A week or so ago, I received an inquiry from a man in Indonesia about buying multiple copies of certain items on my website. I immediately suspected fraud, so I explained that I only had one piece of each. The man, who wrote impeccable English, said that was fine. I asked why he wanted to buy so much money's worth of jewelry (it was around $250). He said it was for his wife and daughters.
He then asked if he could email me the billing and shipping info instead of using the catalog. I told him the catalog was better, since it was more secure, and figured if he was a scammer, it would be too much work for him.
No such luck. He was unusually together. He placed an order for the same items he had asked about (most scammers forget). I started allowing myself to feel happy about such a large order and the money that would bring. At the same time, I started researching shipping to Indonesia, as well as fraud protection, and found that a) Indonesia is second only to Nigeria in credit card fraud levels, and b) jewelry is prohibited to ship to Indonesia.
Per suggestions on another site, I asked the customer for a CVV number, the bank listed on the credit card, and the customer service number on the card. He sent me the CVV and customer service number. He also said he had just received a diamond ring sent to him, so he didn't think the prohibition existed.
Today I started checking. I called the customer service phone number he gave me; it was for a Canadian bank, and the number didn't belong to one of their cards. The fishy smell grew stronger.
I then contacted an American bank to find out where the number originated. They gave me the runaround for a while until someone there gave me the number for Visa International, 800-847-2911, since the card number started with a 4. Visa International told me which bank to call.
When I finally got to the right bank, and told them I was a merchant checking on fraud, they confirmed my suspicions. The card was at an American address, and it had no other suspicious charges on it. I asked if there were any tiny charges, like for penny amounts. Indeed there were. This part is important!
In Indonesia, they are very sophisticated; one of the ways they get credit card numbers is to run random computer-generated numbers with expiration dates until they get some that go through. They put through charges for tiny amounts that people won't bother to contest, and if the charge goes through, they know it's good. So do watch out for penny amounts showing up on your credit card bills.
I asked the woman to check the CVV number as well, and she said it did not check out. So the charge would not have gone through anyway, but I feel better having checked, even if it took way too much time.
Lesson: the scammers are getting more sophisticated all the time. They can also read materials on the internet that give warning signs about scammers. So they are trying to avoid some of the more obvious signs. If it sounds too good to be true, it probably is!
Author Susan Midlarsky of Aspiring Arts handcrafts jewelry with stones that harmonize well and are beneficial to the human body, color combinations that are connected to refinement, and sometimes offerings from nature. She has also recently started making glass beads; you can see her progress at her online blog. Susan loves the magical glow people feel upon finding a piece of jewelry that is exactly right for them.
These six ways to prevent identity theft offer you valuable... Read More
Since its birth, the Internet has grown and expanded to... Read More
Identity Theft is one of the most serious problems facing... Read More
Computer viruses infect millions of computers every day. Viruses can... Read More
Pharming is one of the latest online scams and rapidly... Read More
Have been an Internet user for more than 9 years,... Read More
Computer security for most can be described in 2 words,... Read More
The internet is undoubtedly a fantastic resource for families and... Read More
As soon as almost all computer users already got used... Read More
When it comes to a secure website and passwords it... Read More
Paypal is a great site and is used by many... Read More
The Loss Prevention Manager should be receptive to the needs... Read More
The trash folder in my main inbox hit 4000 today.... Read More
Well, this is an article I never thought I would... Read More
The words Corporate Security may conjure up images of a... Read More
Everyone should eliminate spyware and adware from your hard drive... Read More
There you are busily typing away on your PC or... Read More
The top five online scams on the Internet hit nearly... Read More
A firewall is a system or gateway that prevents unauthorized... Read More
To blog or not to blog? Well, why not? Lots... Read More
When you signed up for that ultra-fast DSL or Cable... Read More
Huge number of spyware software applications are available in the... Read More
The first thing people think about when defending their computers... Read More
Today the internet is a mine field of malicious code... Read More
You can detect spyware online using free spyware cleaners and... Read More
The movie Little Black Book features a young woman, Stacy,... Read More
This is the second in a series of articles highlighting... Read More
At this point, if you've got the whole "turning the... Read More
In the past I've never really paid much attention to... Read More
Ebay is a great site and is used by many... Read More
Identity Theft and Your Personal Information Identity theft is... Read More
You'd better learn news from media, not from emails, security... Read More
What is Phishing? In a typical Phishing attack, a criminal... Read More
Long gone are the days that we could feel secure... Read More
Spyware is software that runs on a personal computer without... Read More
There you are busily typing away on your PC or... Read More
When you signed up for that ultra-fast DSL or Cable... Read More
So called phishers try to catch the information about the... Read More
As the number of people using the Internet as an... Read More
1. Importance of a Virus Scanner: A Antivirus program can... Read More
There are ways to insure security though. You can get... Read More
Phishing is a relatively new form of online fraud that... Read More
P C. owners are constantly at risk from attacks by... Read More
Scams involving email continue to plague consumers across America, indeed... Read More
Spyware is software or hardware installed on a computer without... Read More
What is a Firewall?The term "firewall" illustrates a system that... Read More
A couple of years back, I paid my dues the... Read More
At this point, if you've got the whole "turning the... Read More
The 1998 Data Protection Act was not an extension to,... Read More
First I would like to stress I am condoning the... Read More
Today,on most internet user's computers, we have the ability to... Read More
Computer infections can be broken up into 4 main categories... Read More
Afraid that someone is monitoring your PC or installed a... Read More
The most frustrating part of having Spyware on your computer... Read More
When it comes to reporting Internet scams most of us... Read More
You can detect spyware online using free spyware cleaners and... Read More
"Male. Obsessed with computers. Lacking a girlfriend. Aged 14 to... Read More
This is not some new fangled techno-speak, it is a... Read More
If you know what is the 'Fishing' then it's very... Read More
Phishing is the act of some individual sending an email... Read More
Spyware SolutionProbably Today's Biggest Computer Problem. You Suffer Without Knowing... Read More
Identity Theft is one of the most serious problems facing... Read More
Identity Theft and Your Personal Information Identity theft is... Read More
Phishing: (fish'ing) (n.)This is when someone sends you an email... Read More
WHAT IS HACKING?Hacking, sometimes known as "computer crime" has only... Read More
Identity theft ? also known as ID theft, identity fraud... Read More
Internet Security |