Scams Bulletin. April 2014

Size: px
Start display at page:

Download "Scams Bulletin. April 2014"

Transcription

1 Scams Bulletin April 2014 The purpose of this scams bulletin is to enable Hampshire residents to be aware, and therefore guard against the type of scams currently being reported to the Hampshire Trading Standards Service. Trading Standards will collate information on scams to provide information and intelligence to the public and other agencies but will normally only intervene when the victim is vulnerable and has been financially abused. In appropriate cases Trading Standards will also seek to take enforcement action through the courts. If you are worried about a potential scam please contact: or online using the HANDLING: This bulletin may be distributed to the public

2 Scam Involving Fake Citizens Advice Bureau Phone Calls Hampshire Trading Standards Service is warning residents to be wary of imposters claiming to be Citizen Advice Bureau (CAB) Advisers. The fake caller will make an unsolicited phone call or send a text message pretending to offer services in an attempt to scam their intended victim out of money. Reports from the CAB indicate that this may be in relation to help with an accident claim or that the person has appeared on a database as someone who may need extra support. On one occasion the fake caller appeared to be recommending a particular firm of solicitors who would be able to assist with a claim. The CAB have stressed that no CAB Adviser or employee will ever text a member of the public out of the blue. If you receive a call or text message from someone purporting to work for the CAB do not engage in conversation and hang up the phone immediately. For further information, the official website for the CAB is

3 Parking Fine Scam Hampshire residents are warned to be cautious should they receive an unsolicited alleging they owe money for a parking fine. The will look quite plausible and will use strong wording such as REMINDER NOTICE DO NOT IGNORE to grab the recipients attention. The content of the will include information about how much money is owed and that further costs may incur unless the fine is settled immediately. It may contain a warning that if the amount is not paid, further action will be taken and the consumers credit rating may be affected. The intended victim will be invited to open an attachment where they will find alleged photographic evidence to support the claim and a form for making payment. This attachment is likely to contain a virus which will affect their computer. Real life case study Mr G received an from an address that looked like a genuine government site, alleging he owed 70 for an unknown parking fine. Although the gave a time, date and location for the alleged parking offence, Mr G did not recognise the information as correct. However, he was told that photographic evidence to support the claim was contained in a link. Although Mr G was suspicious about the , he was also concerned that this may be genuine, but sent in error. However, he decided not to open the link, and sought advice from Trading Standards who confirmed the was a scam. DO NOT open an or any attachments if you have any concerns about its source or content. For further advice or to report a scam please contact;

4 News Video Malware Warning Scammers are known to take advantage of major news stories or events where there is a high level of public interest. They will use a range of tools to trick people under the guise of topical stories, such as spam s with malicious content or seeking donations to fake charities. Recent reports concern the disappearance of the Malaysian Airlines Flight MH370. Scammers have been sending s and social media messages at random with links purporting to be videos on the disappearance of the aeroplane. This link may take you to a website that appears to be legitimate (such as a major news channel), however it will be fake. If you click on the link, your computer could be infected and scammers may be able to gain remote access to your personal information, including on-line banking facilities. Protect Yourself If you receive an unsolicited or social media message about a major news item, do not click on any links or open attachments. If you want to access information on a major or breaking news item, use a reliable news source. Always keep your computer security up to date with an anti-virus software and a good firewall. Don t let scammers taking advantage of tragedies, take advantage of you.

5 Investment Scams Update Hampshire County Council Trading Standards Service has continued to receive complaints about various investment scams. Investment scams can look and sound believable, with smooth-talking salespeople, slick websites or sophisticated brochures and documentation. This can make it hard to tell them apart from genuine investment opportunities. Real life case study 1 Miss Y received a phone call from a man who asked if she was interested in the environment. Once the man had gained her interest, he promoted an opportunity where she could invest in a company that supported sustainable mineral mining. The man sent Miss Y a glossy brochure and then visited her in person. Miss Y was convinced by the ethics of the scheme and invested approximately Miss Y is now seeking her money back, but as yet this has not been received. Real life case study 2 Mr E received a phone call from a scammer offering an investment opportunity with a guaranteed high financial return. The scam involved investing in diamonds, which were being marketed at a highly inflated price. Mr E requested further information, and was sent a brochure. At this point, he became suspicious and sought advice from Trading Standards. Mr E was advised this was a scam, and did not take any further action. The scammer has continued to phone Mr E, who is now considering changing his telephone number. Hampshire Trading Standards Service reminds all residents to be vigilant and report any concerns to;

SCAMS BULLETIN. November 2014

SCAMS BULLETIN. November 2014 November 2014 The purpose of this scams bulletin is to enable Isle of Wight Council residents to be aware, and therefore guard against the type of scams currently being reported to the Isle of Wight Council

