Scams Bulletin. April 2014
|
|
- Leon Webb
- 8 years ago
- Views:
Transcription
1 Scams Bulletin April 2014 The purpose of this scams bulletin is to enable Hampshire residents to be aware, and therefore guard against the type of scams currently being reported to the Hampshire Trading Standards Service. Trading Standards will collate information on scams to provide information and intelligence to the public and other agencies but will normally only intervene when the victim is vulnerable and has been financially abused. In appropriate cases Trading Standards will also seek to take enforcement action through the courts. If you are worried about a potential scam please contact: or online using the HANDLING: This bulletin may be distributed to the public
2 Scam Involving Fake Citizens Advice Bureau Phone Calls Hampshire Trading Standards Service is warning residents to be wary of imposters claiming to be Citizen Advice Bureau (CAB) Advisers. The fake caller will make an unsolicited phone call or send a text message pretending to offer services in an attempt to scam their intended victim out of money. Reports from the CAB indicate that this may be in relation to help with an accident claim or that the person has appeared on a database as someone who may need extra support. On one occasion the fake caller appeared to be recommending a particular firm of solicitors who would be able to assist with a claim. The CAB have stressed that no CAB Adviser or employee will ever text a member of the public out of the blue. If you receive a call or text message from someone purporting to work for the CAB do not engage in conversation and hang up the phone immediately. For further information, the official website for the CAB is
3 Parking Fine Scam Hampshire residents are warned to be cautious should they receive an unsolicited alleging they owe money for a parking fine. The will look quite plausible and will use strong wording such as REMINDER NOTICE DO NOT IGNORE to grab the recipients attention. The content of the will include information about how much money is owed and that further costs may incur unless the fine is settled immediately. It may contain a warning that if the amount is not paid, further action will be taken and the consumers credit rating may be affected. The intended victim will be invited to open an attachment where they will find alleged photographic evidence to support the claim and a form for making payment. This attachment is likely to contain a virus which will affect their computer. Real life case study Mr G received an from an address that looked like a genuine government site, alleging he owed 70 for an unknown parking fine. Although the gave a time, date and location for the alleged parking offence, Mr G did not recognise the information as correct. However, he was told that photographic evidence to support the claim was contained in a link. Although Mr G was suspicious about the , he was also concerned that this may be genuine, but sent in error. However, he decided not to open the link, and sought advice from Trading Standards who confirmed the was a scam. DO NOT open an or any attachments if you have any concerns about its source or content. For further advice or to report a scam please contact;
4 News Video Malware Warning Scammers are known to take advantage of major news stories or events where there is a high level of public interest. They will use a range of tools to trick people under the guise of topical stories, such as spam s with malicious content or seeking donations to fake charities. Recent reports concern the disappearance of the Malaysian Airlines Flight MH370. Scammers have been sending s and social media messages at random with links purporting to be videos on the disappearance of the aeroplane. This link may take you to a website that appears to be legitimate (such as a major news channel), however it will be fake. If you click on the link, your computer could be infected and scammers may be able to gain remote access to your personal information, including on-line banking facilities. Protect Yourself If you receive an unsolicited or social media message about a major news item, do not click on any links or open attachments. If you want to access information on a major or breaking news item, use a reliable news source. Always keep your computer security up to date with an anti-virus software and a good firewall. Don t let scammers taking advantage of tragedies, take advantage of you.
5 Investment Scams Update Hampshire County Council Trading Standards Service has continued to receive complaints about various investment scams. Investment scams can look and sound believable, with smooth-talking salespeople, slick websites or sophisticated brochures and documentation. This can make it hard to tell them apart from genuine investment opportunities. Real life case study 1 Miss Y received a phone call from a man who asked if she was interested in the environment. Once the man had gained her interest, he promoted an opportunity where she could invest in a company that supported sustainable mineral mining. The man sent Miss Y a glossy brochure and then visited her in person. Miss Y was convinced by the ethics of the scheme and invested approximately Miss Y is now seeking her money back, but as yet this has not been received. Real life case study 2 Mr E received a phone call from a scammer offering an investment opportunity with a guaranteed high financial return. The scam involved investing in diamonds, which were being marketed at a highly inflated price. Mr E requested further information, and was sent a brochure. At this point, he became suspicious and sought advice from Trading Standards. Mr E was advised this was a scam, and did not take any further action. The scammer has continued to phone Mr E, who is now considering changing his telephone number. Hampshire Trading Standards Service reminds all residents to be vigilant and report any concerns to;
