17 Minutes Only!

Showing posts with label Scam. Show all posts
Showing posts with label Scam. Show all posts

Tuesday, 27 January 2015

Top 4 Internet Scams & Frauds in 2014



lookout for online scamsApart all the useful stuff and information the Internet is also full of a lot of scams and fraudulent practices. As the old scams get to be known by most people a lot of new ones emerge all the time in order to fool unsuspecting Internet users.
In this article I’ll list you all the new scams that emerged and became infamous in 2014.

MLM for various health products

Now, this isn’t a completely new idea and has been around for ages but apparently around 2013-2014 these scams have reached the mainstream. These scams work by pretending to offer money making possibilities to people in need.
Companies like these approach people in need of money and tell them that they can make money by becoming marketers for their products. The only thing these people will have to do is to convince their friends to become marketers themselves. Once those friends will promote and sell the products of the company the person who convinced them to join will receive a commission on their sales.
These companies usually present a chart according to which if you refer an X number of friends and each one of them refers another Y, then you will be making massive amounts of money by just getting the commissions based on the sales that your friends and their friends etc. generate.
The scam is that marketing of this kind never works. You will not be able to build a long pyramid of friends who all are top marketers who sell many products offered by the company. This stuff just doesn’t works.
On the other hand, in order to participate you will be obliged by the company to make an initial purchase of certain products the company offers. Supposedly this is in order so you may learn and test each product in order to be able to better promote them.
If you haven’t figured it out yet by now, then let me write it down in plain language: YOU are the end customer.
Essentially what’s happening in these scams is that the company does not even intend you to go out and find people to recruit them as marketers. All they are interested in is to get you to purchase the “trial” product package they offer. If you actually manage to convince some of your friends to join then that’s even better as he or she will also have to purchase that so-called trial package.

Binary options

Binary options are a form of financial trading that allow people to bet on the future movement of various financial assets such as gold, silver etc. Essentially, in binary options you will have to predict if the value of an asset will go up or go down during a given time frame.
If your prediction will be correct then you will win a certain amount of money promised before you opened the trade. If you lose, you’ll lose all the money you’ve invested into opening the bet.
There isn’t necessarily anything wrong with this concept expect that a significant number of websites that offer binary options are simply a scam. Once you make a deposit at these websites you will never see your money back. Even if you actually win, the website will simply refuse to pay you no matter what.
While there are legitimate binary options companies available on the Internet, there is a long list of binary options brokers that are a scam and a fraud, as shown on the linked page. So, for the sake of safety people should be staying away complete from this form of trading until the waters will settle.

Fitness Products

Fitness products are nothing new but like the previous two scams they also became increasingly popular this year. Fitness scammers in the past sold their fake products on low-quality websites with terrible designs, which resulted in people avoiding these sites during the recent years.
These days it’s almost impossible to sell health products on a low-quality and ugly websites, as these sites are – rightfully – associated with fraud and scams. For this reason, scammers upgraded their arsenal and began creating nice and shiny websites that follow common web-development and marketing best practices.
The products these websites sell can range from various issues such as fast muscle gain, fat loss, libido enhancement and more. However, all they have in common is that they are usually completely fake.
While these products might not necessarily do any harm (as they usually only contain sugar or flour) they are obviously a complete waste of money.
So, how to distinguish legit online fitness retailers from scams? – There’s two ways. One is to only purchase from providers that also have a very strong offline retail presence. The other is not to purchase any fitness and health products from the Internet and rather ask for advice and recommendations from a licensed physician.

Internet stock trading

Internet stock trading is obviously not a scam in itself. There’s a massive number of online stock trading platforms offered over the internet and a large number of people use them on a daily basis.
The problem with Internet stock trading is that a lot of trading companies have emerged that prey on people with zero trading experience. They usually offer so-called deposit bonuses, which is additional money given on people’s deposits, in order to convince them to register and trade.
These companies generally don’t care if you win or lose as they take a away a commission from the money you have deposited and invested. Sometimes they even get a commission from the companies they recommend you to invest in. You’ve seen The Wolf of Wall Street? – That’s how some online trading sites work.
These are the most prevalent online scams in 2014. As you can see, most of these are disguised as legitimate form of marketing, trading, investing or self-improvement. This is the reason why you have to be very cautions these days when dealing with these things.http://www.debtroundup.com/top-4-internet-scams-frauds-2014/

