8 Surefire Ways to Spot an EBAY Scam E-Mail and Protect Yourself from Identity Theft

Ebay is a great site and is used by many to buy and sell new and used Items. It truly is the worlds Largest Garage Sale Unfortunately when an online site becomes as big and popular as E-Bay the scam artists seem to just naturally follow. These Scam artists will often try to steal your Idenity and get your bank or credit card information in addition to your E-Bay Id and Password

A Typical Ebay Scam Artist will send you an e-mail requesting that you update your account. Often this request to update your account is made under some false pretence like it is suspended or has been suspected of Fraudulent use. Here is a Copy of a recent Ebay Scam E-mail I received http://ewguru.com/ebay-scam. You will notice the E-Bay Link on this page looks real. Don't click it. You can however do a right click properties and notice that it is in fact a phony link.

E-bay has an excellent online Tutorial that teaches how to spot and protect yourself from spoof e-mails http://ewguru.com/spoof-emails

Here are 8 Surefire Ways to Spot an EBAY Scam E-Mail and Protect Yourself from Identity Theft

1 - Wrong E-Mail Address

Any E-mail Sent to an E-mail Address that is Not Your Primary Ebay E-mail Account is more then likely a scam.

2 - Fake links.

While many emails have links included, just remember that these links can be forged too. After you click on the Link a Real E-Bay Address should appear. To determine if the Web address in your browser is a real eBay address, look for ".ebay.com" immediately before the first "/".

3 - Requests Personal Information

Any E-mail that requests you enter personal information like User ID, password or bank account number either by clicking on a link in the E-mail or completing a form within the e-mail are a strong indication the e-mail is a SCAM

4 - Urgent Subject Lines

Subject likes * * * Please Verify & Update Your Account * * *

5 - Generic greetings.

Lot's of emails begin with a Greeting, such as: "Dear Ebay member instead of the Name you used when you registered for your account

6 - Scare to Action

Many Fake emails try to trick you with the threat that your account is in jeopardy if you don't sign in and fix it NOW!

7 - HTML Website Fakes

Emails that appear to be websites. Some emails will look like a website in order to get you to enter personal information. Ebay never asks for personal information in an e-mail.

8. Misspellings and bad grammar

Fake emails may contain misspellings, incorrect grammar, missing words. Many Times these are used to trick the E-mail Filters

A quick review If you receive an E-mail with a Link requesting you to click on the link and sign in to your E-bay account, Don't Do It!

If you receive an E-mail that looks like an Ebay Sign in Form, Don't Sign in!

If you are unsure if the e-mail is Real or fake forward it to [email protected] and request assistance.

If you absolutely must login to your Ebay account then I would highly recommend you do the Following. Close all open Browser sessions. Run a Spyware check on your computer You can get a free Spyware program here (http://ewguru.com/sware) then type in http://www.ebay.com/ directly into your Browser window and Login from the E-bay Web Page. Never click on a Login Link from Any E-Mail.

About The Author:
Mike Makler has been Marketing Online Since 2001 When he Built an Organization of over 100,000 Members

Get Mike's Newsletter:
http://ewguru.com/newsletter

More Articles by Mike:
http://ewguru.com/tips

Permission Based E_Mail Marketing Methods
http://ewguru.com/hbiz/amazingoffer.html

Copyright © 2005-2006 Mike Makler the Coolest Guy in the Universe

[You have permission to publish this article electronically or in print, free of charge, as long as the bylines are included. A courtesy copy of your publication would be appreciated getarticles At Ewguru .Com]

In The News:


Kitsap Sun

OC launches investigation of security director
Kitsap Sun
BREMERTON — Olympic College has launched an investigation of complaints against its director of campus safety in light of a vote of no confidence by the union representing security guards. The vote, taken in mid-January, showed 88 percent of members ...


The Sun

Security services knew of glaring weakness in Parliament security after 'war game' simulating attack on Westminster ...
The Sun
SECURITY services were aware of gaps in Parliament's security after a simulated attack ended with most MPs being killed, it has been claimed. A source quoted by the Sunday Times claimed a “table-top” exercise revealed four terrorists with automatic ...
Security chief told MPs they were safe in parliament before attackThe Guardian
Urgent review of security gates of Parliament needed after Westminster attackExpress.co.uk

all 56 news articles »

The Independent

Security breach renders in-flight laptop ban useless
The Independent
The airport which is the main target of the Government's ban on electronic devices has a security flaw that renders rigorous checks futile, The Independent can reveal. After clearing six separate security hurdles at Istanbul airport, passengers bound ...

and more »

Rochester Democrat and Chronicle

JCC receives $200,000 to improve security - Democrat and Chronicle
Rochester Democrat and Chronicle
Funds will be used to upgrade cameras and other measures following two bomb threats at the Brighton facility this month.
JCC of Rochester gets $200,000 for security enhancements | WXXI ...WXXI News

all 4 news articles »

