17 Minutes Only!

Showing posts with label Making money online scams. Show all posts
Showing posts with label Making money online scams. Show all posts

Tuesday, 27 January 2015

Top 4 Internet Scams & Frauds in 2014



lookout for online scamsApart all the useful stuff and information the Internet is also full of a lot of scams and fraudulent practices. As the old scams get to be known by most people a lot of new ones emerge all the time in order to fool unsuspecting Internet users.
In this article I’ll list you all the new scams that emerged and became infamous in 2014.

MLM for various health products

Now, this isn’t a completely new idea and has been around for ages but apparently around 2013-2014 these scams have reached the mainstream. These scams work by pretending to offer money making possibilities to people in need.
Companies like these approach people in need of money and tell them that they can make money by becoming marketers for their products. The only thing these people will have to do is to convince their friends to become marketers themselves. Once those friends will promote and sell the products of the company the person who convinced them to join will receive a commission on their sales.
These companies usually present a chart according to which if you refer an X number of friends and each one of them refers another Y, then you will be making massive amounts of money by just getting the commissions based on the sales that your friends and their friends etc. generate.
The scam is that marketing of this kind never works. You will not be able to build a long pyramid of friends who all are top marketers who sell many products offered by the company. This stuff just doesn’t works.
On the other hand, in order to participate you will be obliged by the company to make an initial purchase of certain products the company offers. Supposedly this is in order so you may learn and test each product in order to be able to better promote them.
If you haven’t figured it out yet by now, then let me write it down in plain language: YOU are the end customer.
Essentially what’s happening in these scams is that the company does not even intend you to go out and find people to recruit them as marketers. All they are interested in is to get you to purchase the “trial” product package they offer. If you actually manage to convince some of your friends to join then that’s even better as he or she will also have to purchase that so-called trial package.

Binary options

Binary options are a form of financial trading that allow people to bet on the future movement of various financial assets such as gold, silver etc. Essentially, in binary options you will have to predict if the value of an asset will go up or go down during a given time frame.
If your prediction will be correct then you will win a certain amount of money promised before you opened the trade. If you lose, you’ll lose all the money you’ve invested into opening the bet.
There isn’t necessarily anything wrong with this concept expect that a significant number of websites that offer binary options are simply a scam. Once you make a deposit at these websites you will never see your money back. Even if you actually win, the website will simply refuse to pay you no matter what.
While there are legitimate binary options companies available on the Internet, there is a long list of binary options brokers that are a scam and a fraud, as shown on the linked page. So, for the sake of safety people should be staying away complete from this form of trading until the waters will settle.

Fitness Products

Fitness products are nothing new but like the previous two scams they also became increasingly popular this year. Fitness scammers in the past sold their fake products on low-quality websites with terrible designs, which resulted in people avoiding these sites during the recent years.
These days it’s almost impossible to sell health products on a low-quality and ugly websites, as these sites are – rightfully – associated with fraud and scams. For this reason, scammers upgraded their arsenal and began creating nice and shiny websites that follow common web-development and marketing best practices.
The products these websites sell can range from various issues such as fast muscle gain, fat loss, libido enhancement and more. However, all they have in common is that they are usually completely fake.
While these products might not necessarily do any harm (as they usually only contain sugar or flour) they are obviously a complete waste of money.
So, how to distinguish legit online fitness retailers from scams? – There’s two ways. One is to only purchase from providers that also have a very strong offline retail presence. The other is not to purchase any fitness and health products from the Internet and rather ask for advice and recommendations from a licensed physician.

