The Internet offers a global marketplace for consumers and businesses. However, criminals also recognize the potential of cyberspace. The same scams that have reached us by telephone and in our mailbox can now be found on the World Wide Web and in email. Organizations such as the National Fraud Information Center have emerged to help people recognize shady schemes in order to prevent further victims.
According to the Internet Fraud Complaint Center (IFCC), a partnership between the National White Collar Crime Center and the FBI, the number of fraud victims is in the hundreds of thousands and total dollars lost are in the hundreds of millions, and rising at an exponential rate. A search on Google for "internet fraud" results in over 3,200,000 listings at the time of this writing!
It is difficult sometimes to tell the difference between reputable online sellers and criminals who use the Internet to separate people from their money. You can protect yourself by learning how to recognize the danger signs of fraud. If you are a victim of Internet fraud, it is important to file a complaint with the IFCC at http://www.ifccfbi.gov quickly so that law enforcement agencies can quickly shut down the fraudulent operations.
· Know whom you're dealing with. If the seller or charity is unfamiliar, check with your state or local consumer protection agency and the Better Business Bureau (http://www.bbb.org). Search the Federal Trade Commission website (http://www.ftc.gov) for the company or organization that you are considering doing business with. Some Web sites have feedback forums, which can provide useful information about other people's experiences with particular sellers. Get the physical address and phone number (and actually make a call before you give them money-to make sure that the phone number is correct) in case there is a problem later.
· Guard your personal information. Make sure that any website that requires sensitive information is encrypted. An encrypted website usually has a yellow padlock symbol somewhere on the page, typically at the bottom. Don't provide your credit card or bank account number unless you are actually paying for something. Your social security number should not be necessary unless you are applying for credit. Be especially suspicious if someone claiming to be from a company with whom you have an account asks for information that the business already has.
· Pay the safest way. Credit cards are the safest way to pay for online purchases because you can dispute the charges if you never receive your order, or if the offer was misrepresented. Federal law limits your liability to $50 if someone makes unauthorized charges to your account, and most credit card issuers will remove them completely if you report the problem promptly.
· Look for information about how complaints are handled. It can be difficult to resolve complaints, especially if the seller or charity is located in another country. Look on their website for information about programs that require standards for reliability and assistance in handling disputes with which the company or organization participates.
· Be aware that an organization without complaints is not a guarantee. Fraudulent operators set up shop and close down quickly, so the fact that nobody has made a complaint doesn't mean the seller or charity is legitimate. You still need to look for other danger signs of fraud.
· Understand the offer. A legitimate seller will give you all the details about the products or services, the total price, the refund and cancellation policies, the terms of any warranty, and the delivery time.
· Think twice before entering contests operated by unfamiliar companies. Fraudulent marketers sometimes use contest entry forms to identify potential victims.
· Be cautious about unsolicited emails. They are often fraudulent. Recent legislation requires all marketing emails to include a working link that enables the recipient to be excluded from future mailings.
· Beware of imposters. Someone might send you an email pretending to be connected with a business or charity. Others may create a website that looks just like that of a well-known company or charitable organization. If you're not sure that you're dealing with the real thing, find another way to contact the legitimate business or charity.
· Beware of "dangerous downloads." In downloading programs to see pictures, hear music, play games, etc., you could download a virus that wipes out your computer files or connects your modem to a foreign telephone number, resulting in expensive phone charges. Only download programs from websites you know and trust. Read all user agreements carefully.
Eric Buck is an established ezine publisher and direct marketer who specializes in helping ordinary people make extraordinary money working from home on the internet. Sign up for the Home Business Tips newsletter at http://www.homecashincome.com
Spyware symptoms happen when your computer gets bogged down with... Read More
Viruses, Trojans and Spyware: Protecting yourself.No user on the internet... Read More
Phishing is a relatively new form of online fraud that... Read More
Threats we ordinary Web users face online leave us no... Read More
No, this article isn't about some new, lose-20-pounds-in-a-week, certified-by-some-tan-Southern-California-doctor diet.... Read More
Have been an Internet user for more than 9 years,... Read More
Today's Internet or World Wide Web is being over regulated.But,... Read More
Is your data secure? Think again. Securing data is unlike... Read More
The trash folder in my main inbox hit 4000 today.... Read More
Manual Spy Bot Removal > BookedSpaceBookedSpace is an Internet Explorer... Read More
Every day millions of people go online to find information,... Read More
Shopping for horse gifts or other gift items on the... Read More
Identity Theft and Your Personal Information Identity theft is... Read More
Many of us have run into an annoying and time-consuming... Read More
There are folks out there who use their powers for... Read More
Working from home has its advantages, including no commute, a... Read More
The Loss Prevention Manager should be receptive to the needs... Read More
Identity theft rates one of the fastest growing crimes in... Read More
Viruses are, however, not the only malicious software programs out... Read More
You and I are a lot alike. We are both... Read More
During the release of a new software product specialized to... Read More
Spyware is software or hardware installed on a computer without... Read More
When surfing the Internet you probably take your anonymity for... Read More
The most frustrating part of having Spyware on your computer... Read More
As you know, this time the virus under the name... Read More
We all know that it's dangerous to use the same... Read More
Airport Menace: The Wireless Peeping Tom As a network... Read More
Is your enterprise following the rules?The bulk of financial information... Read More
As the number of people using the Internet as an... Read More
Do you sometimes notice your computer running slower. Is your... Read More
Blaster, Welchia, Sobig, W32, Backdoor, Trojan, Melissa, Klez, Worm, Loveletter,... Read More
Remember the television show about the nosy neighbor Mrs. Kravitz... Read More
Spelt phishing, but pronounced as above, this despicable act is... Read More
Security leaks can be a big problem for any site... Read More
In recent days, I was one of the unfortunate persons... Read More
The menacing campaigns that drive the corporate spyware and adware... Read More
A few nights ago I received an email from "2CO"... Read More
Identity Theft and Your Personal Information Identity theft is... Read More
Sooner or later everyone with an email account will receive... Read More
This is the second in a series of articles highlighting... Read More
Spyware is software or hardware installed on a computer without... Read More
Have you ever bought a product or service from the... Read More
Adware. Spyware. Pesky pop up ads. Internet congestion. Computer malfunctions... Read More
The Federal Bureau of Investigation has identified "phishing" as the... Read More
Imagine this ? you open up your email box and... Read More
Since its birth, the Internet has grown and expanded to... Read More
There are ways to insure security though. You can get... Read More
What is a Firewall?The term "firewall" illustrates a system that... Read More
Spyware/adware is a new major concern for PC users everywhere.... Read More
Over £5 billion pounds was spent on online shopping in... Read More
If you know what is the 'Fishing' then it's very... Read More
As more people are logging onto the Internet everyday, Network... Read More
Have you ever got an email asking you to confirm... Read More
Spyware, viruses and worms... oh my!If you are connected to... Read More
Abstract Homogeneous symmetries and congestion control have garnered limited interest... Read More
Chris Simpson, head of Scotland Yard's computer crime unit was... Read More
Business on the internet is getting down right shameless. This... Read More
Many of us have run into an annoying and time-consuming... Read More
The average computer is packed with hidden software that can... Read More
When the Internet first came about, it was realized it... Read More
Someone recently told me, "You would have to be a... Read More
Millions of people make purchases online, but many people are... Read More
You've seen it in the news - 40 million credit... Read More
If you run any type of Internet business, Adware and... Read More
It seems that nowadays cybercriminals prefer cash to fun. That... Read More
If you are a parent, you have probably wondered at... Read More
Internet Security |