a few examples as well. Take a look over and protect yourself from online cellular fraud. Anybody catch the 60 minutes episode where Andy Rooney teaches faithful viewers how to detect junk mail? Junk email works in much the same way. Items with subject headings 'Great deal', or 'limited time offer' usually can wait, and definitely don't have great offers hidden inside. Webmasters and consumers should have a golden rule, if you don't know where an offer came from (you don't know the sender) then delete it. Plain and simple. Most free email accounts, GMAIL, Hotmail, Yahoo!, have good filters that label incoming spam and scams as, well, spam. However, the majority of webmasters do not use free email accounts for the sake of professionalism. To these individuals, a basic virus detector usually includes email protection and generally will detect possible spam items before they hit your box. Having said this, if you're doing link campaigns, or joining forums, etc., in order to promote your site, it may not be a bad idea to enlist the free online email account and prevent all the unwanted junk from hitting your work emails. It's been my experience that some people out there hand pick contact pages of potential victims, and therefore the email may be somewhat individualised to your site. Your name, the site name, or similar content, may be communicated within the email making it appear somewhat legitimate. Be mindful of your email accounts (contact pages) that are exposed to the world wide web. Some smart scammers have created bots that will automatically harvest emails that are sitting live on the web and input them into a spam list. Remember this when trying to determine whether something from the web is legit. If an questionable email has contact information, Google it. If it's a legitimate company contacting you, they should have some type of online presence. I've noticed that the majority of spam and scams have fake mail addresses, but no online address. Furthermore, emails usually come from online web accounts like Yahoo!. Not only can you search contact information, you can serach content as well. Chances are a webmaster has posted the contents on a forum somewhere wondering about its legitimacy. I can't stress this enough, take 4 seconds and doabout the email before you consider replying. With these simple and quick tips you should be able to identify the majority of scam and spam emails. If in doubt, delete. If something was important that you deleted, or legitimate, the individual will likely try to contact you again. With this in mind, here are some examples of spam and scam emails from the cellular and technology industry, my comments are in brackets. Subject: WE HAVE LOTS OF GSM/NEXTEL MOBILE PHONES AT VERY CHEAP PRICES'''''''' [The subject always varies.] PHONES SELLERS INCORPORATED Dear Sir/Ma, LETTER OF BUSINESS RELATIONSHIP Fola David [A variation of the above is instead of written body content, they will actually send a product list of the cell phones they require asking for a dozen of each. Sounds like great business!...Here's the next one] CONSOLIDATED PHONES LIMITED Dear sir, COMMERCIAL SALE OF BULK MOBILE PHONES WE ARE EXPORTERS AND IMPORTERS OF GSM, TDMA, AND CDMA PHONES. [CDMA Phones do not run the majority of African networks.] WE ARE ONE OF THE LEADING COMPANIES IN NIGERIAN COMMUNICATIONS SECTOR, AND WE GIVE OUT OUR BEST IN SATISFYING OUR NUMEROUS CUSTORMERS. WE SELL IN BULK AND AT A VERY CHEAP RATE. WE WILL LIKE TO USE THIS MEDIUM TO INTRODUCE TO YOU OUR VARIOUS PHONE BRANDS AND ACCESSORIES LISTED IN OUR PRICE LIST. THESE ITEMS ARE READY FOR SALE AND THE PRICE LIST IS AS GIVEN BELOW. WE WILL BE WAITING AND READY TO ASSIST YOU IN ANY INFORMATION REQUIRED BY YOU, AND ALSO, WE ARE READY TO DO BUSINESS WITH ANY COMPANY, INDIVIDUALS OR GROUP AS LONG AS THEY ARE NOT FRAUDULENT. [Of course you wouldn't.] WE WILL SEND OUR RANGE OF PRODUCTS AND PRICE LIST ON DEMAND. BEST REGARD. JULIAN JONES (MISS) But two examples of two spam/scam emails. Keep your eyes peeled webmasters! Barry Nagassar is owner and operator of DiscussWireless an online cell phone and PDA forum that provides the latest cell phone news, reviews, and cell phone fraud discussion. Included is a comprehensive compare and shop section for the latest cellular and PDA phones. Compare competitor prices in one location, or join the forum and post the latest review or service provider issue. Complete cell phone fraud forum included.