Internet stock trading

Internet stock trading is obviously not a scam in itself. There’s a massive number of online stock trading platforms offered over the internet and a large number of people use them on a daily basis.
The problem with Internet stock trading is that a lot of trading companies have emerged that prey on people with zero trading experience. They usually offer so-called deposit bonuses, which is additional money given on people’s deposits, in order to convince them to register and trade.
These companies generally don’t care if you win or lose as they take a away a commission from the money you have deposited and invested. Sometimes they even get a commission from the companies they recommend you to invest in. You’ve seen The Wolf of Wall Street? – That’s how some online trading sites work.
These are the most prevalent online scams in 2014. As you can see, most of these are disguised as legitimate form of marketing, trading, investing or self-improvement. This is the reason why you have to be very cautions these days when dealing with these things.http://www.debtroundup.com/top-4-internet-scams-frauds-2014/

Wednesday, 5 November 2014

As Internet users adapt to old tricks, scammers find new tactics to exploit


Greetings to you, my friend.
I know this will come as a surprise to you, because you do not know me. My name is Abdul Al-Shallah and I am the son of a deposed government official in Nigeria.
Sound familiar? It’s a boilerplate opening for one of the most common scams in the known world — the Nigerian scam, also known as the “419 scam” or the advance fee scheme. The elements are always the same: someone (preferably royalty or some sort of official) has come into a lot of money, but needs another person outside of the country to use their money for a bribe (or to pay legal fees among other means) to spring the money free. The result is also predictable, with a wire transfer to a con artist’s account and a fake check that confirms a scam has taken place.
This scam is a hallmark of the Internet, but it’s actually much older than that — the advance fee scheme in its modern incarnation dates back to the early 1980s, and various forms can be traced back to before the 20th century. The reason that it sticks around, unsurprisingly, is because it never ceases to swindle millions of dollars from duped victims. The scheme, and many others like it continue to flood inboxes daily, often hitting the Spam folder before you ever lay eyes on it, waiting for a more trusting person to make a trip to the Western Union.
But that’s not to say that Internet scammers are resting on their laurels and leaving their dirty work to these classic methods. As Internet users become more sophisticated (and laugh at the advances of the forlorn Nigerian prince or similarly befallen individual), the chances of finding a willing innocent victim slowly dwindles. Like any other industry, scammers are looking for smarter, more efficient ways to reach their big payouts and to keep their “businesses” running smoothly, so they are forced to adapt and reach new extremes to get their money.
Now, security experts are seeing disturbing trends among scammers that make the old schemes appear to be child’s play. Appealing to the emotional pull of a victim is now just part of the scheme, which now includes familiarity dupes and long-term schemes to raid a bank account. These cons are more targeted, more ruthless and can take out even large corporations and entire governmental programs. There’s a new evolution in Internet con artistry, and it’s putting everyone at risk.
Check out the four new and scary ways con artists are getting their money on the Internet, and real-life examples of how they work.
What do you think of these schemes? Let us know in the comments.

The long con

In the past few years, “spear-phishing” has risen to become one of the biggest trends in online scamming. A play on the hacking technique “phishing,” spear-phishing is a technique that con artists use to specifically target individuals or companies and gain access to information or bank accounts. This method has also become the tactic du jour for cyber criminals interested in attacking big business or government officials. But, that doesn’t mean spear-phishing is too advanced for the regular user.
In a spear-phishing scenario, a hacker is able to crack into an inbox of an unsuspecting victim. But, instead of doing a smash-and-grab and gathering as much information as possible, the criminal takes his time — akin to casing a house before a robbery. Then, the hacker masquerades as an email account of a relatively important company, like Bank of America. The hacker then sends a personalized email explaining to the victim that her account has been compromised, including the victim’s account number to establish credibility, and urges her to quickly change her name and password via a link provided in the email. The victim is duped into downloading nasty malware onto her computer, and the con artist is able to walk away with cash in his pocket.
“They dig deeper down. They know who you’re talking to and what the subject matter is about,”  says George Waller, executive vice president at New Jersey-based cybersecurity software corporation StrikeForce Technologies. “Then they’ll most likely spear-phish you with a malicious attachment or direct you to a site with a malicious download on it.”
And, at times, spear-phishing can drift into the absurd, like the story told by ESET Security Evangelist Stephen Cobb of hackers who had used a victim’s account to steal his money by stealing his heart. The hackers broke into a wealthy victim’s Gmail account and began rifling through the inbox. While reading the emails, they discovered the victim enjoyed frequenting dating websites, looking for a potential long-term mate. The hackers found the victim on the website and posed as a beautiful woman who was romantically interested in him. The hackers proceeded to forge a long-term relationship with him before begging for “emergency” money to be wired via Western Union. The victim readily accepted and the con went off without a hitch.
“This technique is particularly pernicious because it doesn’t immediately look like a scam,” Cobb says. “This isn’t some stranger saying, ‘Hi, you do not know me, but I have come into a large sum of money.’ You’ve gotten to know this person on social media and they’ve targeted you that way.”