More information

AGE WELL SENIOR SERVICES REMINDS SENIORS TO BE ON THE LOOKOUT FOR SCAM ARTISTS

AGE WELL SENIOR SERVICES REMINDS SENIORS TO BE ON THE LOOKOUT FOR SCAM ARTISTS CONTACT: Dan Pittman 714.282.9994 dan@pittmanpr.com AGE WELL SENIOR SERVICES REMINDS SENIORS TO BE ON THE LOOKOUT FOR SCAM ARTISTS LAGUNA WOODS, California, April 11, 2012 Age Well Senior Services, Orange

More information

DON T BE FOOLED BY EMAIL SPAM FREE GUIDE. Provided by: Don t Be Fooled by Spam E-Mail FREE GUIDE. December 2014 Oliver James Enterprise

DON T BE FOOLED BY EMAIL SPAM FREE GUIDE. Provided by: Don t Be Fooled by Spam E-Mail FREE GUIDE. December 2014 Oliver James Enterprise Provided by: December 2014 Oliver James Enterprise DON T BE FOOLED BY EMAIL SPAM FREE GUIDE 1 This guide will teach you: How to spot fraudulent and spam e-mails How spammers obtain your email address How

More information

S.A.F.E. Recognize a scam before you become a victim of fraud Division of Consumer Protection

S.A.F.E. Recognize a scam before you become a victim of fraud Division of Consumer Protection S.A.F.E. Senior Anti-Fraud Education Recognize a scam before you become a victim of fraud New York StaTe Department of State Division of Consumer Protection Advocating for and empowering New York consumers

More information

E-MAIL & INTERNET FRAUD

E-MAIL & INTERNET FRAUD FRAUD ALERT! FRAUD ALERT! Guarding Against E-MAIL & INTERNET FRAUD What credit union members should know to counter Phishing Pharming Spyware Online fraud On-Line Fraud Is Growing E-Mail and Internet Fraud

More information

Advance Fee Loans. Computer Malware Scams. Credit Repair Scams

Advance Fee Loans. Computer Malware Scams. Credit Repair Scams Advance Fee Loans Scam artists can trick you into paying money to qualify for a loan or credit card. Despite their guarantees, you do not receive a loan, credit card, or any money. Never pay money to qualify

More information

Cyber Security. Securing Your Mobile and Online Banking Transactions

Cyber Security. Securing Your Mobile and Online Banking Transactions Cyber Security Securing Your Mobile and Online Banking Transactions For additional copies or to download this document, please visit: http://msisac.cisecurity.org/resources/guides 2014 Center for Internet

More information

A mule s life is a fool s life

A mule s life is a fool s life A mule s life is a fool s life Allowing your bank account to be used to send and receive funds for others can result in a criminal record. A mule s life is a fool s life. The bank account lies at the heart

More information

Deception scams drive increase in financial fraud

Deception scams drive increase in financial fraud ADDRESS 2 Thomas More Square London E1W 1YN WEBSITE www.financialfraudaction.org.uk DIRECT LINE 020 3217 8436 NEWS RELEASE EMAIL press@ukcards-ffauk.org.uk Deception scams drive increase in financial fraud

More information

Learn to protect yourself from Identity Theft. First National Bank can help.

Learn to protect yourself from Identity Theft. First National Bank can help. Learn to protect yourself from Identity Theft. First National Bank can help. Your identity is one of the most valuable things you own. It s important to keep your identity from being stolen by someone

More information

THE STATE BAR OF TEXAS. Just Hang UP. Protect Yourself From Unscrupulous Telemarketers and Con Artists

THE STATE BAR OF TEXAS. Just Hang UP. Protect Yourself From Unscrupulous Telemarketers and Con Artists THE STATE BAR OF TEXAS Just Hang UP Protect Yourself From Unscrupulous Telemarketers and Con Artists JUST HANG UP! Protect Yourself From Unscrupulous Telemarketers and Con Artists I'm Barbara Bush for

More information

Scams and Schemes. objectives. Essential Question: What is identity theft, and how can you protect yourself from it? Learning Overview and Objectives

Scams and Schemes. objectives. Essential Question: What is identity theft, and how can you protect yourself from it? Learning Overview and Objectives Estimated time: 45 minutes Essential Question: What is identity theft, and how can you protect yourself from it? Learning Overview and Objectives Overview: Students learn strategies for guarding against

More information

Learning to Detect Spam and Phishing Emails Page 1 of 6

Learning to Detect Spam and Phishing Emails Page 1 of 6 Page 1 of 6 Email provides us a powerful communication tool. Unfortunately, it also provides scammers an easy means for luring potential victims. The scams they attempt run from old-fashioned bait-and-switch

More information

Advice about online security

Advice about online security Advice about online security May 2013 Contents Report a suspicious email or website... 3 Security advice... 5 Genuine DWP contacts... 8 Recognising and reporting phishing and bogus emails... 9 How DWP

