Avoiding Scams: If It Sounds Too Good to Be True, It Probably Is

A week or so ago, I received an inquiry from a man in Indonesia about buying multiple copies of certain items on my website. I immediately suspected fraud, so I explained that I only had one piece of each. The man, who wrote impeccable English, said that was fine. I asked why he wanted to buy so much money's worth of jewelry (it was around $250). He said it was for his wife and daughters.

He then asked if he could email me the billing and shipping info instead of using the catalog. I told him the catalog was better, since it was more secure, and figured if he was a scammer, it would be too much work for him.

No such luck. He was unusually together. He placed an order for the same items he had asked about (most scammers forget). I started allowing myself to feel happy about such a large order and the money that would bring. At the same time, I started researching shipping to Indonesia, as well as fraud protection, and found that a) Indonesia is second only to Nigeria in credit card fraud levels, and b) jewelry is prohibited to ship to Indonesia.

Per suggestions on another site, I asked the customer for a CVV number, the bank listed on the credit card, and the customer service number on the card. He sent me the CVV and customer service number. He also said he had just received a diamond ring sent to him, so he didn't think the prohibition existed.

Today I started checking. I called the customer service phone number he gave me; it was for a Canadian bank, and the number didn't belong to one of their cards. The fishy smell grew stronger.

I then contacted an American bank to find out where the number originated. They gave me the runaround for a while until someone there gave me the number for Visa International, 800-847-2911, since the card number started with a 4. Visa International told me which bank to call.

When I finally got to the right bank, and told them I was a merchant checking on fraud, they confirmed my suspicions. The card was at an American address, and it had no other suspicious charges on it. I asked if there were any tiny charges, like for penny amounts. Indeed there were. This part is important!

In Indonesia, they are very sophisticated; one of the ways they get credit card numbers is to run random computer-generated numbers with expiration dates until they get some that go through. They put through charges for tiny amounts that people won't bother to contest, and if the charge goes through, they know it's good. So do watch out for penny amounts showing up on your credit card bills.

I asked the woman to check the CVV number as well, and she said it did not check out. So the charge would not have gone through anyway, but I feel better having checked, even if it took way too much time.

Lesson: the scammers are getting more sophisticated all the time. They can also read materials on the internet that give warning signs about scammers. So they are trying to avoid some of the more obvious signs. If it sounds too good to be true, it probably is!

Author Susan Midlarsky of Aspiring Arts handcrafts jewelry with stones that harmonize well and are beneficial to the human body, color combinations that are connected to refinement, and sometimes offerings from nature. She has also recently started making glass beads; you can see her progress at her online blog. Susan loves the magical glow people feel upon finding a piece of jewelry that is exactly right for them.

In The News:


pen paper and inkwell


cat break through


Personal Firewalls - Secure Your Computer

There has not been a time in the history of... Read More

The Bad Guys Are Phishing For Your Personal Information

Do you know what "phishing" is?No, it doesn't mean you... Read More

Dont Miss Information Because of Misinformation

It has been said that with the wealth of information,... Read More

How To Clean the Spies In Your Computer?

Manual Spy Bot Removal > BookedSpaceBookedSpace is an Internet Explorer... Read More

Is Your Music Player Spying On You?

In today's times spyware is a very serious issue and... Read More

Corporate Security for Your Home Business

The words Corporate Security may conjure up images of a... Read More

Passwords or Pass Phrase? Protecting your Intellectual Property

Much has been said on the theory of password protection... Read More

Dont Allow Hackers to Take Out Money from Your Bank Account

If you know what is the 'Fishing' then it's very... Read More

Why Malicious Programs Spread So Quickly?

It seems that nowadays cybercriminals prefer cash to fun. That... Read More

How To Give Away Your Personal Information

Identity Theft and Your Personal Information Identity theft is... Read More

The Saga of the Annoying Adware

When we think of adware, what comes to mind are... Read More

The Truth About Hiding Your Tracks on the Internet

Ok, ok, I know you've seen them. All those pop... Read More

Online Shoppers, Beware of a New Scam

Beware of a New Scam Aimed at Bargain-HuntersTrying to buy... Read More

A Basic Introduction To Spyware

Spyware is the most troublesome software to appear on the... Read More

Wells Fargo Report Phishing Scam

First off I should explain what phishing is. Phishing is... Read More

Internet Shopping - How Safe Is It?

Millions of people make purchases online, but many people are... Read More

New Mass Mailing Spamming Internet Trojan for the Windows Platform

May. 16th 2005 - MicroWorld has reported the discovery of... Read More

Viruses and Worms, Protection from Disaster

Virus damage estimated at $55 billion in 2003. "SINGAPORE -... Read More

Network Security 101

As more people are logging onto the Internet everyday, Network... Read More

Email Scams ? Ten Simple Steps To Avoiding Them

According to the Anti-Phishing Working Group (APWG) email scams also... Read More

Make Money Online - Defend Against The Latest Scam

First, let's do a little recap'. As I stated in... Read More

Securities

NETWORK SECURITIES: IMPORTANCE OF SECURITIESComputers and securities must form a... Read More

Detect Spyware Online

You can detect spyware online using free spyware cleaners and... Read More

Blogs as Safe Haven for Cybercriminals?

To blog or not to blog? Well, why not? Lots... Read More

Securing Your Accounts With Well-Crafted Passwords

In the past I've never really paid much attention to... Read More

Phishing: A Scary Way of Life

The Federal Bureau of Investigation has identified "phishing" as the... Read More

Technology and Techniques Used in Industrial Espionage

Industrial Espionage. These methodologies are being used on a daily... Read More

Ransom Trojan Uses Cryptography for Malicious Purpose

Every day millions of people go online to find information,... Read More

Criminals are Fishing For Your Identity

What is Phishing? In a typical Phishing attack, a criminal... Read More

Top Spyware Removers Considerations

Only the top spyware removers are successful at detecting and... Read More

Dialing Up a Scam: Avoiding the Auto-Dialer Virus

For many, the daily walk to the mailbox evokes mixed... Read More

Be Alert! Others Can Catch Your Money Easily!

So called phishers try to catch the information about the... Read More

Computer Viruses, Worms, and Hoaxes

In recent days, I was one of the unfortunate persons... Read More