Dont Fall Victim to Internet Fraud-10 Tips for Safer Surfing

The Internet offers a global marketplace for consumers and businesses. However, criminals also recognize the potential of cyberspace. The same scams that have reached us by telephone and in our mailbox can now be found on the World Wide Web and in email. Organizations such as the National Fraud Information Center have emerged to help people recognize shady schemes in order to prevent further victims.

According to the Internet Fraud Complaint Center (IFCC), a partnership between the National White Collar Crime Center and the FBI, the number of fraud victims is in the hundreds of thousands and total dollars lost are in the hundreds of millions, and rising at an exponential rate. A search on Google for "internet fraud" results in over 3,200,000 listings at the time of this writing!

It is difficult sometimes to tell the difference between reputable online sellers and criminals who use the Internet to separate people from their money. You can protect yourself by learning how to recognize the danger signs of fraud. If you are a victim of Internet fraud, it is important to file a complaint with the IFCC at http://www.ifccfbi.gov quickly so that law enforcement agencies can quickly shut down the fraudulent operations.

· Know whom you're dealing with. If the seller or charity is unfamiliar, check with your state or local consumer protection agency and the Better Business Bureau (http://www.bbb.org). Search the Federal Trade Commission website (http://www.ftc.gov) for the company or organization that you are considering doing business with. Some Web sites have feedback forums, which can provide useful information about other people's experiences with particular sellers. Get the physical address and phone number (and actually make a call before you give them money-to make sure that the phone number is correct) in case there is a problem later.

· Guard your personal information. Make sure that any website that requires sensitive information is encrypted. An encrypted website usually has a yellow padlock symbol somewhere on the page, typically at the bottom. Don't provide your credit card or bank account number unless you are actually paying for something. Your social security number should not be necessary unless you are applying for credit. Be especially suspicious if someone claiming to be from a company with whom you have an account asks for information that the business already has.

· Pay the safest way. Credit cards are the safest way to pay for online purchases because you can dispute the charges if you never receive your order, or if the offer was misrepresented. Federal law limits your liability to $50 if someone makes unauthorized charges to your account, and most credit card issuers will remove them completely if you report the problem promptly.

· Look for information about how complaints are handled. It can be difficult to resolve complaints, especially if the seller or charity is located in another country. Look on their website for information about programs that require standards for reliability and assistance in handling disputes with which the company or organization participates.

· Be aware that an organization without complaints is not a guarantee. Fraudulent operators set up shop and close down quickly, so the fact that nobody has made a complaint doesn't mean the seller or charity is legitimate. You still need to look for other danger signs of fraud.

· Understand the offer. A legitimate seller will give you all the details about the products or services, the total price, the refund and cancellation policies, the terms of any warranty, and the delivery time.

· Think twice before entering contests operated by unfamiliar companies. Fraudulent marketers sometimes use contest entry forms to identify potential victims.

· Be cautious about unsolicited emails. They are often fraudulent. Recent legislation requires all marketing emails to include a working link that enables the recipient to be excluded from future mailings.

· Beware of imposters. Someone might send you an email pretending to be connected with a business or charity. Others may create a website that looks just like that of a well-known company or charitable organization. If you're not sure that you're dealing with the real thing, find another way to contact the legitimate business or charity.

· Beware of "dangerous downloads." In downloading programs to see pictures, hear music, play games, etc., you could download a virus that wipes out your computer files or connects your modem to a foreign telephone number, resulting in expensive phone charges. Only download programs from websites you know and trust. Read all user agreements carefully.

Eric Buck is an established ezine publisher and direct marketer who specializes in helping ordinary people make extraordinary money working from home on the internet. Sign up for the Home Business Tips newsletter at http://www.homecashincome.com

In The News:

This RSS feed URL is deprecated, please update. New URLs can be found in the footers at https://news.google.com/news

Gizmodo

Amazon is now selling home security services, including installations and no monthly fees
TechCrunch
Amazon's made a slew of acquisitions in the area of smart home services, and now it's offering a product that brings them together under one roof — your roof. Amazon has quietly launched a portal offering home security services — which include all ...
Security Researchers Created a 'Skill' that Allows Alexa to Spy on YouGizmodo
Amazon launches home security services; Alexa gains memory, more conversationsSeeking Alpha
Is Alexa spying on YOU? Security researchers reveal how the assistant's code could be tweaked to create new 'skill ...Daily Mail
Boing Boing -Investor Relations Solutions -Tech Times -Checkmarx
all 190 news articles »

Washington Post

Top Homeland Security officials urge criminal prosecution of parents crossing border with children
Washington Post
The nation's top immigration and border officials are urging Homeland Security Secretary Kirstjen Nielsen to detain and prosecute all parents caught crossing the Mexican border illegally with their children, a stark change in policy that would result ...
Homeland Security officials want to prosecute all parents who cross border with kids: reportThe Hill
Lawmakers slam Trump's Homeland Security chief over focus on immigrant caravan, border wallCNN

all 26 news articles »