More information

SENIORS ONLINE SECURITY

SENIORS ONLINE SECURITY SENIORS ONLINE SECURITY Seniors Online Security Five Distinct Areas Computer security Identity crime Social networking Fraudulent emails Internet banking 1 Computer security 2 There are several ways that

More information

Fighting spam in Australia. A consumer guide

Fighting spam in Australia. A consumer guide Fighting spam in Australia A consumer guide Fighting spam Use filtering software Install anti-virus software Use a personal firewall Download security patches Choose long and random passwords Protect your

More information

Online Security Information. Tips for staying safe online

Online Security Information. Tips for staying safe online Online Security Information ProCredit Bank is committed to protecting the integrity of your transactions and bank account details. ProCredit Bank therefore uses the latest security software and procedures

More information

Tax Fraud and Identity Theft Frequently Asked Questions [Updated February 10, 2015] 4. WHAT CAN I DO TO PROTECT MYSELF FROM TAX FRAUD IN THE FUTURE?

Tax Fraud and Identity Theft Frequently Asked Questions [Updated February 10, 2015] 4. WHAT CAN I DO TO PROTECT MYSELF FROM TAX FRAUD IN THE FUTURE? 1. WHAT HAPPENED (2015 UPDATE)? Tax Fraud and Identity Theft Frequently Asked Questions [Updated February 10, 2015] 2. WHAT IS THE ARCHDIOCESE DOING ABOUT THIS? 3. WHAT WERE THE RESULTS OF THE INVESTIGATIONS?

More information

UW-Madison. Tips to Avoid Phishing Scams

UW-Madison. Tips to Avoid Phishing Scams UW-Madison Tips to Avoid Phishing Scams What is phishing? Phishing is the use of fraudulent email, websites, text messages and phone calls to trick people into disclosing personal financial or identity

More information

Email Expanded Header: Viewing in Microsoft Outlook

Email Expanded Header: Viewing in Microsoft Outlook Email Expanded Header: Viewing in Microsoft Outlook Figure 1: Default Shown Header in an Outlook 2003 E-mail Message The Internet header of an e-mail message can have twenty lines or more showing all kinds

More information

Protect yourself online

Protect yourself online Protect yourself online Advice from Nottinghamshire Police s Pre Crime Unit Get daily updates: www.nottinghamshire.police.uk www.twitter.com/nottspolice www.facebook.com/nottspolice www.youtube.com/nottinghampolice

More information

Helping you to protect yourself against fraud and financial crime

Helping you to protect yourself against fraud and financial crime Helping you to protect yourself against fraud and financial crime first direct takes fraud & other financial crimes very seriously. Even though we have market-leading fraud detection systems, we want you

More information

Scams and Schemes LESSON PLAN UNIT 1. Essential Question What is identity theft, and how can you protect yourself from it?

Scams and Schemes LESSON PLAN UNIT 1. Essential Question What is identity theft, and how can you protect yourself from it? LESSON PLAN Scams and Schemes Essential Question What is identity theft, and how can you protect yourself from it? Lesson Overview Students learn strategies for guarding against identity theft and scams

More information

When registering on a jobsite, first ensure that the site is reputable and has a physical address and landline phone number.

When registering on a jobsite, first ensure that the site is reputable and has a physical address and landline phone number. Job searching online has become the most popular method of finding employment. Searching for the type of job you want is fast and easy, and you can see new jobs as soon as employers / agencies post them.

More information

STOP. THINK. CONNECT. Online Safety Quiz

STOP. THINK. CONNECT. Online Safety Quiz STOP. THINK. CONNECT. Online Safety Quiz Round 1: Safety and Security Kristina is on Facebook and receives a friend request from a boy she doesn t know. What should she do? A. Accept the friend request.

More information

I know what is identity theft but how do I know if mine has been stolen?

I know what is identity theft but how do I know if mine has been stolen? What is identity theft? You might hear stories on the news about stolen identities, but what is identity theft? When someone uses the personal information that identifies you, like your name, credit card

More information

Protecting your business from spam

Protecting your business from spam Protecting your business from spam What is spam? Spam is the common term for electronic junk mail unwanted messages sent to a person s email account or mobile phone. Spam messages vary: some simply promote

More information

Written Testimony of Sonia Ellis Submitted to the Special Committee on Aging United States Senate Hearing on the Jamaican Lottery Scam March 13, 2013

Written Testimony of Sonia Ellis Submitted to the Special Committee on Aging United States Senate Hearing on the Jamaican Lottery Scam March 13, 2013 Written Testimony of Sonia Ellis Submitted to the Special Committee on Aging United States Senate Hearing on the Jamaican Lottery Scam March 13, 2013 I would like to thank Chairman Nelson, Ranking member

More information

Protecting Your Identity From Fraud. Clarissa Goins, VP Compliance Karen Osterhoudt, VP Operations

Protecting Your Identity From Fraud. Clarissa Goins, VP Compliance Karen Osterhoudt, VP Operations Protecting Your Identity From Fraud Clarissa Goins, VP Compliance Karen Osterhoudt, VP Operations Agenda How To Secure Your Identity Top 5 Financial Frauds Against Seniors Baby Boomers and Identity Theft

More information

Scams and Schemes LESSON PLAN UNIT 1. Essential Question What is identity theft, and how can you protect yourself from it?

