鲜花( 1) 鸡蛋( 0)
|
Here are some of the more recent scams experts are keeping an eye on (and so should you).
) h6 @; u1 q& J8 q2 B; Q2 L
8 R6 \0 T' ^ b! q$ xRevenue Canada phishing scheme
* G, l$ @; l+ A3 [6 F% y7 T
9 \9 O4 R2 L- g+ LThe scam: An email suggests that recipients are entitled to a tax refund from the Canada Revenue Agency, but in order to receive the refund users must click on an embedded link that directs them to a website posing as the Canada Revenue Agency. Visitors are then asked to fill out an online form that requests tax-related information, including Social Insurance Number, date of birth, full name and the tax amount of their returns.
2 n; p+ M7 K4 V. H* ?5 k+ R1 R0 B5 ?7 M% W9 C* L& W, I5 }* C
With this information attackers can steal the victim's tax refund and then sell all their personal information." I7 h1 h' E0 {) E7 H, Z$ p9 r3 u) S
% d0 A' U# G# I% u/ a! O
How to protect yourself: First of all, understand that any request for personal information is the first sign of fraudulence. Like banks, the taxman does not request personal information by email. And while there are certain indications that a website may be fraudulent (such as missing characters or the absence of a lock symbol), phishing websites are becoming increasingly sophisticated. (According to Phonebusters, scam artists can now purchase ready-made phishing kits online that include everything needed to launch a phishing attack.) If you have a question about whether an email request for information is legitimate, contact the organization directly and not through the link provided within the email.
2 ~0 E7 Y6 P+ R/ L( R- T4 h& f2 k2 \+ w1 }9 M8 j- z$ r
Telemarketing fraud
8 T% |$ Y3 N" N
/ G& I- c4 ^! t. n6 z9 nWhether it is phone number spoofing (your call display indicates a different number than the originators) or dead air calls (no one is there when you answer the call, but a telemarketer records the information to find out when you'll be at your number to answer the phone), unscrupulous organizations are becoming even more inventive.3 j2 o/ S) T/ O5 B& G9 `) Z
! p* V' h3 f! s! L8 U" vHere are just a fewrecent schemes:
5 D' m* c" R. y
8 k& r8 K& q/ V/ j5 Q+ Y- The Insurance Bureau of Canada (IBC) reports that fraudulent telephone calls are being made to policyholders. The callers claim to be from the policyholder's insurance company and demand the immediate payment of the full term premium or an outstanding amount on the client's policy, via credit card. The caller threatens to cancel the customer's policy if payment is not received. (Read more.)& o, V' q, V ^2 w" Q
" L- p0 b3 b& o% s4 D
- Telephone sales scams are promoting so-called extended car warranties, often by calling cell phones or numbers that are on do-not-call lists. In most cases the sales agent will tell you that your vehicle's warranty has expired or is about to expire and that he or she can sell you an extended warranty. The agent will then ask you to give them information about yourself or your car, or they will ask you to send money.
0 j3 w- a+ S- P! Z
) z5 ]6 x v, b1 k$ a: [1 i/ fHow to protect yourself: Do not give credit card or any other personal information over the phone. If in doubt about the legitimacy of the caller or organization, hang up and contact the organization directly.
6 y3 k' U5 e8 }' z) Z$ R6 x+ I) ]' W, Y# M
Deceptive prizes8 N: a+ A! _3 f2 |* {2 U, I' g
' p4 T6 G: v" `! y; `The scam: You're asked to send money up front to collect or take delivery of a prize.4 b; V* M& g+ a3 J
' ~2 z/ N0 m/ S$ f% A
How to protect yourself: Never send money up front to collect a prize. Legitimate lottery and sweepstakes administrators never charge fees to deliver a prize. And remember: to win, you have to play! If you've been contacted about a prize for a contest you didn't enter, it's probably too good to be true.
. d! V3 o8 e+ y; m# U- S
8 \. c7 s; N: h FWork-at-home scams
& \: I' s; g1 ?" t# V$ d; y; n5 R R: w1 R+ x4 k
The scam: In return for an opportunity to make money working from home, payment is required up front for materials, instructions, training or equipment.. Z+ J# Y+ J, ^' l3 E
; e$ U/ B; j+ v; FHow to protect yourself: Do your research about any business opportunity. Be cautious of job ads that claim "no experience necessary" or include exaggerated claims about the amount of money to be earned. (Read more onhow to spot work-at-home scams.)% Y. ^7 W8 ~! R" j3 O" c5 C
% _/ b, R' J' v; Y2 NSocial networking worms* y a$ H! \2 p3 s o j7 V
* y* D$ i& P7 s# P3 G; \" ?6 p
The scam: Users of Facebook, MySpace and other social networking sites receive an invitation from a friend or contact, inviting them to click on a link and view a video at a fake YouTube site and install an Adobe flash plug-in. Instead, the "koobeface" worm installs a trojan horse program, giving hackers control of the infected user's computer.0 ?2 g/ L, s5 N( V# j e: P
& d. a' I5 Z* f2 Z6 F
How to protect yourself: Always use caution when clicking on links in unsolicited messages, even if they appear to come from someone you know. Also, don't install applications or programs you aren't looking for and research any program before installing it.
6 p$ i @. [. U, B6 [+ Y t( i: {- [6 p
Bomb threat emails5 V2 _2 a% K1 F* z
# h9 H" C0 H) W( HThe scam: You receive an email sent out by a supposed assassin that has planted a bomb. The sender demands a large sum of money in return for not carrying out the mission.' a, K! W2 n7 {
. L9 u+ ^4 v5 C$ mHow to protect yourself: If you receive such a solicitation, do not respond to it and delete it. |
|