Wednesday, 5 November 2014

As Internet users adapt to old tricks, scammers find new tactics to exploit


Greetings to you, my friend.
I know this will come as a surprise to you, because you do not know me. My name is Abdul Al-Shallah and I am the son of a deposed government official in Nigeria.
Sound familiar? It’s a boilerplate opening for one of the most common scams in the known world — the Nigerian scam, also known as the “419 scam” or the advance fee scheme. The elements are always the same: someone (preferably royalty or some sort of official) has come into a lot of money, but needs another person outside of the country to use their money for a bribe (or to pay legal fees among other means) to spring the money free. The result is also predictable, with a wire transfer to a con artist’s account and a fake check that confirms a scam has taken place.
This scam is a hallmark of the Internet, but it’s actually much older than that — the advance fee scheme in its modern incarnation dates back to the early 1980s, and various forms can be traced back to before the 20th century. The reason that it sticks around, unsurprisingly, is because it never ceases to swindle millions of dollars from duped victims. The scheme, and many others like it continue to flood inboxes daily, often hitting the Spam folder before you ever lay eyes on it, waiting for a more trusting person to make a trip to the Western Union.
But that’s not to say that Internet scammers are resting on their laurels and leaving their dirty work to these classic methods. As Internet users become more sophisticated (and laugh at the advances of the forlorn Nigerian prince or similarly befallen individual), the chances of finding a willing innocent victim slowly dwindles. Like any other industry, scammers are looking for smarter, more efficient ways to reach their big payouts and to keep their “businesses” running smoothly, so they are forced to adapt and reach new extremes to get their money.
Now, security experts are seeing disturbing trends among scammers that make the old schemes appear to be child’s play. Appealing to the emotional pull of a victim is now just part of the scheme, which now includes familiarity dupes and long-term schemes to raid a bank account. These cons are more targeted, more ruthless and can take out even large corporations and entire governmental programs. There’s a new evolution in Internet con artistry, and it’s putting everyone at risk.
Check out the four new and scary ways con artists are getting their money on the Internet, and real-life examples of how they work.
What do you think of these schemes? Let us know in the comments.

The long con

In the past few years, “spear-phishing” has risen to become one of the biggest trends in online scamming. A play on the hacking technique “phishing,” spear-phishing is a technique that con artists use to specifically target individuals or companies and gain access to information or bank accounts. This method has also become the tactic du jour for cyber criminals interested in attacking big business or government officials. But, that doesn’t mean spear-phishing is too advanced for the regular user.
In a spear-phishing scenario, a hacker is able to crack into an inbox of an unsuspecting victim. But, instead of doing a smash-and-grab and gathering as much information as possible, the criminal takes his time — akin to casing a house before a robbery. Then, the hacker masquerades as an email account of a relatively important company, like Bank of America. The hacker then sends a personalized email explaining to the victim that her account has been compromised, including the victim’s account number to establish credibility, and urges her to quickly change her name and password via a link provided in the email. The victim is duped into downloading nasty malware onto her computer, and the con artist is able to walk away with cash in his pocket.
“They dig deeper down. They know who you’re talking to and what the subject matter is about,”  says George Waller, executive vice president at New Jersey-based cybersecurity software corporation StrikeForce Technologies. “Then they’ll most likely spear-phish you with a malicious attachment or direct you to a site with a malicious download on it.”
And, at times, spear-phishing can drift into the absurd, like the story told by ESET Security Evangelist Stephen Cobb of hackers who had used a victim’s account to steal his money by stealing his heart. The hackers broke into a wealthy victim’s Gmail account and began rifling through the inbox. While reading the emails, they discovered the victim enjoyed frequenting dating websites, looking for a potential long-term mate. The hackers found the victim on the website and posed as a beautiful woman who was romantically interested in him. The hackers proceeded to forge a long-term relationship with him before begging for “emergency” money to be wired via Western Union. The victim readily accepted and the con went off without a hitch.
“This technique is particularly pernicious because it doesn’t immediately look like a scam,” Cobb says. “This isn’t some stranger saying, ‘Hi, you do not know me, but I have come into a large sum of money.’ You’ve gotten to know this person on social media and they’ve targeted you that way.”