SCAMS BULLETIN. November 2014
November 2014 The purpose of this scams bulletin is to enable Isle of Wight Council residents to be aware, and therefore guard against the type of scams currently being reported to the Isle of Wight Council
More informationAGE WELL SENIOR SERVICES REMINDS SENIORS TO BE ON THE LOOKOUT FOR SCAM ARTISTS
CONTACT: Dan Pittman 714.282.9994 dan@pittmanpr.com AGE WELL SENIOR SERVICES REMINDS SENIORS TO BE ON THE LOOKOUT FOR SCAM ARTISTS LAGUNA WOODS, California, April 11, 2012 Age Well Senior Services, Orange
More informationDON T BE FOOLED BY EMAIL SPAM FREE GUIDE. Provided by: Don t Be Fooled by Spam E-Mail FREE GUIDE. December 2014 Oliver James Enterprise
Provided by: December 2014 Oliver James Enterprise DON T BE FOOLED BY EMAIL SPAM FREE GUIDE 1 This guide will teach you: How to spot fraudulent and spam e-mails How spammers obtain your email address How
More informationS.A.F.E. Recognize a scam before you become a victim of fraud Division of Consumer Protection
S.A.F.E. Senior Anti-Fraud Education Recognize a scam before you become a victim of fraud New York StaTe Department of State Division of Consumer Protection Advocating for and empowering New York consumers
More informationE-MAIL & INTERNET FRAUD
FRAUD ALERT! FRAUD ALERT! Guarding Against E-MAIL & INTERNET FRAUD What credit union members should know to counter Phishing Pharming Spyware Online fraud On-Line Fraud Is Growing E-Mail and Internet Fraud
More informationAdvance Fee Loans. Computer Malware Scams. Credit Repair Scams
Advance Fee Loans Scam artists can trick you into paying money to qualify for a loan or credit card. Despite their guarantees, you do not receive a loan, credit card, or any money. Never pay money to qualify
More informationCyber Security. Securing Your Mobile and Online Banking Transactions
Cyber Security Securing Your Mobile and Online Banking Transactions For additional copies or to download this document, please visit: http://msisac.cisecurity.org/resources/guides 2014 Center for Internet
More informationA mule s life is a fool s life
A mule s life is a fool s life Allowing your bank account to be used to send and receive funds for others can result in a criminal record. A mule s life is a fool s life. The bank account lies at the heart
More informationDeception scams drive increase in financial fraud
ADDRESS 2 Thomas More Square London E1W 1YN WEBSITE www.financialfraudaction.org.uk DIRECT LINE 020 3217 8436 NEWS RELEASE EMAIL press@ukcards-ffauk.org.uk Deception scams drive increase in financial fraud
More informationLearn to protect yourself from Identity Theft. First National Bank can help.
Learn to protect yourself from Identity Theft. First National Bank can help. Your identity is one of the most valuable things you own. It s important to keep your identity from being stolen by someone
More informationTHE STATE BAR OF TEXAS. Just Hang UP. Protect Yourself From Unscrupulous Telemarketers and Con Artists
THE STATE BAR OF TEXAS Just Hang UP Protect Yourself From Unscrupulous Telemarketers and Con Artists JUST HANG UP! Protect Yourself From Unscrupulous Telemarketers and Con Artists I'm Barbara Bush for
More informationScams and Schemes. objectives. Essential Question: What is identity theft, and how can you protect yourself from it? Learning Overview and Objectives
Estimated time: 45 minutes Essential Question: What is identity theft, and how can you protect yourself from it? Learning Overview and Objectives Overview: Students learn strategies for guarding against
More informationLearning to Detect Spam and Phishing Emails Page 1 of 6
Page 1 of 6 Email provides us a powerful communication tool. Unfortunately, it also provides scammers an easy means for luring potential victims. The scams they attempt run from old-fashioned bait-and-switch
More informationAdvice about online security
Advice about online security May 2013 Contents Report a suspicious email or website... 3 Security advice... 5 Genuine DWP contacts... 8 Recognising and reporting phishing and bogus emails... 9 How DWP
More informationSENIORS ONLINE SECURITY
SENIORS ONLINE SECURITY Seniors Online Security Five Distinct Areas Computer security Identity crime Social networking Fraudulent emails Internet banking 1 Computer security 2 There are several ways that
More informationFighting spam in Australia. A consumer guide
Fighting spam in Australia A consumer guide Fighting spam Use filtering software Install anti-virus software Use a personal firewall Download security patches Choose long and random passwords Protect your
More informationOnline Security Information. Tips for staying safe online
Online Security Information ProCredit Bank is committed to protecting the integrity of your transactions and bank account details. ProCredit Bank therefore uses the latest security software and procedures
More informationTax Fraud and Identity Theft Frequently Asked Questions [Updated February 10, 2015] 4. WHAT CAN I DO TO PROTECT MYSELF FROM TAX FRAUD IN THE FUTURE?
1. WHAT HAPPENED (2015 UPDATE)? Tax Fraud and Identity Theft Frequently Asked Questions [Updated February 10, 2015] 2. WHAT IS THE ARCHDIOCESE DOING ABOUT THIS? 3. WHAT WERE THE RESULTS OF THE INVESTIGATIONS?
