Beware of Imitations! Security, Internet Scams, and the African Real Estate Agenda

Fishing on the Internet has come a long way. However, we TechWeb junkies like to call it Phishing. What I am talking about here is not going after your ordinary, everyday catch. Yet a fine catch it indeed may be to those thieving bandits if they can lure you into giving up your personal and private information. Trickery is vast and common on the World Wide Web. Beware, I say, beware!

Email schemes, called "phishing" or "carding", attempt to trick consumers into disclosing personal and/or financial information. The emails appear to come from legitimate companies with whom consumers may regularly conduct business. I have seen scams appear to come from such noteworthy corporation as AOL, Earthlink, Paypal, eBay, or major credit card issuers. Often times the email threatens termination of accounts unless consumers update billing information.

Phishing comes around in all forms. How many of you have had some Nigerian Prince that just inherited 35 million US dollars offer to share it with you for one reason or another? How many of you have received an e-mail supposedly from your bank that for "security reasons" requests you to click a link that takes you to an online form to fill out, requesting all your personal and confidential information about your bank account?

A word to the wise: there is no Prince in Nigeria that needs your help, and your bank will never ask you for that info in an e-mail!

The latest Internet scam appears to come from the South African Department of Mining. "Resources and we are in dire need of a foreign partner to assist us in the receipt and investment of US$15,500,000.00?" All they request is a secure place to deposit the lump sum on US territory, and you will gain a large piece of the pie. WOW, what a deal!

Another I received comes from Johnson Mgabe, the son of the leader of the Republic of Zimbabwe Agricultural Commission. His father has just been assassinated, and he, the only remaining heir, is trying to escape. If you help him, he will give you lots of dough! Right on! "Please e-mail and tell me of your decision. I am ready to pay you 25% of the money [$45.5 Million] for your help, 5% shall go for expenses you might incur during the transaction. The remainder [70%] shall be mine."

Ok, ok, I am convinced; here is my private bank account, my SSN, DL# and address. Please tell me what I need to do next. Are they for real? Seriously though, if people didn't fall for these types of stunts, there wouldn't be so many floating around. Identity theft has become more and more rampant in this techno traveling world.

Again I say, beware.

Many of these email schemes contain links to "look-alike" websites that are loaded with actual trademarked images. The websites then instruct consumers to "reenter" their credit card numbers, social security numbers, bank PINs, or other personal information. If consumers actually provide the information requested, the data goes to scammers, not the legitimate company whose name is on the site. Thereafter, the data is often used to order goods or services and/or to obtain credit in the name of the consumer and potentially, steal your identity.

Again, I say, beware!

Rule for the road:

If you receive a precarious e-mail asking you for personal information, chances are it is a scam. It is better to be safe than sorry.

By Greg Richburg
Netricks, Inc.

All past articles written by Greg Richburg are available at http://www.netricks.com/news. Please address article suggestions to: info@netricks.com.

Greg Richburg is a Microsoft Certified Systems Engineer and the owner of Netricks, Inc. a network consulting, web design and hosting company located in Fresno, CA.

Visit Netricks at http://www.netricks.com Richburg also runs KlickCommerce, anInternet based marketing system for Ujena brand clothing. See http://www.klickcommerce.com for details.

More of Richburg's work may be seen at http://www.valley411.com

In The News:


pen paper and inkwell


cat break through


Instant Messaging ? Expressway for Identity Theft, Trojan Horses, Viruses, and Worms

Never before with Instant Messaging (IM) has a more vital... Read More

Mall Protection

The Loss Prevention Manager should be receptive to the needs... Read More

Is Your Music Player Spying On You?

In today's times spyware is a very serious issue and... Read More

Anti-Spyware Protection: Behind How-To Tips

There is no doubt that "how-to articles" have become a... Read More

A New Era of Computer Security

Computer security for most can be described in 2 words,... Read More

Reporting Internet Scams

When it comes to reporting Internet scams most of us... Read More

Spyware, This Time Its Personal!

First the basic definition of Spyware: It is a type... Read More

Spyware Protection Software

Spyware protection software is the easiest way of removing spyware... Read More

Adware and Spyware: The Problems and Their Solutions

The Threat10 years ago you could probably have run no... Read More

What Can Be Done About Spyware And Adware

Having a good Spyware eliminator on your computer is vital... Read More

Mail Forwarding - Why Would You Do It?

First of all we need to get some terms stated.... Read More

Protecting Your Children On The Internet

If you are a parent, as am I, I think... Read More

How Free Scripts Can Create Security Problems

With the Internet entering our lives in such an explosive... Read More

The Never Ending Spyware Story

It's been with us since 1993, it's gotten more intrusive,... Read More

Can I Guess Your Password?

We all know that it's dangerous to use the same... Read More

3 Pervasive Phishing Scams

Scams involving email continue to plague consumers across America, indeed... Read More

Protect Your Little Black Book

The movie Little Black Book features a young woman, Stacy,... Read More

Top Ten Spyware and Adware Threats Identified

On December 8, 2004 Webroot, an award winning anti-spyware solution... Read More

How To Avoid Hackers From Destroying Your Site?

Recently, my site and other internet accounts ( http://www.nabaza.com/sites.htm )... Read More

5 Simple Steps to Protect your Digital Downloads

A couple of days ago, I was searching for a... Read More

How Can Someone Get Private Information From My Computer?

From the "Ask Booster" column in the June 17, 2005... Read More

Information Security for E-businessmen: Just a Couple of Ideas

If you constantly deal with bank or electronic accounts, it... Read More

What Every Internet Marketer Should Know About Spyware

If you run any type of Internet business, Adware and... Read More

Are They Watching You Online?

When surfing the Internet you probably take your anonymity for... Read More

Crack The Code - Thats A Direct Challenge

I Challenge You To Crack The Code ------------------------------------- I had... Read More

Dont be a Dork ? Protect Yourself

There are folks out there who use their powers for... Read More

New Mass Mailing Spamming Internet Trojan for the Windows Platform

May. 16th 2005 - MicroWorld has reported the discovery of... Read More

Identity Theft -- 10 Simple Ways to Protect Your Good Name!

Identity Theft is one of the most serious problems facing... Read More

Identity Theft ? Beware of Phishing Attacks!

"Dear Bank of the West customer", the message begins. I've... Read More

Hacking Threats and Protective Security

The 1998 Data Protection Act was not an extension to,... Read More

IPv6 - Next Step In IP Security

IPv6, IntroductionThe high rate at wich the internet continualy evolves... Read More

Five Excellent Indie Encryption And Security Solutions You Have Not Heard About

Geek SuperheroGeek Superhero watches your computer for changes, immediately notifying... Read More

3 Things You Must Know About Spyware

1)Spyware is on your system. Like it or not, statistically... Read More