Deprecated: mysql_connect(): The mysql extension is deprecated and will be removed in the future: use mysqli or PDO instead in /home/a26f9f83/public_html/articles/includes/config.php on line 159
Avoiding Scams: If It Sounds Too Good to Be True, It Probably Is > NetSparsh - Viral Content you Love & Share

Avoiding Scams: If It Sounds Too Good to Be True, It Probably Is

A week or so ago, I received an inquiry from a man in Indonesia about buying multiple copies of certain items on my website. I immediately suspected fraud, so I explained that I only had one piece of each. The man, who wrote impeccable English, said that was fine. I asked why he wanted to buy so much money's worth of jewelry (it was around $250). He said it was for his wife and daughters.

He then asked if he could email me the billing and shipping info instead of using the catalog. I told him the catalog was better, since it was more secure, and figured if he was a scammer, it would be too much work for him.

No such luck. He was unusually together. He placed an order for the same items he had asked about (most scammers forget). I started allowing myself to feel happy about such a large order and the money that would bring. At the same time, I started researching shipping to Indonesia, as well as fraud protection, and found that a) Indonesia is second only to Nigeria in credit card fraud levels, and b) jewelry is prohibited to ship to Indonesia.

Per suggestions on another site, I asked the customer for a CVV number, the bank listed on the credit card, and the customer service number on the card. He sent me the CVV and customer service number. He also said he had just received a diamond ring sent to him, so he didn't think the prohibition existed.

Today I started checking. I called the customer service phone number he gave me; it was for a Canadian bank, and the number didn't belong to one of their cards. The fishy smell grew stronger.

I then contacted an American bank to find out where the number originated. They gave me the runaround for a while until someone there gave me the number for Visa International, 800-847-2911, since the card number started with a 4. Visa International told me which bank to call.

When I finally got to the right bank, and told them I was a merchant checking on fraud, they confirmed my suspicions. The card was at an American address, and it had no other suspicious charges on it. I asked if there were any tiny charges, like for penny amounts. Indeed there were. This part is important!

In Indonesia, they are very sophisticated; one of the ways they get credit card numbers is to run random computer-generated numbers with expiration dates until they get some that go through. They put through charges for tiny amounts that people won't bother to contest, and if the charge goes through, they know it's good. So do watch out for penny amounts showing up on your credit card bills.

I asked the woman to check the CVV number as well, and she said it did not check out. So the charge would not have gone through anyway, but I feel better having checked, even if it took way too much time.

Lesson: the scammers are getting more sophisticated all the time. They can also read materials on the internet that give warning signs about scammers. So they are trying to avoid some of the more obvious signs. If it sounds too good to be true, it probably is!

Author Susan Midlarsky of Aspiring Arts handcrafts jewelry with stones that harmonize well and are beneficial to the human body, color combinations that are connected to refinement, and sometimes offerings from nature. She has also recently started making glass beads; you can see her progress at her online blog. Susan loves the magical glow people feel upon finding a piece of jewelry that is exactly right for them.

In The News:

This RSS feed URL is deprecated, please update. New URLs can be found in the footers at https://news.google.com/news

NPR

Hacks, Security Gaps And Oligarchs: The Business Of Voting Comes Under Scrutiny
NPR
"Election officials have been doing a ton around election security, but if that same thing isn't going on at the vendor level, then that creates a really big potential vulnerability for the entire system," said Edgardo Cortéz, an election security ...

and more »

WOAI

Security guard nearly run over after stumbling onto drug deal
WOAI
SAN ANTONIO - A security guard is nearly run over after breaking up a drug deal on Perrin Central near Perrin Beitel and Wurzbach Parkway. Police said that about 1 a.m. Friday the guard saw four people in the parking lot of the Oak Springs Apartments ...

and more »

Politico

NSA: Security breaches of hacking tools curtailed snooping
Politico
The National Security Agency shut down expensive and vital operations as a result of top secret information being spirited out of its headquarters by a fired NSA computer engineer who claims he took the sensitive records home to work on bolstering his ...


Mashable

A woman accosted a security guard with a fanny pack containing a pigeon
Mashable
A well-planned surprise can be an absolute joy. A surprise birthday party? So much fun! An unexpected gift? Yes, please! A surprise pigeon? Hard pass. Following an altercation with employees at a Social Security Administration office in Virginia on ...
Woman hits security guard with fanny pack containing pigeon, police sayMyPalmBeachPost
Woman pulls knife on security guard, hits him with fanny pack that had pigeon insideWashington Post
Woman pulls knife on security guard, then hits him with bag that had pigeon insideThe Independent

all 37 news articles »

WIRED

Clouldflare and Google Will Help Sync the Internet's Clocks—and Make You Safer
WIRED
The internet's decentralized nature means that the clocks behind every web browser and web application can actually have major discrepancies, which in turn can undermine security protections. In a step toward addressing these inconsistencies, the ...