Scams and Schemes LESSON PLAN UNIT 1. Essential Question What is identity theft, and how can you protect yourself from it? LESSON PLAN Scams and Schemes Essential Question What is identity theft, and how can you protect yourself from it? Lesson Overview Students learn strategies for guarding against identity theft and scams

More information

Protecting your business from fraud

Protecting your business from fraud Protecting your business from fraud KEY TAKEAWAYS > Understand the most common types of fraud and how to identify them. > What to do if you uncover fraudulent activity or suspect you are a victim of fraud.

More information

Fraud. Your guide to protecting yourself from fraud

Fraud. Your guide to protecting yourself from fraud Fraud Your guide to protecting yourself from fraud Kent Police is committed to protecting people from career criminals and fraudsters. This booklet has been designed to give you advice on how to protect

More information

Avoid completing forms in email messages that ask for personal financial information.

Avoid completing forms in email messages that ask for personal financial information. INTERNET FRAUD Online scams and viruses are constantly evolving and they threaten the security of computers worldwide. As criminals evolve their tactics, you need to keep your PC's security software (virus

More information

Malware & Botnets. Botnets

Malware & Botnets. Botnets - 2 - Malware & Botnets The Internet is a powerful and useful tool, but in the same way that you shouldn t drive without buckling your seat belt or ride a bike without a helmet, you shouldn t venture online

More information

Fraud Guide Fraud Protection

Fraud Guide Fraud Protection Fraud Guide Fraud Protection A simple guide on how to protect yourself against fraud. A simple guide on how to protect yourself against fraud It seems like every day there are new reports of different

More information

SAFE ONLINE BANKING. Online Banking, Data Security You. Your Partnership for Safe Online Banking

SAFE ONLINE BANKING. Online Banking, Data Security You. Your Partnership for Safe Online Banking SAFE ONLINE BANKING Online Banking, Data Security You & Your Partnership for Safe Online Banking Partnering for Online Security O Online banking has grown rapidly from a niche service to a major new way

More information

CONTACT. information. All consumer complaints must be made in writing. Please call or write for a complaint form. Write to:

CONTACT. information. All consumer complaints must be made in writing. Please call or write for a complaint form. Write to: GREG ABBOTT Attorney General of Texas CONTACT information For more information or to obtain copies of brochures, call the Attorney General s Consumer Protection Hotline at (800) 621-0508, or contact your

More information

What you need to know to keep your computer safe on the Internet

What you need to know to keep your computer safe on the Internet What you need to know to keep your computer safe on the Internet Tip 1: Always install Operating System updates The most important steps for any computer user is to always install updates, especially security

More information

1. Any email requesting personal information, or asking you to verify an account, is usually a scam... even if it looks authentic.

1. Any email requesting personal information, or asking you to verify an account, is usually a scam... even if it looks authentic. Your identity is one of the most valuable things you own. It s important to keep your identity from being stolen by someone who can potentially harm your good name and financial well-being. Identity theft

More information

OCT Training & Technology Solutions Training@qc.cuny.edu (718) 997-4875

OCT Training & Technology Solutions Training@qc.cuny.edu (718) 997-4875 OCT Training & Technology Solutions Training@qc.cuny.edu (718) 997-4875 Understanding Information Security Information Security Information security refers to safeguarding information from misuse and theft,

More information

Phone Scams. Federal Trade Commission consumer.ftc.gov

Phone Scams. Federal Trade Commission consumer.ftc.gov Phone Scams Federal Trade Commission consumer.ftc.gov Every year, thousands of people lose money to telephone scams from a few dollars to their life savings. Scammers will say anything to cheat people

More information

Attorney General Ellen Rosenblum Warns Oregon Nonprofits to Watch Out for Phony Donors

Attorney General Ellen Rosenblum Warns Oregon Nonprofits to Watch Out for Phony Donors From: Sent: To: Subject: Attorney General Ellen F. Rosenblum Thursday, January 16, 2014 1:21 PM Watch Out for Phony Donors! Having trouble viewing this email? Click here

More information

Introduction. Tips for Email Success. Email 101 Email Etiquette and Safety. Page 1

Introduction. Tips for Email Success. Email 101 Email Etiquette and Safety. Page 1 Email 101 Email Etiquette and Safety Introduction Page 1 Like any form of online communication, it's important to practice good etiquette and safety when using email. Etiquette is a set of rules and guidelines

