er, ah,....hey!...I didn't say a thing...
Keep up the good work. lol
hello seller, i saw your advertisement on this items in which l'm have interest on it,i wish to know the condition of the items.l am very serious wet your ltem,l will transfer money to your account you will sulely receive your money and l we need your bank detal so that l can order my bank to tranmsfer the money to your account with your full name and yourhome address with country and your zipcode so that l can forword your informition to my bank for the transferand l we give you 60 dollar for the shiping cost to Nigeria and you we see your money in your account.you can via me back through this mail and i wish to purchase it at the rate of your price.thanks.
angelocardoc wrote:I recently put an add in a paper to sell some junk I have lying around.
Looks like the scam artists are looking for suckers everywhere...
Thieves drain two online accounts
IDA says tens of thousands taken Warning issued
to Internet traders
Aug. 25, 2006. 07:06 AM
The Investment Dealers Association of Canada issued a warning to online traders yesterday after two accounts were broken into and wiped out in recent days, and the hijacker or hijackers reinvested the money in over-the-counter stocks.
Authorities suspect the aim was to manipulate the price of the over-the-counter stocks that had been invested in, at least one of which was issued by a Canadian-based company.
Passwords had been obtained to get into the discount brokerage trading accounts, but the IDA isn't sure how.
One possibility is that invasive software was used to monitor keystrokes on home computers.
Another theory is that an individual or individuals were "phishing" for the passwords and log on information by sending an email that purported to be from the discount brokerage firm and asked the victims to confirm their identity details.
Another possibility is that corporate websites were compromised so that when clients attempted to log in, their information was captured on a pirate site.
The Investment Dealers Association said that at this point there is "no suggestion that the security of member firms' online systems has been compromised."
yielder wrote:Paypal was quick (within 2 minutes) to confirm that it was a scam when I forwarded it to them. When I clicked on the link my trojan tracker immediately caught a trojan. (I would not recommend that people try this unless they're pretty confident in their software's ability to catch nasties and have backups just in case they need to restore their system.)
It seems that someone has hacked into Capital One's computer or server system and they are being a bit less than forthcoming about it. I received an e-mail today that was not of the usual "phishing" variety. It not only had my correct e-mail address, but also the last four digits of my actual credit card number, which lent more-than-usual legitimacy, with a "your statement is ready to be accessed online" message, as legitimate banks often send. However, the link enabling one to save time by logging in directly from the e-mail was something illegitimate. Since it was capitalone.(numerical untraceable domain).com I did not click it.
When I called Capital One to ask them about this, they at first claimed that it was because the last four digits of a credit card number are reported to the respective credit bureaux. However, my question about how they got my e-mail address to match with a portion of my real account number (which would never be the case in a standard phishing attack) was met with stony silence. I said, "they have hacked into your computers, haven't they?" The response? "These are criminals, and we are trying to find this out now."
So, I just thought I would warn all on this forum, since a phishing attack that has both your legitimate e-mail address AND your actual credit card suffix is so unusual that it might catch you off guard. And, also, to let you know that Capital One isn't telling people about it. There is no message about this specific threat, just a general statement about phishing that does not identify this situation where a hacker has seemingly obtained specific accountholder information.
Regards, Kent Jacobson
re: Capital One Mastercard warning 2006-12-14 20:05:00 <James Cousineau>
Thanks Kent for the caution on the Capital One Mastercards phishing scam. It is obvious that someone has done a good hack job into part of their database structure. Just like large government, though, "Deny, Deny, Deny".
It is always best to err on the side of caution for any financial information/transactions/accounting. The banks and credit card companies never send out such emails - just as a matter of simple security.
I do transactions daily, every day, online ... banking, credit card purchases and receiving payments. Never any problems, but we are fully knowledgeable in the security aspects of it all. In fact I would rather do a transaction online than handing/exposing my card to a real person. OK .. I'm a Geek!
As a side note to your caution to all, I might add to NEVER follow a link in such an email - even if it looks totally legitimate. If you have any concern always login to your online financial account through the URL link you always use. Then you can establish if anything is wrong. Always monitor your online accounting/transactions, and ALWAYS report such emails to your bank/card company. Every institution has links on their websites to report these things.
Microsoft has introduced Anti-Phishing filters:
Firefox Users aren't left out:
Note that Netcraft has anti-phishing plugins for both IE and FireFox .... but it still takes education.
I think I better create a mini-course on personal financial 'digital' security for the financial planning industry. Been on my mind for some time now and maybe the time is now.
Considering that the vast majority of users (agents, planners, or just the regular consumer - all cut from the same cloth) are usually (80%-85%) computer and Internet illiterate (technophobic in many cases), so an educational report is due. All technical knowledgeable contributors are welcome to put in their 2 cents worth, with due credit for contribution. My personal background is technical, editorial and educational, so I'll do a professional job of it
This isn't a plug for a sale, as it would be free for all - and even for your clients.
