Online Cell Phone Scams and Spam

They're out there. Individuals trying to make a quick buck at your expense. You labour hours on end to produce quality content on your website only to get repetitive requests for huge numbers of product or promises for the greatest deals online. As a webmaster for a cell phone and PDA site, I've had my share of spam and scams come through, mostly via email, some posted on my forum. The purpose of this article is to provide a few methods of detecting spam and scams, and provide a few examples as well. Take a look over and protect yourself from online cellular fraud.

Anybody catch the 60 minutes episode where Andy Rooney teaches faithful viewers how to detect junk mail? Junk email works in much the same way. Items with subject headings 'Great deal', or 'limited time offer' usually can wait, and definitely don't have great offers hidden inside. Webmasters and consumers should have a golden rule, if you don't know where an offer came from (you don't know the sender) then delete it. Plain and simple. Most free email accounts, GMAIL, Hotmail, Yahoo!, have good filters that label incoming spam and scams as, well, spam. However, the majority of webmasters do not use free email accounts for the sake of professionalism. To these individuals, a basic virus detector usually includes email protection and generally will detect possible spam items before they hit your box. Having said this, if you're doing link campaigns, or joining forums, etc., in order to promote your site, it may not be a bad idea to enlist the free online email account and prevent all the unwanted junk from hitting your work emails.

It's been my experience that some people out there hand pick contact pages of potential victims, and therefore the email may be somewhat individualised to your site. Your name, the site name, or similar content, may be communicated within the email making it appear somewhat legitimate. Be mindful of your email accounts (contact pages) that are exposed to the world wide web. Some smart scammers have created bots that will automatically harvest emails that are sitting live on the web and input them into a spam list. Remember this when trying to determine whether something from the web is legit.

If an questionable email has contact information, Google it. If it's a legitimate company contacting you, they should have some type of online presence. I've noticed that the majority of spam and scams have fake mail addresses, but no online address. Furthermore, emails usually come from online web accounts like Yahoo!. Not only can you search contact information, you can serach content as well. Chances are a webmaster has posted the contents on a forum somewhere wondering about its legitimacy. I can't stress this enough, take 4 seconds and doabout the email before you consider replying.

With these simple and quick tips you should be able to identify the majority of scam and spam emails. If in doubt, delete. If something was important that you deleted, or legitimate, the individual will likely try to contact you again. With this in mind, here are some examples of spam and scam emails from the cellular and technology industry, my comments are in brackets.

Subject: WE HAVE LOTS OF GSM/NEXTEL MOBILE PHONES AT VERY CHEAP PRICES'''''''' [The subject always varies.]

PHONES SELLERS INCORPORATED
12 Ademola drive,ikoyi
Lagos Nigeria [Many, many, many emails have come with Nigeria as the purported origin, doesn't mean it's from there, but out of country addresses are always suspect of being fraudulent.]

Dear Sir/Ma,

LETTER OF BUSINESS RELATIONSHIP
We are mobile phones wholesalers. We deals on all brands and models of mobile phones such as Nokia, Motorola, Samsung and many more at very cheap prices. We are using this medium to look for buyers of mobile phones.Do kindly reply back if you are interested and as you do you will be glad you do,thank's and God bless.

Fola David
President.

[A variation of the above is instead of written body content, they will actually send a product list of the cell phones they require asking for a dozen of each. Sounds like great business!...Here's the next one]

CONSOLIDATED PHONES LIMITED
152, OZORUMBA MBADIWE STREET
OFF KINGSWAY ROAD.
VICTORY ISLAND LAGOS, [no record of this address]
TEL: 0803-3870-694
FAX: 1- 817-0845, [not even a real number]
Email:consphones_ltd@seeqmail.com. [bad domain]
or consphone@galmail.co.za

Dear sir,

COMMERCIAL SALE OF BULK MOBILE PHONES

WE ARE EXPORTERS AND IMPORTERS OF GSM, TDMA, AND CDMA PHONES. [CDMA Phones do not run the majority of African networks.] WE ARE ONE OF THE LEADING COMPANIES IN NIGERIAN COMMUNICATIONS SECTOR, AND WE GIVE OUT OUR BEST IN SATISFYING OUR NUMEROUS CUSTORMERS. WE SELL IN BULK AND AT A VERY CHEAP RATE.

