A week or so ago, I received an inquiry from a man in Indonesia about buying multiple copies of certain items on my website. I immediately suspected fraud, so I explained that I only had one piece of each. The man, who wrote impeccable English, said that was fine. I asked why he wanted to buy so much money's worth of jewelry (it was around $250). He said it was for his wife and daughters.
He then asked if he could email me the billing and shipping info instead of using the catalog. I told him the catalog was better, since it was more secure, and figured if he was a scammer, it would be too much work for him.
No such luck. He was unusually together. He placed an order for the same items he had asked about (most scammers forget). I started allowing myself to feel happy about such a large order and the money that would bring. At the same time, I started researching shipping to Indonesia, as well as fraud protection, and found that a) Indonesia is second only to Nigeria in credit card fraud levels, and b) jewelry is prohibited to ship to Indonesia.
Per suggestions on another site, I asked the customer for a CVV number, the bank listed on the credit card, and the customer service number on the card. He sent me the CVV and customer service number. He also said he had just received a diamond ring sent to him, so he didn't think the prohibition existed.
Today I started checking. I called the customer service phone number he gave me; it was for a Canadian bank, and the number didn't belong to one of their cards. The fishy smell grew stronger.
I then contacted an American bank to find out where the number originated. They gave me the runaround for a while until someone there gave me the number for Visa International, 800-847-2911, since the card number started with a 4. Visa International told me which bank to call.
When I finally got to the right bank, and told them I was a merchant checking on fraud, they confirmed my suspicions. The card was at an American address, and it had no other suspicious charges on it. I asked if there were any tiny charges, like for penny amounts. Indeed there were. This part is important!
In Indonesia, they are very sophisticated; one of the ways they get credit card numbers is to run random computer-generated numbers with expiration dates until they get some that go through. They put through charges for tiny amounts that people won't bother to contest, and if the charge goes through, they know it's good. So do watch out for penny amounts showing up on your credit card bills.
I asked the woman to check the CVV number as well, and she said it did not check out. So the charge would not have gone through anyway, but I feel better having checked, even if it took way too much time.
Lesson: the scammers are getting more sophisticated all the time. They can also read materials on the internet that give warning signs about scammers. So they are trying to avoid some of the more obvious signs. If it sounds too good to be true, it probably is!
Author Susan Midlarsky of Aspiring Arts handcrafts jewelry with stones that harmonize well and are beneficial to the human body, color combinations that are connected to refinement, and sometimes offerings from nature. She has also recently started making glass beads; you can see her progress at her online blog. Susan loves the magical glow people feel upon finding a piece of jewelry that is exactly right for them.
![]() |
|
![]() |
|
![]() |
|
![]() |
There has not been a time in the history of... Read More
Do you know what "phishing" is?No, it doesn't mean you... Read More
It has been said that with the wealth of information,... Read More
Manual Spy Bot Removal > BookedSpaceBookedSpace is an Internet Explorer... Read More
In today's times spyware is a very serious issue and... Read More
The words Corporate Security may conjure up images of a... Read More
Much has been said on the theory of password protection... Read More
If you know what is the 'Fishing' then it's very... Read More
It seems that nowadays cybercriminals prefer cash to fun. That... Read More
Identity Theft and Your Personal Information Identity theft is... Read More
When we think of adware, what comes to mind are... Read More
Ok, ok, I know you've seen them. All those pop... Read More
Beware of a New Scam Aimed at Bargain-HuntersTrying to buy... Read More
Spyware is the most troublesome software to appear on the... Read More
First off I should explain what phishing is. Phishing is... Read More
Millions of people make purchases online, but many people are... Read More
May. 16th 2005 - MicroWorld has reported the discovery of... Read More
Virus damage estimated at $55 billion in 2003. "SINGAPORE -... Read More
As more people are logging onto the Internet everyday, Network... Read More
According to the Anti-Phishing Working Group (APWG) email scams also... Read More
First, let's do a little recap'. As I stated in... Read More
NETWORK SECURITIES: IMPORTANCE OF SECURITIESComputers and securities must form a... Read More
You can detect spyware online using free spyware cleaners and... Read More
To blog or not to blog? Well, why not? Lots... Read More
In the past I've never really paid much attention to... Read More
The Federal Bureau of Investigation has identified "phishing" as the... Read More
Industrial Espionage. These methodologies are being used on a daily... Read More
Every day millions of people go online to find information,... Read More
What is Phishing? In a typical Phishing attack, a criminal... Read More
Only the top spyware removers are successful at detecting and... Read More
For many, the daily walk to the mailbox evokes mixed... Read More
So called phishers try to catch the information about the... Read More
In recent days, I was one of the unfortunate persons... Read More
On December 8, 2004 Webroot, an award winning anti-spyware solution... Read More
Recently I have received email from my bank/credit Card Company,... Read More
Did you know...? 1 in 5 children who use computer... Read More
The menacing campaigns that drive the corporate spyware and adware... Read More
Blaster, Welchia, Sobig, W32, Backdoor, Trojan, Melissa, Klez, Worm, Loveletter,... Read More
Glieder (Win32.Glieder.AK), Fantibag (Win32.Fantibag.A) and Mitglieder (Win32.Mitglieder.CT) are not names... Read More
What is a Firewall?The term "firewall" illustrates a system that... Read More
You'd better learn news from media, not from emails, security... Read More
Every now and then you can read about a new... Read More
You are at your computer, checking out software on EBay.... Read More
You may not realize it, but as you are surfing... Read More
Imagine my surprise when I received a phone call from... Read More
There is no doubt that "how-to articles" have become a... Read More
Scams involving email continue to plague consumers across America, indeed... Read More
I am in the midst of Oscar Wilde's The Picture... Read More
If you use the internet, you have probably been infected... Read More
Phishing in its "classic" variant is relatively well-known. Actually, 43.4... Read More
When you signed up for that ultra-fast DSL or Cable... Read More
Credit card fraud is a growing problem for online businesses... Read More
The Message Must Get Through The year is 300A.D.,... Read More
Is your enterprise following the rules?The bulk of financial information... Read More
Over the past few years as the internet has become... Read More
"Dear Bank of the West customer", the message begins. I've... Read More
Spyware protection software is the easiest way of removing spyware... Read More
1)Spyware is on your system. Like it or not, statistically... Read More
Before we start, I want to make it clear that... Read More
Every day millions of people go online to find information,... Read More
First of all we need to get some terms stated.... Read More
Some months ago, before there was much publicity regarding phishing... Read More
This really chapped my lips...I recently bought a new computer.... Read More
For many, the daily walk to the mailbox evokes mixed... Read More
Millions of people make purchases online, but many people are... Read More
This is the second in a series of articles highlighting... Read More
Internet Security |