MORE RESOURCES: US State Department issues worldwide security alert due to potential for attacks on LGBTQ people and events KCCI Des Moines 'Blow the whistle': Indiana's top election official spends $35k on security guide mailings • Indiana Capital Chronicle Indiana Capital Chronicle Canada security intelligence chief warns China can use TikTok to spy on users, CBC reports Reuters Canada Violence in New Caledonia subsides slightly as France sends reinforcements for security The Associated Press House Passes Israel Security Assistance Support Act | House Committee on Appropriations - Republicans House Appropriations Israel Resists Grand Bargain as U.S. and Saudis Work on Security Pact The New York Times International Community Meets to Discuss the Future of Nuclear Security International Atomic Energy Agency U.S.-Ukraine Security Entanglement Risks Forever War The American Conservative Security Alert: Worldwide Caution - U.S. Embassy & Consulates in Indonesia US Embassy and Consulates in Indonesia Palo Alto Networks and IBM to Jointly Provide AI-powered Security Offerings; IBM to Deliver Security Consulting ... IBM Newsroom Now armed with AI, America's adversaries will try to influence election, security officials warn The Associated Press Sean 'Diddy' Combs Allegedly Paid $50K to Obtain Hotel Security Footage of Cassie Assault: Lawsuit PEOPLE Women are worried about their financial security. That may affect the 2024 presidential election CNBC Nuclear security through the eyes of the Co-Presidents of ICONS 2024 International Atomic Energy Agency Security video appears to show Sean 'Diddy' Combs beating singer Cassie in hotel hallway in 2016 Washington Times Appropriators Lead Israel Security Assistance Support Act | House Committee on Appropriations - Republicans House Appropriations IBM Selling Cloud Security Software to Palo Alto Networks in Broader Cyber Strategy Shift The Wall Street Journal Security footage calls into question Anchorage police account of fatal shooting Alaska Public Media News Security Council Secretary: ‘Not an Inch of Armenian Land Ceded to Azerbaijan’ Armenian News by MassisPost TikTok is a threat to Canadians' data security, CSIS chief warns Bennington Banner Canada Releases Defense Policy Update to Boost Security Department of Defense NATO and Economic Security: A Political Oxymoron or Inevitability? CSIS | Center for Strategic and International Studies Identity Management and Information Security News for the Week of May 17; Exabeam, Saviynt, VAST Data, and More Solutions Review Amazon security guard tries to kill unsuspecting boss before he's shot dead in gunfight with police: 'He almost executed me' New York Post EXCLUSIVE: Two students uncover security bug that could let millions do their laundry for free TechCrunch New Survey Finds a Paradox of Confidence in Software Supply Chain Security Security Boulevard Fox News Poll: Abortion, economy, and border security are top deal-breakers in 2024 elections Fox News Putin has ditched his paranoid security chief. Here are 5 of the wackiest things Nikolai Patrushev has said. POLITICO Europe See cops working security at Tacoma grocery stores? Here’s why and what policies allow Tacoma News Tribune OWASP dep-scan: Open-source security and risk audit tool Help Net Security Endpoint Security and Network Monitoring News for the Week of May 17; Alkira, Preamble, c/side, and More Solutions Review Opinion | Is TikTok Chinese ownership a U.S. national security issue? Come on. - The Washington Post Opinion | Is TikTok Chinese ownership a U.S. national security issue? Come on. The Washington Post Diddy Seen Physically Assaulting Cassie in Never-Before-Seen 2016 Hotel Security Footage Entertainment Tonight RSA Conference 2024: AI and the Future Of Security Security Boulevard UN sexual violence envoy pulls out of Security Council briefing on Hamas hostages The Times of Israel The New U.S. Strategy on Global Health Security Think Global Health Multnomah County Signs $40 Million Contract for Armed and Unarmed Security at County Facilities, Including Public ... Willamette Week An inspector general warned the Justice Department of gaps in its security clearance appeals process Government Executive 7 months since Oct 7, UN Security Council holds first meeting entirely dedicated to Israeli hostages in Gaza All Israel News Fintech giant Flutterwave loses ₦11 billion to security breach Business Insider Africa PKI-Based Passkeys Lead The Way For A Passwordless Future Security Boulevard FCC proposes BGP security measures Network World May 17: IDF fighter jet carries out rare strike on target in West Bank city of Jenin The Times of Israel Votiro Keeps Up the Momentum in 2024 Security Boulevard The Best Home Security Systems of 2024 Security.org The situation concerning Iraq - Security Council, 9628th meeting Welcome to the United Nations 'Abnormal' security video, Google Drive led to Stephan Sterns' arrest in Madeline Soto case, documents show WKMG News 6 & ClickOrlando Brothers Indicted for Stealing $25 Million of Ethereum in 12 Seconds Security Boulevard Cybersecurity Insights with Contrast CISO David Lindner | 5/17/24 Security Boulevard JLOTS, an obscure Army-Navy capability, arrives in Gaza NavyTimes.com Making Safety and Security Intrinsic to School Design Campus Security Today The Dell API Breach: It could have been prevented Security Boulevard Yemeni security forces deploy in Aden as anger simmers over lengthy power outages The Associated Press U.S. Security Cooperation with Ukraine - United States Department of State Department of State Response to CISA Advisory (AA24-131A): #StopRansomware: Black Basta Security Boulevard |
