A New Low

A new variation of the Nigerian Scam theme

The scam artists are employing the Nigerian Scam to fleece unwary sellers who advertise pets for sale.

This is particularly despicable because not only are people losing their money but dogs are being abandoned in freight terminals or being killed to get rid of them.

Unsuspecting dog breeders have been caught off guard by this now well advertised scams as complaints are still numerous. These are usually high value dogs so the losses are often substantial.

These thieves are very clever and are well prepared. They have fine tuned this system of fraud, so it's easy for the unwary to be duped. They're extremely persuasive and carefully execute their plans.

Unfortunately it's virtually impossible to catch them as they operate from overseas and are expert in covering their tracks.

Their method of operation is to claim that they are from some foreign country and they want to buy the item you have for sale, whether it's a car or a dog or some other relatively high value item.

They tell you that someone in USA owes them money and that they will send you a check for an amount far in excess of your asking price. They don't haggle over the price in fact offers a bonus. You are supposed to cash the check then send them a money order for the difference.

The problem is that the checks are counterfeit, but so well done that bank tellers can't detect that they're bogus. If you've sent the money when the check fails to clear, you are responsible, not the bank.

I read a recent article by a reformed con artist who claims that Americans are stupid, just waiting to be fleeced. This is not true. The problem is that we are the most generous, trusting people on earth, consequently we are often easy prey for these despicable predators. I think this is particularly true of animal lovers who just don't anticipate this kind of behavior.

We have to learn to become more wary and know how to combat these thieves. Caveat Emptor, let the buyer beware.

For more information on this subject visit: http://www.caveatemptorus.com

Written by: George W. Cannata, author and publisher of the web site http://www.caveatemptorus.com July 29, 2005. You may copy this article in its entirety so long as you include credit to the author.

In The News:


pen paper and inkwell


cat break through


Burning Bridges is Bad, But Firewalls are Good

When you signed up for that ultra-fast DSL or Cable... Read More

Consumers: Shop Online and Get Information Safely

Do you really have to know how feeds work? Not... Read More

DOS Attacks: Instigation and Mitigation

During the release of a new software product specialized to... Read More

Why Malicious Programs Spread So Quickly?

It seems that nowadays cybercriminals prefer cash to fun. That... Read More

Reporting Internet Scams

When it comes to reporting Internet scams most of us... Read More

Click Here To Defeat Evil

Microsoft routinely releases new security updates, many of which are... Read More

Message Board Security Problems

Security leaks can be a big problem for any site... Read More

The One Critical Piece Of Free Software Thats Been Overlooked

Can You Prevent Spyware, Worms, Trojans, Viruses, ... To Work... Read More

Top Spyware Removers Considerations

Only the top spyware removers are successful at detecting and... Read More

Is Shopping Online For Your Horse Gifts Safe?

Shopping for horse gifts or other gift items on the... Read More

SCAMS ? Be Aware ? And Report When Necessary

The Internet is a vast International Network of people and... Read More

Spy Scanners ? Don?t Compromise your Privacy

Spies, spyware, internet parasites are among what they are usually... Read More

Mall Protection

The Loss Prevention Manager should be receptive to the needs... Read More

How Spyware Blaster Can Protect Your Computer From Harm

By browsing a web page, you could infect your computer... Read More

Are They Watching You Online?

When surfing the Internet you probably take your anonymity for... Read More

Data Security; Are Your Company Assets Really Secure?

Is your data secure? Think again. Securing data is unlike... Read More

How to Protect Yourself from Viruses, Spyware, Adware, and Other Nuisances

Spyware/adware is a new major concern for PC users everywhere.... Read More

A Painless Plagiarism Solution

A crowded marketplace can lead to unethical webmasters using underhand... Read More

5 Simple Steps to Protect your Digital Downloads

A couple of days ago, I was searching for a... Read More

Phishing - Identity Theft & Credit Card Fraud

What is Phishing? Phishing is a relatively newly coined term... Read More

Protecting Your Identity On The Internet

Afraid that someone is monitoring your PC or installed a... Read More

Steganography ? The Art Of Deception & Concealment

The Message Must Get Through The year is 300A.D.,... Read More

Keeping Worms Out of Your Network...

No auntie Sookie, not earth worms, computer virus worms that... Read More

Arming Yourself Against Spyware

While clicking from site to site on the internet you... Read More

3 Pervasive Phishing Scams

Scams involving email continue to plague consumers across America, indeed... Read More

Phishing, Fraudulent, and Malicious Websites

Whether we like it or not, we are all living... Read More

Anti-Spyware Protection: Behind How-To Tips

There is no doubt that "how-to articles" have become a... Read More

SPYWARE - Whos Watching Who?

I am in the midst of Oscar Wilde's The Picture... Read More

Delete Cookies: New-Age Diet or Common Sense Internet Security?

No, this article isn't about some new, lose-20-pounds-in-a-week, certified-by-some-tan-Southern-California-doctor diet.... Read More

What to Look for before You Purchase Spyware Software

Huge number of spyware software applications are available in the... Read More

How to Protect Yourself Against Online Criminals

Credit card fraud is a growing problem for online businesses... Read More

Firewall Protection - Does Your Firewall Do This?

The first thing people think about when defending their computers... Read More

Spyware, What It Is, What It Does, And How To Stop It

Spyware is software that runs on a personal computer without... Read More