The authority dupe

88373578 730x463 As Internet users adapt to old tricks, scammers find new tactics to exploit
Hackers aren’t only making emotional appeals, but also using fear or urgency to manipulate victims into giving over their identities and bank accounts. Waller explains that one of the common methods is that hackers use this tactic while posing as a common workplace resource, like a payroll company. Hackers can lure victims by claiming (ironically) a security breach or emergency that requires a change of password or download of a file. At that point, victims begin to divulge critical information or, perhaps even worse, download malware onto their computers that allows hackers to infiltrate computers and unlock even more information. Victims are tricked into believing they’re securing their systems and tying up loose ends, not compromising them.
“We’re all tied to the Internet and it’s part of our daily lives,” Waller explains. “We’re looking at it to check our emails and to conduct our business, but if you’re multi-tasking and you see something you recognize that’s actually a piece of spyware, it only takes one click. One click, and you’re infected.”
Another notable way that con artists take advantage of victims doesn’t directly involve a computer at all, but instead relies on a victim’s lack of knowledge about technology to earn a quick dollar. Cobb explains that one of the most common scams the ESET teams see are “IT phone calls,” where con artists call computer owners pretending to be Microsoft or Apple support techs and convince victims that their computers are riddled with “errors” — standard computer functions that can look threatening to an uninitiated computer user. They will even go so far as to walk the victim through a series of tests to “prove” the infections exist on the computer, even though many of them are common. By feigning emergency (and following a script), con artists can snag a quick $50 or so from concerned people.
“This scam is going on everywhere in the English-speaking world,” Cobb explains. “And everybody who has Windows has gotten a problem before. The pitch for the product is constantly evolving and it really tricks people.”

The puppet

Hackers are posing as friends, authority figures, and they’re even pretending to be you. One of the easiest ways hackers can trick victims is by posing as a real friend or relative of someone they know — a type of hyper-specialized spear-phishing that chooses new marks by consulting information from a previous victim. Con artists, through a key-logger or malware, can figure out their next targets by simply looking at emails. The former victim’s closest friends are usually the easiest targets, as it is simple to convince them to open a suspicious file or link. As the new crop of users get conned, they create new pools by which a hacker can find new victims. In this vicious cycle, it turns those who fall for scams into tools to be used against the people they care about most.
“I think it’s a natural evolution for the scammer,” Cobb says, “Spam in general is all about volume — you have to send out large number in order for it to work. But now, the numbers games aren’t working and hacking costs money, so putting more time into a victim is becoming more lucrative. Why try to target someone for a wire transfer who has never done a wire transfer? Find someone who knows how to do a wire transfer and has money, and it’s worth the time to work that person.”
This technique was actually recently used on Waller himself while he was at his own company, no less. As an executive that works frequently with local shipping services, Waller wasn’t surprised to find that USPS sent him an email one day explaining that a package missed delivery and needed to be picked up. The email looked legitimate, and included directions to his nearest post office (listing a known address three blocks away) and a link to the receipt. Waller was certain his company didn’t have any outstanding orders or package deliveries, and remained suspicious of the email. Still, he clicked the email’s link anyway — and it turned out to be malware.
“This isn’t even a sophisticated attack. This is just a standard phishing attack,” Waller said, “But if you’re a larger company or a person, it’s easy to see how someone can be deceived by all of this.”

The bait and switch

137179490 730x486 As Internet users adapt to old tricks, scammers find new tactics to exploit
Of course, nothing does quite as well as an updated version of the classic bait and switch — a con artist promising one piece of information and instead providing something unwanted such as a trojan or malware. Bait and switch operations are finding a niche in the Internet, where it is easy to pass off a malicious piece of software as a PDF or other file. Waller spoke of a group of hackers that had bought the email addresses of thousands of CFOs on the black market and was able to successfully bait them into downloading malicious software. Using the bought names, the hackers posed themselves as the IRS and sent emails to everyone, claiming that the enterprise tax codes for the year had changed. The email offered a “handy” PDF of all of the changes which, of course, was infected with a keylogger. After the CFOs unwittingly downloaded the harmful software, the keylogger set to work — analyzing the keystrokes until it was able to gather the usernames and passwords of each companies’ payroll system. That was when the magic happened.
“The hackers picked out CFOs that had several hundred to several thousand employees on purpose because those companies always experience a large turnover of full-time and contracted employees,” Waller explained. “The hackers were able to log in to the payroll service as the CFO and add a few extra payees to the account without attracting any suspicions.”
This technique occurs on a larger scale in the classic con artist technique of the dubious poll. Companies of varying repute are always advertising online polls and surveys that promise something free — whether it be an iPad or a cruise to the Bahamas. Users can take these polls online with the promise of a cash payout or fancy prize on the horizon, only to be goaded into a high-pressure situation where they must either sign up for multiple subscriptions or buy additional products in order to get their “free” reward. This scheme has been used across other media, including phones, but it remains one of the most persistent and successful scams. Cobb attributes the technique’s profitability to the ongoing economic crisis throughout the world.
“In an economy where a lot of people are underemployed and looking for extra money, a lot of people will be interested in a $1000 Wal-Mart Survey,” Cobb says. “And, people think that it’s not really free money because they’re convinced they’re working for it. They can convince themselves that what they’re doing is okay.”