RELATED ARTICLES
Computer Viruses, Worms, and Hoaxes In recent days, I was one of the unfortunate persons to receive the "Mydoom" worm emails. Not just one, but at least forty appeared in my popserver mailbox. Securing Your Accounts With Well-Crafted Passwords In the past I've never really paid much attention to security issues when it comes to user names and passwords. Frankly I figured it was all a lot of overblown hype. Is Your Music Player Spying On You? In today's times spyware is a very serious issue and all computer users should be aware of the possible damage it can cause. It is estimated by well known industry insiders that nearly 90% of all computers are infected with some kind of spyware. Secure Your PC From Hackers, Viruses, and Trojans Viruses, Trojans and Spyware: Protecting yourself.No user on the internet is safe from assault. Personal Firewalls - Secure Your Computer There has not been a time in the history of the personal computer that firewalls and anti-virus programs have been more necessary and in-demand. Today, personal computer security is not only threatened by viruses and worms, but also by spyware - those severely annoying programs that are illegally loaded onto your computer from the internet. How to Manage Your Username and Password The Easy and Secure Way Have been an Internet user for more than 9 years, I have 100's of logins and passwords to keep. I'm paranoid. How To Clean the Spies In Your Computer? Manual Spy Bot Removal > BookedSpaceBookedSpace is an Internet Explorer Browser Helper Object used to show advertising.Free PC Health Check - find bad files fast! How many corrupt and redundant files are lurking inside your PC ready to cause harmful errors? Find these harmful "time-bomb" files instantly and keep your computer ERROR FREE 24 hours a day!VariantsBookedSpace/Remanent : early variant (around July 2003) with filename rem00001. Are You Surfing Safe? Ok, you've got a computer, and you get online. You surf your favorite sites, Sports, Shopping, Cowchip Tossing Blogs, and so on. How to Know Whether an Email is a Fake or Not A few nights ago I received an email from "2CO" asking me to update my personal data. The sender did not forget to insert a link to log in, too. Click Here To Defeat Evil Microsoft routinely releases new security updates, many of which are given it's highest severity rating "critical". Here's a typical announcement:"A security issue has been identified that could allow an attacker tocompromise a computer running Internet Explorer and gain control over it. Is My PC Vulnerable on the Internet? No longer are viruses the only threat on the internet. In recent years other threats have evolved which include spyware, adware, hacking, identity theft, information theft, pop-ups and the loss of information. Hacked: Who Else Is Using Your Computer? A friend called me one day and asked if I would stop by to look at his computer. He said it was running abnormally slow and he had found something on his hard-drive he could not explain. Internet Scams: Dont be a Victim As the number of people using the Internet as an integral part of their daily life grows, it is inevitable that the number of Internet Scams will grow. Unfortunately there are many forms of scams but in this article we will look at three of the most prominent. Do You Know What your Kids Are Doing Online? It's a sad statistic, but hundreds of unsuspecting kids are lured away from home every year by strangers they meet in online chat rooms.As frightening as this seems, it gets scarce attention in the media. Protect Your Little Black Book The movie Little Black Book features a young woman, Stacy, who is frustrated when her boyfriend refuses to share information about his past relationships. When his PDA, a Palm Tungsten C, falls into her hands, she is faced with a conundrum. Mail Forwarding - Why Would You Do It? First of all we need to get some terms stated. I have been in the business for just over two years and there is still some confusion over the topic. Email Scams - Ten Simple Steps To Avoiding Them According to the Anti-Phishing Working Group (APWG) email scams also known as phishing attacks claim more than 2,000 victims each day from more than 75 million phishing emails that are sent each day. The APWG also claims that these email scams steal close to $1 billion a year from its victims. Phishing Recently I have received email from my bank/credit Card Company, eBay & pay pal saying that my account has possibly been compromised and I need to confirm my details and password in order to get continued access.Spam email now has a new and more frightening variant, it's called phishing and it has been made by criminals and hackers who aim at getting unwitting consumers to reveal account numbers and passwords. The Move to a New Anti-Virus Model This is the second in a series of articles highlighting reasons why we need a new model for anti-virus and security solutions.Reason #1: the Basic ModelAnti-virus software vendors still rely on yesterday's methods for solving today's problems: they wait for the next virus to wreak havoc and then produce a solution. Its Time to Sing the Encryption Song - Again! Yes, I'm wearing my encryption hat again. Why you may ask? Well I just finished reading about the newest security hole in Microsoft's latest server product. |
home | site map |
© 2006 |