More information

VICARS VICTIMS INITIATIVE FOR COUNSELING, ADVOCACY, AND RESTORATION OF THE SOUTHWEST

VICARS VICTIMS INITIATIVE FOR COUNSELING, ADVOCACY, AND RESTORATION OF THE SOUTHWEST VICARS VICTIMS INITIATIVE FOR COUNSELING, ADVOCACY, AND RESTORATION OF THE SOUTHWEST A program of the Texas Legal Services Center supported by Grant No. 2007-VF-GX-K032 awarded by the Office for Victims

More information

Low-Income Taxpayer Clinic (LITC) Choosing a Tax Return Preparer

Low-Income Taxpayer Clinic (LITC) Choosing a Tax Return Preparer Low-Income Taxpayer Clinic (LITC) Choosing a Tax Return Preparer Choosing a Tax Return Preparer If you plan to pay a preparer, please review the following points to ensure your return is correctly filed

More information

8765 CA_ScamBroc 10/10/11 10:45 AM Page 1 www.tn.gov/consumer

8765 CA_ScamBroc 10/10/11 10:45 AM Page 1 www.tn.gov/consumer www.tn.gov/consumer Tennessee Division of Consumer Affairs Don t Get Scammed Table of Contents Auction Fraud...1 Counterfeit Cashier s Check...1 Credit Card Fraud...1 Debt Elimination...2 DHL/UPS...2 Employment/Business

More information

Social Media and Cyber Safety

Social Media and Cyber Safety Social Media and Cyber Safety Presented to the National Association of REALTORS by Andrew Wooten Safety and Security Consultant andrew@justbesafe.com Social Media and Cyber Safety Our instructor today

More information

Don t be a victim... Providing useful information to help you recognize criminals and the hallmarks of their scams.

Don t be a victim... Providing useful information to help you recognize criminals and the hallmarks of their scams. SERIES Don t be a victim... Providing useful information to help you recognize criminals and the hallmarks of their scams. You may not think twice of an individual from the IRS asking for personal information

More information

Practical tips for a. Safe Christmas

Practical tips for a. Safe Christmas Practical tips for a Safe Christmas CONTENTS 1. Online shopping 2 2. Online games 4 3. Instant messaging and mail 5 4. Practical tips for a safe digital Christmas 6 The Christmas holidays normally see

More information

OUR GUIDE TO PROTECTING YOUR PERSONAL INFORMATION

OUR GUIDE TO PROTECTING YOUR PERSONAL INFORMATION OUR GUIDE TO PROTECTING YOUR PERSONAL INFORMATION What is personal information? Personal information is information about you. It can be your name, address, or telephone number. It can also be the type

More information

Are you Smarter than a Scam Artist? 2015 AASC National Conference Nashville, Tennessee

Are you Smarter than a Scam Artist? 2015 AASC National Conference Nashville, Tennessee Are you Smarter than a Scam Artist? 2015 AASC National Conference Nashville, Tennessee Government Grants The government gives grants to special people like you! Stimulus money is still available through

More information

Fraud Advice for Businesses

Fraud Advice for Businesses Fraud Advice for Businesses What is Fraud? Fraud is a crime in which some kind of deception is used for personal gain. Fraud is sometimes also referred to by other names such as a scam or con. Businesses

More information

Scams AND. Swindles. Avoiding Investment Fraud. An Educational Guide to

Scams AND. Swindles. Avoiding Investment Fraud. An Educational Guide to Scams AND Swindles An Educational Guide to Avoiding Investment Fraud Scams AND Swindles An Educational Guide to Avoiding Investment Fraud Double your money in six months with absolutely no risk! You must

More information

FAKE ANTIVIRUS MALWARE This information has come from http://www.bleepingcomputer.com/ - a very useful resource if you are having computer issues.

FAKE ANTIVIRUS MALWARE This information has come from http://www.bleepingcomputer.com/ - a very useful resource if you are having computer issues. FAKE ANTIVIRUS MALWARE This information has come from http://www.bleepingcomputer.com/ - a very useful resource if you are having computer issues. The latest tactic currently being used by malware creators

More information

Could you spot a scammer?

Could you spot a scammer? Could you spot a scammer? Keeping you safe and secure Fraud can affect anyone whatever your background, age or experience And attempts can come in all shapes and sizes over the phone, on the internet or

More information

CENTRAL DIVISION PRESS FORT WORTH POLICE DEPARTMENT APRIL 2015 NEWSLETTER PAGE 1 of 6

CENTRAL DIVISION PRESS FORT WORTH POLICE DEPARTMENT APRIL 2015 NEWSLETTER PAGE 1 of 6 CENTRAL DIVISION PRESS FORT WORTH POLICE DEPARTMENT APRIL 2015 NEWSLETTER PAGE 1 of 6 Officer Vance Keyes (pictured right) is our new Captain for Central Division. He has been a member of the Fort Worth

More information

Chapter 9. Debt Collection

Chapter 9. Debt Collection Chapter 9 73 Bill collectors will use many tactics to force a consumer to pay his or her debt. However, it is important for a consumer to know the laws about debt collection to avoid being scammed or

More information

Protect Yourself. Who is asking? What information are they asking for? Why do they need it?