The authority dupe

88373578 730x463 As Internet users adapt to old tricks, scammers find new tactics to exploit
Hackers aren’t only making emotional appeals, but also using fear or urgency to manipulate victims into giving over their identities and bank accounts. Waller explains that one of the common methods is that hackers use this tactic while posing as a common workplace resource, like a payroll company. Hackers can lure victims by claiming (ironically) a security breach or emergency that requires a change of password or download of a file. At that point, victims begin to divulge critical information or, perhaps even worse, download malware onto their computers that allows hackers to infiltrate computers and unlock even more information. Victims are tricked into believing they’re securing their systems and tying up loose ends, not compromising them.
“We’re all tied to the Internet and it’s part of our daily lives,” Waller explains. “We’re looking at it to check our emails and to conduct our business, but if you’re multi-tasking and you see something you recognize that’s actually a piece of spyware, it only takes one click. One click, and you’re infected.”
Another notable way that con artists take advantage of victims doesn’t directly involve a computer at all, but instead relies on a victim’s lack of knowledge about technology to earn a quick dollar. Cobb explains that one of the most common scams the ESET teams see are “IT phone calls,” where con artists call computer owners pretending to be Microsoft or Apple support techs and convince victims that their computers are riddled with “errors” — standard computer functions that can look threatening to an uninitiated computer user. They will even go so far as to walk the victim through a series of tests to “prove” the infections exist on the computer, even though many of them are common. By feigning emergency (and following a script), con artists can snag a quick $50 or so from concerned people.
“This scam is going on everywhere in the English-speaking world,” Cobb explains. “And everybody who has Windows has gotten a problem before. The pitch for the product is constantly evolving and it really tricks people.”

The puppet

Hackers are posing as friends, authority figures, and they’re even pretending to be you. One of the easiest ways hackers can trick victims is by posing as a real friend or relative of someone they know — a type of hyper-specialized spear-phishing that chooses new marks by consulting information from a previous victim. Con artists, through a key-logger or malware, can figure out their next targets by simply looking at emails. The former victim’s closest friends are usually the easiest targets, as it is simple to convince them to open a suspicious file or link. As the new crop of users get conned, they create new pools by which a hacker can find new victims. In this vicious cycle, it turns those who fall for scams into tools to be used against the people they care about most.
“I think it’s a natural evolution for the scammer,” Cobb says, “Spam in general is all about volume — you have to send out large number in order for it to work. But now, the numbers games aren’t working and hacking costs money, so putting more time into a victim is becoming more lucrative. Why try to target someone for a wire transfer who has never done a wire transfer? Find someone who knows how to do a wire transfer and has money, and it’s worth the time to work that person.”
This technique was actually recently used on Waller himself while he was at his own company, no less. As an executive that works frequently with local shipping services, Waller wasn’t surprised to find that USPS sent him an email one day explaining that a package missed delivery and needed to be picked up. The email looked legitimate, and included directions to his nearest post office (listing a known address three blocks away) and a link to the receipt. Waller was certain his company didn’t have any outstanding orders or package deliveries, and remained suspicious of the email. Still, he clicked the email’s link anyway — and it turned out to be malware.
“This isn’t even a sophisticated attack. This is just a standard phishing attack,” Waller said, “But if you’re a larger company or a person, it’s easy to see how someone can be deceived by all of this.”