The Independent

WhatsApp: Scapegoat for London's security lapses
DEBKA file
British Home Secretary Amber Rudd Sunday, March 26, attacked WhatsApp for refusing intelligence services and police access to its encrypted messaging service, used by Khalid Masood three minutes before his terrorist rampage in London last Wednesday.
Ex-cyber security chief says Government is 'using' Westminster attack to grab unnecessary spying powersThe Independent
WhatsApp security debate must be informed or we will all sufferiNews
Home Secretary Amber Rudd: Give security services access to WhatsAppThe National

all 175 news articles »

Reuters

Britain reviewing security at parliament after deadly attack
Reuters
Interior minister Amber Rudd told the BBC there would be another review of security at the Palace of Westminster, but that such arrangements were continually assessed. "There are constant reviews and updates so that we have the right form of defense in ...
London attack fuels calls for tighter Westminster securityThe Guardian
London attack: Parliament security under reviewBBC News
Questions over Parliament security as motorcyclist rides through gate shortly after terrorist attackTelegraph.co.uk
Wall Street Journal (subscription)
all 8,413 news articles »

The Japan Times

European security ties 'too precious' for Brexit talks
The Japan Times
LONDON – Britain's intelligence expertise may be “too precious” to use as a bargaining tool in the upcoming Brexit talks, experts said, after a terror attack in London highlighted the need for continued European security cooperation. The suggestion ...

and more »

New System Estimates Cleveland Airport Security Wait Times
U.S. News & World Report
New System Estimates Cleveland Airport Security Wait Times. Cleveland's main airport is developing a system to help travelers more accurately compare wait times at its security checkpoints and better plan their trips. | March 27, 2017, at 12:08 a.m.. MORE.

and more »

Huffington Post

What Don't We Talk About When We Talk About Israel's Security
Huffington Post
When Israeli and American Jews talk about “Israel's security” they are thinking about the Holocaust and about extermination. That is the reason they choose the narrowest possible definition of “security,” a strip. Israel's “security” is what we ...

and more »

Otago Daily Times

Ivory Coast rescinds port security measures, attack threat unfounded
Reuters
"After compiling the information ... it emerged that the threat is not real," the head of maritime security Colonel Bertin Koffi Tano wrote in a second order to the Abidjan and San Pedro port authorities and shipping companies on Sunday. "I ask that ...
Ivory Coast boosts port security over attack threatOtago Daily Times

all 5 news articles »
Google News

40 Million People Hacked - YOU as Identity Theft Victim

Saturday, MasterCard blamed a vendor of ALL credit card providers... Read More

Desktop Security Software Risks - Part 1

This is the second in a series of articles highlighting... Read More

How To Cover Your Tracks On The Internet

Every single time you access a website, you leave tracks.... Read More

Reclaim Your PC from the Internet Spies

Viruses are, however, not the only malicious software programs out... Read More

6 Ways To Prevent Identity Theft

These six ways to prevent identity theft offer you valuable... Read More

Top Ten Spyware and Adware Threats Identified

On December 8, 2004 Webroot, an award winning anti-spyware solution... Read More

Message Board Security Problems

Security leaks can be a big problem for any site... Read More

Hacked: Who Else Is Using Your Computer?

A friend called me one day and asked if I... Read More

How To Be Your Own Secret Service Agency

So you want to know who your kids are chatting... Read More

Eliminate Adware and Spyware

Everyone should eliminate spyware and adware from your hard drive... Read More

Internet Scams: Dont be a Victim

As the number of people using the Internet as an... Read More

Are They Watching You Online?

When surfing the Internet you probably take your anonymity for... Read More

Consumers: Shop Online and Get Information Safely

Do you really have to know how feeds work? Not... Read More

Hacking Threats and Protective Security

The 1998 Data Protection Act was not an extension to,... Read More

Burning Bridges is Bad, But Firewalls are Good

When you signed up for that ultra-fast DSL or Cable... Read More

Secure Your PC From Hackers, Viruses, and Trojans

Viruses, Trojans and Spyware: Protecting yourself.No user on the internet... Read More

Watch Out For That Scam

The IFCC (Internet Fraud Complaint Center) received over 200,000 complaint... Read More

Internet Privacy

Over the past few years as the internet has become... Read More

Road Warrior At Risk: The Dangers Of Ad-Hoc Wireless Networking

Airport Menace: The Wireless Peeping Tom ---------------------------------------- As a network... Read More

Is The Internet Over Regulated

Today's Internet or World Wide Web is being over regulated.But,... Read More

Anti-Spyware Protection: Behind How-To Tips

There is no doubt that "how-to articles" have become a... Read More

Adware and Spyware: The Problems and Their Solutions

The Threat10 years ago you could probably have run no... Read More

Computer-Virus Writers: A Few Bats In The Belfry?

"Male. Obsessed with computers. Lacking a girlfriend. Aged 14 to... Read More

Preventing Online Identity Theft

Identity theft is one of the most common criminal acts... Read More

Secrets On Security: A Gentle Introduction To Cryptography

Let us take the example of scrambling an egg. First,... Read More