Protect Yourself. Who is asking? What information are they asking for? Why do they need it? Protect Yourself Your home computer serves many purposes: email, shopping, social networking and more. As you surf the Internet, you should be aware of the various ways to protect yourself. Of primary

More information

SCAM MAIL IS BLACKMAIL

SCAM MAIL IS BLACKMAIL SCAM MAIL IS BLACKMAIL Information and advice about scam mail and the Think Jessica campaign Supported by Criminals worldwide are sending scam letters, which trick, seem to befriend and even threaten millions

More information

Types of Elder Abuse

Types of Elder Abuse SENIOR SELF DEFENSE Protect Yourself From All Types of Fraud and Abuse 1 Types of Elder Abuse Physical Abuse Sexual Abuse Verbal and Mental Abuse Financial Abuse Neglect Self-Neglect Isolation and Violations

More information

MoneySmart Rookie Community educator guide. Financial literacy for young people

MoneySmart Rookie Community educator guide. Financial literacy for young people MoneySmart Rookie Community educator guide Financial literacy for young people Copyright information Website: ISBN: 978 0 9805533 9 0. Creative Commons This Community educator guide is available under

More information

www.thalesgroup.com Business Ethics Conduct Guide Best practice guidelines for using e-mail

www.thalesgroup.com Business Ethics Conduct Guide Best practice guidelines for using e-mail www.thalesgroup.com Business Ethics Conduct Guide Best practice guidelines for using e-mail Contents PREFACE...3 DID YOU KNOW?...4 Make better use of time... 4 Manage the mass of information... 5 Avoid

More information

OIG Fraud Alert Phishing

OIG Fraud Alert Phishing U.S. EQUAL EMPLOYMENT OPPORTUNITY COMMISSION Washington, D.C. 20507 Office of Inspector General Aletha L. Brown Inspector General July 22, 2005 OIG Fraud Alert Phishing What is Phishing? Phishing is a

More information

Online Security Tips

Online Security Tips Online Security Tips Is your computer set to automatically check for software and security updates? Do you type your name in search engines to see what personal information is online? Have you customized

More information

C-SAVE. Scenario #1 Jake and the Bad Virus. The two major C3 concepts this scenario illustrates are:

C-SAVE. Scenario #1 Jake and the Bad Virus. The two major C3 concepts this scenario illustrates are: Scenario #1 Jake and the Bad Virus The two major C3 concepts this scenario illustrates are: Cyber Security: Jake compromised his computer s security by providing personal information to an unknown online

More information

S t r o n a 1 Nauki ścisłe priorytetem społeczeństwa opartego na wiedzy Artykuły na platformę CMS

S t r o n a 1 Nauki ścisłe priorytetem społeczeństwa opartego na wiedzy Artykuły na platformę CMS S t r o n a 1 Introduction This article is informative, it is routed to the secondary school students - can be a reminder of issues raised in middle school. Text and multimedia materials are here to encourage

More information

Identity Theft Awareness: Don t Fall Victim to these Common Scams

Identity Theft Awareness: Don t Fall Victim to these Common Scams Identity Theft Awareness: Don t Fall Victim to these Common Scams We want you to understand what identity theft is, how it happens, and how to protect yourself. Please read and familiarize yourself with

More information

White paper. Phishing, Vishing and Smishing: Old Threats Present New Risks

White paper. Phishing, Vishing and Smishing: Old Threats Present New Risks White paper Phishing, Vishing and Smishing: Old Threats Present New Risks How much do you really know about phishing, vishing and smishing? Phishing, vishing, and smishing are not new threats. They have

More information

Cyber Security. Maintaining Your Identity on the Net

Cyber Security. Maintaining Your Identity on the Net Cyber Security Maintaining Your Identity on the Net Why Cyber Security? There are three points of failure in any secure network: Technology (hardware and software) Technology Support (ITS) End Users (USD

More information

Protecting your business from some of the current fraud threats

Protecting your business from some of the current fraud threats Protecting your business from some of the current fraud threats This literature provides guidance on fraud prevention and is provided for information purposes only. Where noted the guidance provided has

More information

:: Free but Fake: Rogue Anti-malware. Cristian Borghello, CISSP

:: Free but Fake: Rogue Anti-malware. Cristian Borghello, CISSP :: Free but Fake: Rogue Anti-malware Cristian Borghello, CISSP Table of Contents Introduction 2 Analysis of a Well-known Case 3 Conclusion 7 Further Information 8 1 Introduction Most antivirus products