The bait and switch

137179490 730x486 As Internet users adapt to old tricks, scammers find new tactics to exploit
Of course, nothing does quite as well as an updated version of the classic bait and switch — a con artist promising one piece of information and instead providing something unwanted such as a trojan or malware. Bait and switch operations are finding a niche in the Internet, where it is easy to pass off a malicious piece of software as a PDF or other file. Waller spoke of a group of hackers that had bought the email addresses of thousands of CFOs on the black market and was able to successfully bait them into downloading malicious software. Using the bought names, the hackers posed themselves as the IRS and sent emails to everyone, claiming that the enterprise tax codes for the year had changed. The email offered a “handy” PDF of all of the changes which, of course, was infected with a keylogger. After the CFOs unwittingly downloaded the harmful software, the keylogger set to work — analyzing the keystrokes until it was able to gather the usernames and passwords of each companies’ payroll system. That was when the magic happened.
“The hackers picked out CFOs that had several hundred to several thousand employees on purpose because those companies always experience a large turnover of full-time and contracted employees,” Waller explained. “The hackers were able to log in to the payroll service as the CFO and add a few extra payees to the account without attracting any suspicions.”
This technique occurs on a larger scale in the classic con artist technique of the dubious poll. Companies of varying repute are always advertising online polls and surveys that promise something free — whether it be an iPad or a cruise to the Bahamas. Users can take these polls online with the promise of a cash payout or fancy prize on the horizon, only to be goaded into a high-pressure situation where they must either sign up for multiple subscriptions or buy additional products in order to get their “free” reward. This scheme has been used across other media, including phones, but it remains one of the most persistent and successful scams. Cobb attributes the technique’s profitability to the ongoing economic crisis throughout the world.
“In an economy where a lot of people are underemployed and looking for extra money, a lot of people will be interested in a $1000 Wal-Mart Survey,” Cobb says. “And, people think that it’s not really free money because they’re convinced they’re working for it. They can convince themselves that what they’re doing is okay.”

How to stay safe

The world of cyber scams isn’t only constantly evolving — it’s relying on a variety of old and new methods to keep the income of cash flowing. This is just a fraction of the kind of schemes that are happening on the Internet today, and only related to email. Scammers are constantly trolling places like Craigslist, message boards and even Facebook groups to make a quick dollar off of unsuspecting people, and there’s a lot at stake.
As always, when avoiding these con schemes, there’s no substitute for good old fashioned common sense. The better that you as an Internet user become at detecting and fending off scams, the less likely you will find yourself upset at the hands of a manipulative con artist.
It’s simple enough to find out whether something is a scam by doing a routine search on Google when any suspicious activity appears in your mailbox. If something has come up in the recent past to indicate that the email you’re reading is actually a piece of malware or a scam, it will likely show up on message boards or in blog posts of security firms. It’s also a smart idea to research anyone you do not know who has contacted you or requested your friendship on a social network. Knowledge, in this case, truly is power.
Cobb agrees that it’s best to be skeptical of your surroundings, and also cautions others to be aware of what they put on social media. The more valuable information a user puts on a public social media profile like Facebook or Twitter, the easier it is to not only break into accounts but also dupe you into believing a scam’s authenticity. So, refrain the next time you think about putting your entire family tree or the history of places you went to school on your public timeline.
“People just don’t realize how helpful over-sharing in social media is to bad people,” Cobb says. “We talk to people about not sharing too much because it’s embarrassing  but there’s also an exploitation factor. Use the technology with an understanding that there are people out there who are working all the time to exploit you.”
Waller advises that every user maintain a comprehensive security system that blocks all forms of attacks, including keystroke-logger protection and anti-virus. Because software solutions rarely cover all bases, it’s also important that you secure available programs with a reliable two-factor authentication system like Google Authenticator. A combination of apps and steady vigilance will ensure that hackers won’t be able to sneak into your important accounts unannounced.
“You need to look for proactive approaches to all of this, because the deceptiveness that occurs every day is incredible,” Waller says.
And never, ever go to a Western Union and wire cash unless you know what you’re doing. Ever. Seriously. Just don’t.

Thursday, 16 October 2014

Fake Home Based Business Review Sites


66 - Fake Business Opportunity Review Sites... and counting!