WE WILL LIKE TO USE THIS MEDIUM TO INTRODUCE TO YOU OUR VARIOUS PHONE BRANDS AND ACCESSORIES LISTED IN OUR PRICE LIST. THESE ITEMS ARE READY FOR SALE AND THE PRICE LIST IS AS GIVEN BELOW. WE WILL BE WAITING AND READY TO ASSIST YOU IN ANY INFORMATION REQUIRED BY YOU, AND ALSO, WE ARE READY TO DO BUSINESS WITH ANY COMPANY, INDIVIDUALS OR GROUP AS LONG AS THEY ARE NOT FRAUDULENT. [Of course you wouldn't.]

WE WILL SEND OUR RANGE OF PRODUCTS AND PRICE LIST ON DEMAND.

BEST REGARD.

JULIAN JONES (MISS)
Email: jonesjulian2001@yahoo.com [This email is different than the ones atop] For: CONSOLIDATED PHONES LTD.

But two examples of two spam/scam emails. Keep your eyes peeled webmasters!

Barry Nagassar is owner and operator of DiscussWireless an online cell phone and PDA forum that provides the latest cell phone news, reviews, and cell phone fraud discussion. Included is a comprehensive compare and shop section for the latest cellular and PDA phones. Compare competitor prices in one location, or join the forum and post the latest review or service provider issue. Complete cell phone fraud forum included.

In The News:


pen paper and inkwell


cat break through


The Top Twelve Threats No Computer User Should Ignore

The internet is undoubtedly a fantastic resource for families and... Read More

Computer Viruses, Worms, and Hoaxes

In recent days, I was one of the unfortunate persons... Read More

Is the Internet Insecure Because of You?

Long gone are the days that we could feel secure... Read More

A Painless Plagiarism Solution

A crowded marketplace can lead to unethical webmasters using underhand... Read More

Computer Viruses and Other Nasties: How to Protect Your Computer from These Invaders

Can you protect your computer from all possible viruses and... Read More

Lets Talk About Antivirus Software!

Nowadays more and more people are using a computer. A... Read More

If You Sell Anything Online Your ePockets Are Being Picked

You and I are a lot alike. We are both... Read More

Temporary Internet Files - the Good, the Bad, and the Ugly

A little bit of time invested into learning about internet... Read More

Computer Security

What is computer security? Computer security is the process of... Read More

DOS Attacks: Instigation and Mitigation

During the release of a new software product specialized to... Read More

Password Security and Safety

There is nothing more important that password security in world... Read More

Protecting Your Children On The Internet

If you are a parent, as am I, I think... Read More

Viruses and Worms, Protection from Disaster

Virus damage estimated at $55 billion in 2003. "SINGAPORE -... Read More

Why Malicious Programs Spread So Quickly?

It seems that nowadays cybercriminals prefer cash to fun. That... Read More

Everything You Need To Know About Spyware and Malware

You are at your computer, checking out software on EBay.... Read More

Another Fine Mess!

I'm in the Anti-Spyware business, and I'm doing a lot... Read More

How to Know Whether an Email is a Fake or Not

A few nights ago I received an email from "2CO"... Read More

Hacking the Body Via PDA Wireless Device

First I would like to stress I am condoning the... Read More

Securities

NETWORK SECURITIES: IMPORTANCE OF SECURITIESComputers and securities must form a... Read More

Identity Theft Article ? A Phisher Is Trying To Steal Your Identity!

Sooner or later everyone with an email account will receive... Read More

How To Cover Your Tracks On The Internet

Every single time you access a website, you leave tracks.... Read More

The Attack of the Advertiser - Spy Mother Spy

The menacing campaigns that drive the corporate spyware and adware... Read More

Mail Forwarding - Why Would You Do It?

First of all we need to get some terms stated.... Read More

Five Excellent Indie Encryption And Security Solutions You Have Not Heard About

Geek SuperheroGeek Superhero watches your computer for changes, immediately notifying... Read More

Top Five Spyware Fighting Tips

Spyware and adware are becoming major problems for online surfers... Read More

Secure Your PC From Hackers, Viruses, and Trojans

Viruses, Trojans and Spyware: Protecting yourself.No user on the internet... Read More

The Important Steps To Protect Your Kids on the Internet

Internet is the ocean of knowledge. In this ocean you... Read More

Spyware Protection Software

Spyware protection software is the easiest way of removing spyware... Read More

How To Be Your Own Secret Service Agency

So you want to know who your kids are chatting... Read More

SCAMS ? Be Aware ? And Report When Necessary

The Internet is a vast International Network of people and... Read More

5 Tips For An Unbreakable Password

Despite the current wave of identity theft and corporate security... Read More

Whats All This I Hear About Firewalls?

At this point, if you've got the whole "turning the... Read More

Be Alert! Others Can Catch Your Money Easily!

So called phishers try to catch the information about the... Read More