More information

AVOIDING ONLINE THREATS CYBER SECURITY MYTHS, FACTS, TIPS. ftrsecure.com

AVOIDING ONLINE THREATS CYBER SECURITY MYTHS, FACTS, TIPS. ftrsecure.com AVOIDING ONLINE THREATS CYBER SECURITY MYTHS, FACTS, TIPS ftrsecure.com Can You Separate Myths From Facts? Many Internet myths still persist that could leave you vulnerable to internet crimes. Check out

More information

Avoiding Malware in Your Dental Practice. 10 Best Practices to Defend Your Data

Avoiding Malware in Your Dental Practice. 10 Best Practices to Defend Your Data Avoiding Malware in Your Dental Practice 10 Best Practices to Defend Your Data Avoiding Malware in Your Dental Practice Like most small business owners, you must protect your dental practice s computer

More information

Frequently Asked Questions [Updated January 20, 2015]

Frequently Asked Questions [Updated January 20, 2015] Frequently Asked Questions [Updated January 20, 2015] Some information in these FAQs has been provided to the Archdiocese of Portland in Oregon by the Internal Revenue Service. Note: Given the immediate

More information

Bad Ads Trend Alert: Shining a Light on Tech Support Advertising Scams. May 2014. TrustInAds.org. Keeping people safe from bad online ads

Bad Ads Trend Alert: Shining a Light on Tech Support Advertising Scams. May 2014. TrustInAds.org. Keeping people safe from bad online ads Bad Ads Trend Alert: Shining a Light on Tech Support Advertising Scams May 2014 TrustInAds.org Keeping people safe from bad online ads OVERVIEW Today, even the most tech savvy individuals can find themselves

More information

Corona Police Department

Corona Police Department By Detective John Alvarez Corona Police Department High Technology Crimes Unit California Penal Code 530.5(a) defines Identity Theft: Every person who willfully obtains personal identifying information,

More information

Avoiding Malware in Your Dental Practice. 10 Best Practices to Defend Your Data

Avoiding Malware in Your Dental Practice. 10 Best Practices to Defend Your Data Avoiding Malware in Your Dental Practice 10 Best Practices to Defend Your Data Avoiding Malware in Your Dental Practice Like most small business owners, you must protect your dental practice s computer

More information

Before Giving to a Charity

Before Giving to a Charity Before Giving to a Charity Federal Trade Commission consumer.ftc.gov If you re considering a request for a donation to a charity, do some research before you give. By finding out as much as you can about

More information

SCAMS. Action: Throw out the letter and contact Social Security directly by phone at 1-800-441-2555 or visit their website. http://www.ssa.

SCAMS. Action: Throw out the letter and contact Social Security directly by phone at 1-800-441-2555 or visit their website. http://www.ssa. SCAMS SOCIAL SECURITY SCAMS You use your Social Security number for your identity, to get a job, and to apply for Medicare and Social Security as you become older. Unfortunately though, there are a lot

More information

Computer Security Self-Test: Questions & Scenarios

Computer Security Self-Test: Questions & Scenarios Computer Security Self-Test: Questions & Scenarios Rev. Sept 2015 Scenario #1: Your supervisor is very busy and asks you to log into the HR Server using her user-id and password to retrieve some reports.

More information

Top Cyber Threats Of 2009

Top Cyber Threats Of 2009 Top Cyber Threats Of 2009 Who were the top 5 riskiest celebrities in 2009? Did spammers really know who killed Michael Jackson? Data from Symantec Security Response November 2009 Top 5 Riskiest Celebrities

More information

Internet basics 2.3 Protecting your computer

Internet basics 2.3 Protecting your computer Basics Use this document with the glossary Beginner s guide to Internet basics 2.3 Protecting your computer How can I protect my computer? This activity will show you how to protect your computer from

More information

Phishing and the threat to corporate networks

Phishing and the threat to corporate networks Phishing and the threat to corporate networks A Sophos white paper August 2005 SUMMARY This paper explains the online fraud known as phishing, examining how it threatens businesses and looking at the dramatic

More information

THINGS YOU SHOULD KNOW ABOUT IDENTITY THEFT

THINGS YOU SHOULD KNOW ABOUT IDENTITY THEFT THINGS YOU SHOULD KNOW ABOUT IDENTITY THEFT Compliments of: Fripp Island Security and FIPOA Security Committee November 2013 1 INTRODUCTION Identity theft is a serious crime. It occurs when your personal

More information

F-Secure Anti-Virus for Mac 2015

F-Secure Anti-Virus for Mac 2015 F-Secure Anti-Virus for Mac 2015 TOC F-Secure Anti-Virus for Mac 2015 Contents Chapter 1: Getting started...3 1.1 Manage subscription...4 1.2 How to make sure that my computer is protected...4 1.2.1 Protection

More information

FRAUD PROTECTION AND ONLINE SAFETY 2015 EDITION

FRAUD PROTECTION AND ONLINE SAFETY 2015 EDITION FRAUD PROTECTION AND ONLINE SAFETY 2015 EDITION 1 Table of Contents Mobile Device Settings Creating & Managing Passwords Phishing & Imposter Scams Healthcare, Charity, and Lottery Scams Identity Theft

More information

SCAMBOOK SCAMS AND FRAUDS TARGETING RESIDENTS AND BUSINESSES. Tamworth Neighbourhood Watch Don Palmer Community Engagement Co-ordinator.