Wake Up Now fake review site - mlmhelpdesk.com
Earn With Mike Scam fake review - nancyreviews.com - Nancy Fox
The Top 3 Work At Home - www.top3workathome.net - Sarah Johnson
Review of Ipoll - netbusinessrating.com
The Rip Off Report My Fun Life Scam - theripoffreportmyfunlifescam.wordpress.com
scamtimes.com fake site for Niche Blitzkrieg review - scamtimes.com
Commission Killer - en.netlog.com
Fake Rip Off Report: Paid Social Media Jobs - www.ripoffreport.com
Paid Social Media Jobs Scam - paidsocialmediajobsscam.com
The Federal Watch - www.thefederalwatch.com - Ru
Working At Home Warning - workingathomewarning.com
Paid To Place Scam - www.paidtoplacescam.com - Kathy Garcia
Work at Home Jobs Reviews - workingathomewarning.com - Brent Richard
Work At Home Authority - workathome-authority.com - Michelle Withrow
IM Product Reviewed - improductreviewed.com - Suzanne Fox
Top 3 Work At Home - top3workathome.net - Sarah Johnson
Five Mile Marketing - fivemilemarketing.com
Work At Home Careers - workathomecareers.com
Scammer Alert - scammer-alert.com - Frank Matthews
Home Based Business Reviews - homebasedbusinessreviews.com - Martin Wilson
Scam Free Zone - scamfreeonline.com - Joseph
Online Scams Uncovered - onlinescamsuncovered.com
End Of Job - endofjob.com
Work At Home Top 10 - wahometop10.com - Jessica Miller
Work From Home 4 Dollars - workfromhome4dollars.com - Michael Comeau
A Easy Home Business - aeasyhb.com
Reviews For U - reviewsforu.com
Home Based Biz Reviews - homebasedbizreviews.com - Bill Tannar
Top Money Review - topmoneyreview.org - Paul Lindstrom
Home Net Pro - homenetpro.com
Bizz Wizz - bizz-wizz.com
Top Make Money Site Reviews - topmakemoneysitereviews.com - Tim Johnson
Safe Money Sites - safemoneysites.com
Must Know Information - mustknowinformation.com - Dave Williams
WorkAtHome Scams - workathome-scams.com - Brent Richard
Work From Home Scams - workfromhomescams.net - Mike Taylor
Work From Home Scams - work-athome-2011.info - Brent Richard
Scam Review Products - scamreviewproduct.net
Profit Bank Reviews - profitbank.com - Robert Henderson
Make Money Reviewer - makemoneyreviewer.com - Alex, Phil & Margaret
Michelle Taylor’s Home Jobs Revealed - homejobmanual.com - Michelle Taylor
Real Home Employment - real-home-employment.com
Online Income Creation - onlineincomecreation.com
Top Work From Home - top-work-from-home.com - Chris Stirling
Business Reviews - business-reviews.com - Tom Oki
A1 Review - a1review.com
Work At Home Biz - work-at-home-biz.com
Don’t Get Scammed - dont-get-scammed.com - Mark Hodges
Internet Home Business Reviews - internethomebusinessreview.com
Legitimate Business Reviews - legitimatebusinessreviews.com
Work At Home Scams - work-at-home-scams.com
Work At Home Directory - work-at-home-directory.com
Work At Home Top 10 - workathometop10.com - Jessica Miller
Business Reviews 4 You - businessreviews4you.com - Stan Tomaszewski
Only Reviews - onlyreviews.com
Program Critique - programcritique.com
Best Online Surveys - best-online-surveys.com
Program Review - programreview.com - Jason Isaacson
Johnnys Review Site - johnnysreviewsite.com
Reviews Arena - reviewsarena.com
Integrity Reviews - integrityreviews.com
Internet Business World - internet-business-world.com
Home Business Files - homebusinessfiles.com - Michael H. Kline
Good Internet Money - goodinternetmoney.com - Alan Lim
The Clickbank Guide - theclickbankguide.com
1st Business Review - 1stbusinessreview.com
http://scamxposer.com/fake-home-based-business-review-sites.html?sort=date&type=desc

Saturday, 11 October 2014

The No Cost Income Stream Scam - Business Review


No Cost Income Stream

Overall Rating:Overall Rating
Type of Business:Affiliate Marketing Course
Skill Level Needed:Beginner
Income Potential:Not Specified
Website:http://nocostincomestream.com
Recommended:No