The Verge

Amazon is turning the Echo into a security system
The Verge
Amazon is adding a few new features to the Echo that turn it into one of the basic pieces of a smart security system. Since Echo speakers are always listening, they'll be able to start listening for the sound of broken glass, or for a smoke or carbon ...
Alexa Guard turns Echo products into security devicesTechCrunch
Alexa Guard makes your Echo a home security deviceEngadget
ADT and Amazon Team Up to Provide Customers With New Home Security FeaturesNasdaq

all 2,304 news articles »

USA TODAY

Terrorism task force investigating 'security breach' at Orlando Melbourne airport
USA TODAY
MELBOURNE, Fla. – The Joint Terrorism Task Force is overseeing the investigation into an overnight incident involving a man suspected of hopping a fence at the Orlando Melbourne International Airport and boarding a vacant American Airlines Airbus in a ...
Student with pilot's license arrested after security breach at Melbourne International AirportWFTV Orlando
Orlando Melbourne International Airport security breach: What we knowFlorida Today
Officials ID student pilot accused of breaching Florida airport securityNews 13 Orlando
SpaceCoastDaily.com -Palm Beach Post -Florida Today
all 1,042 news articles »

The State of NAIC's Data Security Model Law
Insurance Journal
Most states have yet to adopt a cyber security model law for the insurance industry like the one approved by the National Association of Insurance Commissioners in 2017, but one expert believes the industry should be prepared for what he sees as an ...


ZDNet

SingHealth data breach reveals several 'inadequate' security measures
ZDNet
Investigation into Singapore's most severe cybersecurity breach has uncovered several poor security practices, including the use of weak administrative passwords and unpatched workstations. The findings were revealed on the first day of hearings led by ...

and more »

CIO

Pentagon CIOs struggle with legacy tech, security. Sound familiar?
CIO
Flanders, CIO of the Defense Health Agency, is gearing up to consolidate control over the Pentagon's sprawling network of treatment centers, in the process centralizing a far-flung set of IT operations that raise a host of security and device ...

Google News

Watch Out For That Scam

The IFCC (Internet Fraud Complaint Center) received over 200,000 complaint... Read More

Dont Fall Victim to Internet Fraud-10 Tips for Safer Surfing

The Internet offers a global marketplace for consumers and businesses.... Read More

How to Know Whether an Email is a Fake or Not

A few nights ago I received an email from "2CO"... Read More

How to Thwart the Barbarian Spyware!

Today,on most internet user's computers, we have the ability to... Read More

How to Protect Your Child from the Internet

When the Internet first came about, it was realized it... Read More

Internet Scams: Dont be a Victim

As the number of people using the Internet as an... Read More

Is the Internet Insecure Because of You?

Long gone are the days that we could feel secure... Read More

Protecting Your Home Both Inside and Out

If you are a parent, you have probably wondered at... Read More

Spyware is Not Like a Nosy Neighbor

Remember the television show about the nosy neighbor Mrs. Kravitz... Read More

Hacking Threats and Protective Security

The 1998 Data Protection Act was not an extension to,... Read More

Hacked: Who Else Is Using Your Computer?

A friend called me one day and asked if I... Read More

Secure Your PC From Hackers, Viruses, and Trojans

Viruses, Trojans and Spyware: Protecting yourself.No user on the internet... Read More

How Spyware Blaster Can Protect Your Computer From Harm

By browsing a web page, you could infect your computer... Read More

Clown Internet Scam - An Internet Scam is Currently Targeting Clowns and Other Entertainers

I am the victim of an internet scam. It is... Read More

Sarbanes-Oxley: A Cross-Industry Email Compliance Challenge

Is your enterprise following the rules?The bulk of financial information... Read More

Protecting Your Identity On The Internet

Afraid that someone is monitoring your PC or installed a... Read More

Avoid Internet Theft, Fraud and Phishing

Since its birth, the Internet has grown and expanded to... Read More

Is My PC Vulnerable on the Internet?

No longer are viruses the only threat on the internet.... Read More

Virus Nightmare..Lessons Learned

I got a virus the other day, Thursday I believe... Read More

If You Steal It, They May Come!

Business on the internet is getting down right shameless. This... Read More

Web Conferencing Readers - So What Do We Do with the PAYPAL SPAMMER

From: "Paypal Security" Subject: New Security Requirements Date: Tue, 26... Read More

How Free Scripts Can Create Security Problems

With the Internet entering our lives in such an explosive... Read More

3 Steps to Ending Scams and Virus Problems

Watching how the traditional media covers the latest virus or... Read More

Data Security; Are Your Company Assets Really Secure?

Is your data secure? Think again. Securing data is unlike... Read More

A New Era of Computer Security

Computer security for most can be described in 2 words,... Read More