SCAMBOOK SCAMS AND FRAUDS TARGETING RESIDENTS AND BUSINESSES. Tamworth Neighbourhood Watch Don Palmer Community Engagement Co-ordinator. May 2015 SCAMBOOK SCAMS AND FRAUDS TARGETING RESIDENTS AND BUSINESSES Tamworth Neighbourhood Watch Don Palmer Community Engagement Co-ordinator. May 2015 Page 1 A CONFIDENCE TRICK or SCAM is an attempt

More information

CSUF Tech Day 2015. Security Awareness Overview Dale Coddington, Information Security Office dcoddington@fullerton.edu

CSUF Tech Day 2015. Security Awareness Overview Dale Coddington, Information Security Office dcoddington@fullerton.edu CSUF Tech Day 2015 Security Awareness Overview Dale Coddington, Information Security Office dcoddington@fullerton.edu Agenda Introduction Large scale data breaches: 2014 and beyond Email based attacks:

More information

How to Identify Phishing E-Mails

How to Identify Phishing E-Mails How to Identify Phishing E-Mails How to recognize fraudulent emails and avoid being phished. Presented by : Miguel Fra, Falcon IT Services (miguel@falconitservices.com) http://www.falconitservices.com

More information

Mind your money. Keeping Your Money Safe

Mind your money. Keeping Your Money Safe Mind your money Keeping Your Money Safe Keeping Your Money Safe What we want you to take out of this lesson: Be aware be careful with your money Understand a little more about keeping your money safe online

More information

Phoenix Information Technology Services. Julio Cardenas

Phoenix Information Technology Services. Julio Cardenas Phoenix Information Technology Services Julio Cardenas Email spam, also known as junk email or unsolicited bulk email (UBE), is a subset of electronic spam involving nearly identical messages sent to numerous

More information

Caller ID Spoofing Good and Bad

Caller ID Spoofing Good and Bad ITU Workshop on Caller ID Spoofing (Geneva, Switzerland, 2 June 2014) Caller ID Spoofing Good and Bad Freddie McBride Numbering & Networks European Communications Office freddie.mcbride@eco.cept.org Follow

More information

Retail/Consumer Client. Internet Banking Awareness and Education Program

Retail/Consumer Client. Internet Banking Awareness and Education Program Retail/Consumer Client Internet Banking Awareness and Education Program Table of Contents Securing Your Environment... 3 Unsolicited Client Contact... 3 Protecting Your Identity... 3 E-mail Risk... 3 Internet

More information

STUDENT S INFORMATION SECURITY GUIDE

STUDENT S INFORMATION SECURITY GUIDE STUDENT S INFORMATION SECURITY GUIDE April 2013 Table of contents Information security is important - also for you...1 Use strong passwords and keep them safe...2 E-mail use...3 Beware of phishing and

More information

Class 3: Identify Tricks and Scams Online

Class 3: Identify Tricks and Scams Online Class 3: Identify Tricks and Scams Online Identify Tricks and Scams Online Instructor s Overview DESCRIPTION: In this lesson, students will learn how to avoid online tricks and scams, and learn best practices

More information

Data protection. Protecting your personal information online

Data protection. Protecting your personal information online Data protection Protecting your personal information online 3 Introduction More and more people are conducting their personal affairs online. Online shopping, social networking, job hunting and the ability

More information

CyberCrime and ID Theft

CyberCrime and ID Theft CyberCrime and ID Theft Be Suspicious Chad Crummer Washington Attorney General s Office Trust No One (only slightly kidding) Overview Statistics CyberCrime Examples We See and Target Phishing / Smshing

More information

How to stay safe online

How to stay safe online How to stay safe online Everyone knows about computer viruses...or at least they think they do. Nearly 30 years ago, the first computer virus was written and since then, millions of viruses and other malware

More information

In fact, most of us are so excited at the thought of being out of debt that we often don t check out things as thoroughly as we should.

In fact, most of us are so excited at the thought of being out of debt that we often don t check out things as thoroughly as we should. Debt Scams Debt scams are more common than most people might think; in fact they are more prevalent than most people would even care to think. Not being aware of this can make a person more at risk of

More information