No Cost Income Stream

By David Harris
“No Cost Income Stream”, by Eric Holmlund and found at nocostincomestream.com, is an affiliate marketing course that promises users they don’t have to spend money to set up their online business, but they contradict themselves from the start.
First of all, No Cost Income Stream charges $47 and is going up to almost a hundred bucks unless our exposé can stop that. The first price is not even worth it.
Then there are the endless upsells you have to wade through, once you’ve spent the near fifty bucks and enter the No Cost Income Stream members’ area. Those also cost, so that’s contradiction number 2.
No Cost Income Stream tries to get you to sign up for their hundred dollar coaching upsell, which actually means a boiler room full of shysters who try to upsell you to more expensive programs that do nothing for you but leave you broke.
There are more than several unhappy customers who tried to get their money back from No Cost Income Stream to no avail, so that will cost you too.
The No Cost Income Stream training system is built solely for the most entry level of beginners, so this program will be of absolutely no use to experienced marketers.
While there are plenty of videos to watch, most of the information on them is available elsewhere for next to nothing if not free if you really look.
The No Cost Income Stream bonuses also leave a lot to be desired, which means they are awful. They are all about mythical tales of making money through social media sites.
Least of the No Cost Income Stream flaws is a mediocre website design, but their worst, I would say, is that it is just a way for the runners of this overhyped system to make money, and not so much you.
I’m going with a no on this one. I don’t recommend No Cost Income Stream.
Thanks for reading…

Sunday, 29 June 2014

5 Scams to Avoid When Making Money Online


The World Wide Web has opened up a wealth of opportunities for people who want to make money online by selling products and services, and for those who just want to start their own businesses. Unfortunately, the Web is now cluttered with work from home "opportunities" that are really just scams. Posting misleading claims about how much money you can make and charging fees to find jobs are just two of today's biggest online scams.
When you're looking for real ways to make money online, make sure you steer clear of the following:
Scam 1: Make money typing at home 
Ads for these types of jobs are usually placed in the writing section of craigslist.org and work-from-home job banks. The ads promise you will make hundreds of dollars each week typing at home by writing for companies that outsource work to you. Sounds simple enough, but the catch is you have to pay to get the company listings. These lists cost an average of about $50, and all you will get is a booklet or PDF that contains addresses and phone numbers of dozens of companies thatmight be looking for a writer. There's no guarantee that the companies will hire you as a contractor.
Scam 2: Get paid to surf the Web 
These programs promise to send you a check just for visiting certain Web sites throughout the day. All you need to do is click on certain links and banners to get paid. However, the catch is that you will be required to sign up for certain services and promotions to qualify for payment. In almost all cases, you will have to sign up with a credit card that will be charged until you cancel. You'll be very busy keeping track of cancellations and subscriptions, and may end up getting charged for much more than you bargained for.
Scam 3: The e-mail chain letter
These seem innocent enough at first; all you have to do is send X amount of dollars to the person at the top of the list, add your name to the bottom of the list, and then forward it on to X number of friends. The letter promises that everyone who participates can expect to receive a payment from the next person on the list. This rarely happens because the creator of the chain often keeps his or her name (or his or her friends' names) at the top.
Scam 4: Get rich quick with Google Adsense 
Google's ad program can be a profitable venture for bloggers and Web site owners, but you can only benefit from it when you create unique content and promote your site ethically. Google Adsense "Web site kits" and "Adsense ready" programs are recent scams that promise you can make money online just by owning a template Web site filled with hundreds of pages of content. Unfortunately, these sites receive little or no rankings from search engines, which means your site never gets seen and your ads never get clicked.
Scam 5: Turnkey Web sites to put your income on autopilot
Turnkey Web sites are part of the latest crop of online scams, promising to generate major profits. All you are required to do is purchase a Web site package and recruit other people who purchase the same package you just bought so you can earn a commission on the sale. It's the classic multilevel marketing (MLM) program in disguise, and definitely not worth investing your hard-earned dollars in.http://www.womansday.com/life/saving-money/5-scams-to-avoid-when-making-money-online-76986