Security Information |
Avoiding Scams: If It Sounds Too Good to Be True, It Probably Is
A week or so ago, I received an inquiry from a man in Indonesia about buying multiple copies of certain items on my website. I immediately suspected fraud, so I explained that I only had one piece of each. The man, who wrote impeccable English, said that was fine. I asked why he wanted to buy so much money's worth of jewelry (it was around $250). He said it was for his wife and daughters. He then asked if he could email me the billing and shipping info instead of using the catalog. I told him the catalog was better, since it was more secure, and figured if he was a scammer, it would be too much work for him. No such luck. He was unusually together. He placed an order for the same items he had asked about (most scammers forget). I started allowing myself to feel happy about such a large order and the money that would bring. At the same time, I started researching shipping to Indonesia, as well as fraud protection, and found that a) Indonesia is second only to Nigeria in credit card fraud levels, and b) jewelry is prohibited to ship to Indonesia. Per suggestions on another site, I asked the customer for a CVV number, the bank listed on the credit card, and the customer service number on the card. He sent me the CVV and customer service number. He also said he had just received a diamond ring sent to him, so he didn't think the prohibition existed. Today I started checking. I called the customer service phone number he gave me; it was for a Canadian bank, and the number didn't belong to one of their cards. The fishy smell grew stronger. I then contacted an American bank to find out where the number originated. They gave me the runaround for a while until someone there gave me the number for Visa International, 800-847-2911, since the card number started with a 4. Visa International told me which bank to call. When I finally got to the right bank, and told them I was a merchant checking on fraud, they confirmed my suspicions. The card was at an American address, and it had no other suspicious charges on it. I asked if there were any tiny charges, like for penny amounts. Indeed there were. This part is important! In Indonesia, they are very sophisticated; one of the ways they get credit card numbers is to run random computer-generated numbers with expiration dates until they get some that go through. They put through charges for tiny amounts that people won't bother to contest, and if the charge goes through, they know it's good. So do watch out for penny amounts showing up on your credit card bills. I asked the woman to check the CVV number as well, and she said it did not check out. So the charge would not have gone through anyway, but I feel better having checked, even if it took way too much time. Lesson: the scammers are getting more sophisticated all the time. They can also read materials on the internet that give warning signs about scammers. So they are trying to avoid some of the more obvious signs. If it sounds too good to be true, it probably is! Author Susan Midlarsky of Aspiring Arts handcrafts jewelry with stones that harmonize well and are beneficial to the human body, color combinations that are connected to refinement, and sometimes offerings from nature. She has also recently started making glass beads; you can see her progress at her online blog. Susan loves the magical glow people feel upon finding a piece of jewelry that is exactly right for them.
MORE RESOURCES: Unable to open RSS Feed $XMLfilename with error HTTP ERROR: 404, exiting |
RELATED ARTICLES
Spyware, What It Is, What It Does, And How To Stop It Spyware is software that runs on a personal computer without the knowledge or consent of the owner of that computer. The Spyware then collects personal information about the user or users of the infected computer. A Painless Plagiarism Solution A crowded marketplace can lead to unethical webmasters using underhand techniques to get ahead of their competitors and online plagiarism is one of the easiest.I had worked hard on the copy for my sales page at Watch Live Football (http://www. Spyware Removal Spyware SolutionProbably Today's Biggest Computer Problem.You Suffer Without Knowing Your PC is Infected!"The effects can be devastating. Desktop Security Software Risks - Part 1 This is the second in a series of articles highlighting reasons why we need a new model for anti-virus and security solutions.Reason #2: the Desktop Security Software RisksThe risks of placing software on the desktop are such that I will be breaking this article into two parts. The 5 Critical Steps to Protecting Your Computer on the Internet Spyware, viruses and worms.. Is Your Email Private? Part 1 of 3 In a word, no - an email message has always been nothing more than a simple text message sent unencrypted to a recipient we choose. So all the email that we so blithely send all over the Internet everyday is neither private nor secure. From Spyware with Love! It's late. You've been scouring the web for that perfect present for your Aunt Bess in Idaho. Phishing - A High Tech Identity Theft With A Low Tech Solution Have you ever got an email asking you to confirm your account information from a bank or a company that you have never done business with? The email looks official and it even has a link that appears to take you to the company's website. The email you have received is actually from an identity thief. Delete Cookies: New-Age Diet or Common Sense Internet Security? No, this article isn't about some new, lose-20-pounds-in-a-week, certified-by-some-tan-Southern-California-doctor diet. It's about cookies on your computer - what they are, why they are there, and what to do about them. The Risk Of Electronic Fraud & Identity Theft Electronic Fraud and Identity Theft-----------------------------------Human beings are pretty sensible when presented with an imminent threat or risk. That is, if it's staring us directly in the face. Be Aware of Phishing Scams! If you use emails actively in your communication, you must have received various messages claiming to be from Ebay, Paypal and a number of banks. A recent email as if from U. Adware and Spyware: The Problems and Their Solutions The Threat10 years ago you could probably have run no Internet security applications and still have come out after a browse of the Internet with a virus and malware free computer, but this situation is no longer apparent. Several years ago, before I knew of the dangers of the Internet, I had absolutely no spyware or adware protection. Is The Internet Over Regulated Today's Internet or World Wide Web is being over regulated.But, are you being taken for a ride, are you lead to believe that Governments World Wide are creating new legislation for your benefit or are there underlying factors that these laws are more beneficial to Governments and big business?First we had the Can-Spam and other laws passed regulating the sending of unsolicited commercial e-mail, that contains false or deceptive subject information, or that is sent from invalid e-mail addresses, but for me, my inbox still seems to always be full of junk mail. Secrets On Security: A Gentle Introduction To Cryptography Let us take the example of scrambling an egg. First, crack the shell, pour the contents into a bowl and beat the contents vigorously until you achieved the needed result - well, a scrambled egg. Remove Rogue Desktop Icons Created By Spyware If you have used a Windows machine for a while, whether it's Windows XP, Windows 2000, or Windows 98, you're sure to have noticed desktop icons appearing from out of nowhere. How can icons mysteriously emerge on your Windows desktop?1. The Bad Guys Are Phishing For Your Personal Information Do you know what "phishing" is?No, it doesn't mean you grab a pole and head to the late to catchsome phish.The official Webopedia definition of "phishing" is as follows:The act of sending an e-mail to a user falsely claiming to be anestablished legitimate enterprise in an attempt to scam the userinto surrendering private information that will be used foridentity theft. Free Antivirus Security Software: Download Now to Eliminate Spyware, Pop Up Ads, etc. Adware. Spyware. Phishing and Pharming: Dangerous Scams As soon as almost all computer users already got used to -- or at least heard about -- the word "phishing", another somewhat confusing word appeared not long ago. Pharming. Lottery Scam, What It is and how to Avoid It? Internet scams and frauds are on the rise! The quantity of scam emails with various fraud schemes any email account receives today is simply overwhelming! There is this infamous Nigerian 419 scam, which is by far the most widely circulated one. I wrote about it in one of our ezine articles not long ago. Firewalls: What They Are And Why You MUST Have One! A firewall is a system or gateway that prevents unauthorized access to your computer or private network. It is usually the first line of defense in protecting your private information or data. |
home | site map | contact us |