Digital Trends

Reolink's latest breakthrough pulls the plugs on smart security cameras
Digital Trends
After a string of successes, Hong Kong-based security camera manufacturer Reolink is getting good at crowdfunding campaigns. Its latest project to land with a smash on Indiegogo is the Reolink Go, a powerful 4G-enabled, solar-powered security monitor ...

and more »

Washington Post

Mattis: US would regret delegating security in Syria to a force with no American involvement
Washington Post
Defense Secretary Jim Mattis said Thursday that the United States would regret installing a holding force in Syria without American involvement, indicating military leaders harbor reservations about a White House effort to task Arab militaries with ...

and more »

Herald-Mail Media

WCPS superintendent talks safety, security at listening session
Herald-Mail Media
Safety and security remain on the minds of Washington County Public Schools students and parents as the district works to identify potential improvements. WCPS Superintendent Boyd Michael again fielded questions on the topic during a listening session ...


CNN

Deputy US marshals on Rosenstein security team save woman after fentanyl overdose
CNN
(CNN) Last year, Deputy Attorney General Rod Rosenstein traveled to China to press leaders on the country's export of the lethal synthetic opioid fentanyl to the United States. Days ago, two members of his security detail were confronted with the ...

and more »

Bloomberg

How Short Sellers Built a Business on Security Bugs
Bloomberg
In an email sent to the general security inbox maintained by the Santa Clara, Calif., chipmaker, an executive of a security company located on the other side of the world claimed to have discovered 13 critical vulnerabilities in AMD's line of chips ...


CBS News

National security experts on challenges of the American presidency
CBS News
According to Stephen Hadley, who was national security adviser to George W. Bush for close to a decade, President Trump faces "the most challenging situation we've faced as a country internationally since the end of the Cold War." Hadley also worked in ...

and more »

The Japan Times

Tight security surrounds Kim Jong Un, even more so than previous North Korean leaders
The Japan Times
Ri Yong Guk, a defector from the North who served on a security detail for Kim Jong Il, wrote in a 2013 memoir that as many as six different layers of security guards protected the leader on trips to the countryside to inspect military units, plants or ...
Kim's Jong Un's Security: "Not Even An Ant Can Pass Through"NDTV

all 3 news articles »

Brookings Institution

Redefining national security: Why and how
Brookings Institution
From climate change to public health to migration, global trends formerly considered separate from national security are increasingly understood to shape American security interests at home and abroad. Drawing connections to U.S. national security has ...

Google News

Information Security for E-businessmen: Just a Couple of Ideas

If you constantly deal with bank or electronic accounts, it... Read More

Phishing - Identity Theft & Credit Card Fraud

What is Phishing? Phishing is a relatively newly coined term... Read More

7 Ways to Spot a PayPal Scam E-Mail

Paypal is a great site and is used by many... Read More

Online Cell Phone Scams and Spam

They're out there. Individuals trying to make a quick buck... Read More

How to Know Whether an Email is a Fake or Not

A few nights ago I received an email from "2CO"... Read More

If You Sell Anything Online Your ePockets Are Being Picked

You and I are a lot alike. We are both... Read More

Computer-Virus Writers: A Few Bats In The Belfry?

"Male. Obsessed with computers. Lacking a girlfriend. Aged 14 to... Read More

Wireless Network Security

Working from home has its advantages, including no commute, a... Read More

How To Clean the Spies In Your Computer?

Manual Spy Bot Removal > BookedSpaceBookedSpace is an Internet Explorer... Read More

Can I Guess Your Password?

We all know that it's dangerous to use the same... Read More

Password Security and Safety

There is nothing more important that password security in world... Read More

Its War I Tell You!

There are ways to insure security though. You can get... Read More

Top 10 tips for Safe Internet Shopping

Over £5 billion pounds was spent on online shopping in... Read More

I Spy...Something Terribly Wrong (In Your Computer)

This really chapped my lips...I recently bought a new computer.... Read More

SPYWARE - Whos Watching Who?

I am in the midst of Oscar Wilde's The Picture... Read More

Protect Your Little Black Book

The movie Little Black Book features a young woman, Stacy,... Read More

Dont be a Dork ? Protect Yourself

There are folks out there who use their powers for... Read More

Be Alert! Others Can Catch Your Money Easily!

So called phishers try to catch the information about the... Read More

Be Aware of Phishing Scams!

If you use emails actively in your communication, you must... Read More

Make Money Online - Defend Against The Latest Scam

First, let's do a little recap'. As I stated in... Read More

Securing Your Accounts With Well-Crafted Passwords

In the past I've never really paid much attention to... Read More

DOS Attacks: Instigation and Mitigation

During the release of a new software product specialized to... Read More

With the Rise of Internet Crimes, Users are Turning to High-Tech ?PI?s? for Solutions

High-tech private investigators are becoming the answer for many Internet... Read More

Types Of Computer Infections

Computer infections can be broken up into 4 main categories... Read More

IPv6 - Next Step In IP Security

IPv6, IntroductionThe high rate at wich the internet continualy evolves... Read More