How to stay safe

The world of cyber scams isn’t only constantly evolving — it’s relying on a variety of old and new methods to keep the income of cash flowing. This is just a fraction of the kind of schemes that are happening on the Internet today, and only related to email. Scammers are constantly trolling places like Craigslist, message boards and even Facebook groups to make a quick dollar off of unsuspecting people, and there’s a lot at stake.
As always, when avoiding these con schemes, there’s no substitute for good old fashioned common sense. The better that you as an Internet user become at detecting and fending off scams, the less likely you will find yourself upset at the hands of a manipulative con artist.
It’s simple enough to find out whether something is a scam by doing a routine search on Google when any suspicious activity appears in your mailbox. If something has come up in the recent past to indicate that the email you’re reading is actually a piece of malware or a scam, it will likely show up on message boards or in blog posts of security firms. It’s also a smart idea to research anyone you do not know who has contacted you or requested your friendship on a social network. Knowledge, in this case, truly is power.
Cobb agrees that it’s best to be skeptical of your surroundings, and also cautions others to be aware of what they put on social media. The more valuable information a user puts on a public social media profile like Facebook or Twitter, the easier it is to not only break into accounts but also dupe you into believing a scam’s authenticity. So, refrain the next time you think about putting your entire family tree or the history of places you went to school on your public timeline.
“People just don’t realize how helpful over-sharing in social media is to bad people,” Cobb says. “We talk to people about not sharing too much because it’s embarrassing  but there’s also an exploitation factor. Use the technology with an understanding that there are people out there who are working all the time to exploit you.”
Waller advises that every user maintain a comprehensive security system that blocks all forms of attacks, including keystroke-logger protection and anti-virus. Because software solutions rarely cover all bases, it’s also important that you secure available programs with a reliable two-factor authentication system like Google Authenticator. A combination of apps and steady vigilance will ensure that hackers won’t be able to sneak into your important accounts unannounced.
“You need to look for proactive approaches to all of this, because the deceptiveness that occurs every day is incredible,” Waller says.
And never, ever go to a Western Union and wire cash unless you know what you’re doing. Ever. Seriously. Just don’t.

Monday, 30 June 2014

Get Cash For Surveys Review


Get Cash for Surveys

Overall Rating:Overall Rating
Type of Business:Get Paid Taking Surveys Programs
Skill Level Needed:none
Income Potential:very little
Website:http://getcashforsurveys.com
Recommended:No

Get Cash for Surveys Review

By David Harris
“Get Cash for Surveys” by Gary Mitchell and found at getcashforsurveys.com is a site where you get paid to take surveys. They charge you $37 to sign up with them and claim you will make thousands weekly by doing so.
This is an unfeasible claim for “Get Cash for Surveys” to make. Generally, survey sites like Get Cash for Surveys don’t usually pay out very much money for you to take the surveys they manage for companies who hire them to do research and marketing.
There are certainly many other survey sites you won’t have to pay to sign up with, but at least “Get Cash for Surveys” is part of Clickbank, so you can at least get your money back through Clickbank if you’re not happy with results, which I’m sure won’t be any.
You can make a few hundred dollars every few months, as it takes a while to get paid from several of the surveys you take. However, Get Cash for Surveys claims you will make thousands every month, and that puts them in my sights as that is just a flat out lie!
Most of the time, you might not even qualify to take many of the surveys, as the research companies are looking for certain consumers within their criteria. Some survey don’t even pay out, they are sometimes only entries to contest drawings.
Many companies like ‘Get Cash for Surveys’ are just collecting your personal data to sell to third party companies, so their claims that you can make thousands per month is just a way to lure you in to give them your valuable information to use as they see fit.
Taking surveys is a nice little hobby that may earn you very little extra money but it at least earns you a little, as opposed to doing crossword puzzles to pass the time. If you are looking for a hobby, sign up with any of the survey sites that don’t charge you anything.
As a hobby many enjoy giving their opinions and getting a little back. As a way to earn a living online, it’s not.
You will never earn enough to quit your day job.
I do not recommend “Get Cash for Surveys“.
Thanks for reading…