A quick slap to the side of my head as I tell myself that I've got enough on my plate to do, but ...... a bit of 'pay-it-forward'.
AOL phisher faces up to 101 years in prison
By Joris Evers, CNET News.com
Published on ZDNet News: January 16, 2007, 3:14 PM PT
A California man faces up to 101 years in federal prison after a jury found him guilty of sending out e-mail scams as well as related crimes.
Jeffrey Brett Goodin, 45, of Azusa, was convicted Friday on multiple counts by a jury in the U.S. District Court for Central District of California in Los Angeles, the U.S. Attorney's Office said in a statement.
Goodin, who was arrested last year, was found guilty of operating a sophisticated phishing scheme, the prosecutors said in the statement. As part of the scam, he sent e-mails posing as AOL's billing department to trick people into giving up their credit card information, according to the statement. He then used the credit card data to make purchases, prosecutors said Tuesday.
Fewer than half of the UK's 29m adult internet users believe they are responsible for protecting personal information online, a survey suggests... "We don't blame the police when we get burgled and we must take responsibility for what we do online in the same way we do for securing our houses and cars."
Some 48% of the internet users surveyed online between 2 and 5 March felt they were primarily responsible for the online safety of their personal information. One in six thought it was their bank which was wholly responsible, while 13% thought it was up to their internet service provider...
Other key findings of the survey include the discovery that 18% had responded to spam messages. A further 10% had clicked on a link in a spam message. Almost 50% do not have anti-spyware, while 13% of broadband users do not have a firewall on their PC. Some 53% of the those surveyed said there should be a standard internet safety test - much like the driving test - for web users...
The e-mail offer of a work-at-home job was a godsend to Deena Monroe, a Statesville, N.C., single mom who had just been laid off from her position as a warehouse supervisor. The prospective employer said Monroe's resume had been spotted on job search site Careerbuilder.com and offered her the chance to make a few hundred dollars a week completing sales for a marketing company based in Australia.
Monroe said she researched the company named in the solicitation -- Adamant Global Pty Ltd. -- and concluded it was a legitimate firm. In mid-September, she decided to take the offer. She was asked to add an e-mail address to her account at PayPal, which the Adamant rep explained that she needed to transfer money on the company's behalf.
Soon after, Monroe received a deposit of $2,601 into her PayPal account, with instructions to transfer the money to her checking account, withdraw it and wire the bulk of the amount via Western Union to two separate addresses in India. She was told to keep 10 percent as her commission.
Less than two weeks later, Monroe received a terse e-mail from an eBay user who was curious when he might receive the new computer he'd won at auction, the one for which he'd sent precisely $2,601 to her PayPal account.
EBay investigated, concluding that Monroe's phantom employer had tied her PayPal account to a fraudulent auction. The auction site's verdict: She was responsible for repaying the full amount to the blameless auction winner. Monroe is now working two part-time jobs to pay the bills and to make the other victim whole. "At first, the [buyer] was really mad and understandably so," Monroe said. "But I was just as irate because I had gotten taken, and there was nothing anyone could do about it."
Monroe was the victim of a "money mule" scam, in which criminals make use of third parties (often unsuspecting victims like Monroe) to launder stolen funds. Mule recruitment is an integral part of many cyber crime operations because money transferred directly from a victim to an account controlled by criminals is easily traced by banks and law enforcement. The mules, therefore, serve as a vital buffer, making it easier for criminals to hide their tracks...
Both Nitesh and Billy are well-known security researchers that have recently managed to infiltrate the phishing underground. What started as a simple examination of phishing sites, turned into an extraordinary view of the ecosystem that supports the phishing effort that plagues modern day financial institutions and their customers.
They saw an extraordinary amount of sensitive customer account information, obtained the latest phishing kits, located and examined the tools used by phishers, trolled sites buying and selling identities, and even social engineered a few scammers.
In this interview, they expose the tactics and tools that phishers use, illustrate what happens when your confidential information gets stolen, discuss how phishers communicate and even how they phish each other...
With all of the confusion and money involved you knew there would be cyber-vultures out there looking to cash in. Well the Federal Trade Commission today issued a warning that indeed such increased phishing activities are taking place.
Specifically the FTC said it was urging user caution regarding e-mails that look as if they come from a financial institution that recently acquired a consumer's bank, savings and loan, or mortgage. In many case such emails are only looking to obtain personal information - account numbers, passwords, Social Security numbers - to run up bills or commit other crimes in a consumer's name, the FTC stated...
Shakespeare wrote:Don't know about anyone else, but I just got an "Rbc Sercurity [sic] Update." from the so-called "RBC Sercurity Team".
Too dumb to use spellcheckers.
The CIBC web site was giving a few dozen examples of those phishing letters/e-mails.
Goes from utterly rediculous to quite clever.
Users browsing this forum: Google [Bot] and 1 guest