More informationUW-Madison. Tips to Avoid Phishing Scams
UW-Madison Tips to Avoid Phishing Scams What is phishing? Phishing is the use of fraudulent email, websites, text messages and phone calls to trick people into disclosing personal financial or identity
More informationEmail Expanded Header: Viewing in Microsoft Outlook
Email Expanded Header: Viewing in Microsoft Outlook Figure 1: Default Shown Header in an Outlook 2003 E-mail Message The Internet header of an e-mail message can have twenty lines or more showing all kinds
More informationProtect yourself online
Protect yourself online Advice from Nottinghamshire Police s Pre Crime Unit Get daily updates: www.nottinghamshire.police.uk www.twitter.com/nottspolice www.facebook.com/nottspolice www.youtube.com/nottinghampolice
More informationHelping you to protect yourself against fraud and financial crime
Helping you to protect yourself against fraud and financial crime first direct takes fraud & other financial crimes very seriously. Even though we have market-leading fraud detection systems, we want you
More informationScams and Schemes LESSON PLAN UNIT 1. Essential Question What is identity theft, and how can you protect yourself from it?
LESSON PLAN Scams and Schemes Essential Question What is identity theft, and how can you protect yourself from it? Lesson Overview Students learn strategies for guarding against identity theft and scams
More informationWhen registering on a jobsite, first ensure that the site is reputable and has a physical address and landline phone number.
Job searching online has become the most popular method of finding employment. Searching for the type of job you want is fast and easy, and you can see new jobs as soon as employers / agencies post them.
More informationSTOP. THINK. CONNECT. Online Safety Quiz
STOP. THINK. CONNECT. Online Safety Quiz Round 1: Safety and Security Kristina is on Facebook and receives a friend request from a boy she doesn t know. What should she do? A. Accept the friend request.
More informationI know what is identity theft but how do I know if mine has been stolen?
What is identity theft? You might hear stories on the news about stolen identities, but what is identity theft? When someone uses the personal information that identifies you, like your name, credit card
More informationProtecting your business from spam
Protecting your business from spam What is spam? Spam is the common term for electronic junk mail unwanted messages sent to a person s email account or mobile phone. Spam messages vary: some simply promote
More informationWritten Testimony of Sonia Ellis Submitted to the Special Committee on Aging United States Senate Hearing on the Jamaican Lottery Scam March 13, 2013
Written Testimony of Sonia Ellis Submitted to the Special Committee on Aging United States Senate Hearing on the Jamaican Lottery Scam March 13, 2013 I would like to thank Chairman Nelson, Ranking member
More informationProtecting Your Identity From Fraud. Clarissa Goins, VP Compliance Karen Osterhoudt, VP Operations
Protecting Your Identity From Fraud Clarissa Goins, VP Compliance Karen Osterhoudt, VP Operations Agenda How To Secure Your Identity Top 5 Financial Frauds Against Seniors Baby Boomers and Identity Theft
More informationScams and Schemes LESSON PLAN UNIT 1. Essential Question What is identity theft, and how can you protect yourself from it?
LESSON PLAN Scams and Schemes Essential Question What is identity theft, and how can you protect yourself from it? Lesson Overview Students learn strategies for guarding against identity theft and scams
More informationProtecting your business from fraud
Protecting your business from fraud KEY TAKEAWAYS > Understand the most common types of fraud and how to identify them. > What to do if you uncover fraudulent activity or suspect you are a victim of fraud.
More informationFraud. Your guide to protecting yourself from fraud
Fraud Your guide to protecting yourself from fraud Kent Police is committed to protecting people from career criminals and fraudsters. This booklet has been designed to give you advice on how to protect
More informationAvoid completing forms in email messages that ask for personal financial information.
INTERNET FRAUD Online scams and viruses are constantly evolving and they threaten the security of computers worldwide. As criminals evolve their tactics, you need to keep your PC's security software (virus
More informationMalware & Botnets. Botnets
- 2 - Malware & Botnets The Internet is a powerful and useful tool, but in the same way that you shouldn t drive without buckling your seat belt or ride a bike without a helmet, you shouldn t venture online
More informationFraud Guide Fraud Protection
Fraud Guide Fraud Protection A simple guide on how to protect yourself against fraud. A simple guide on how to protect yourself against fraud It seems like every day there are new reports of different
More informationSAFE ONLINE BANKING. Online Banking, Data Security You. Your Partnership for Safe Online Banking
SAFE ONLINE BANKING Online Banking, Data Security You & Your Partnership for Safe Online Banking Partnering for Online Security O Online banking has grown rapidly from a niche service to a major new way
More informationCONTACT. information. All consumer complaints must be made in writing. Please call or write for a complaint form. Write to:
GREG ABBOTT Attorney General of Texas CONTACT information For more information or to obtain copies of brochures, call the Attorney General s Consumer Protection Hotline at (800) 621-0508, or contact your
More informationWhat you need to know to keep your computer safe on the Internet
What you need to know to keep your computer safe on the Internet Tip 1: Always install Operating System updates The most important steps for any computer user is to always install updates, especially security
More information1. Any email requesting personal information, or asking you to verify an account, is usually a scam... even if it looks authentic.
Your identity is one of the most valuable things you own. It s important to keep your identity from being stolen by someone who can potentially harm your good name and financial well-being. Identity theft
More informationOCT Training & Technology Solutions Training@qc.cuny.edu (718) 997-4875
OCT Training & Technology Solutions Training@qc.cuny.edu (718) 997-4875 Understanding Information Security Information Security Information security refers to safeguarding information from misuse and theft,
More informationPhone Scams. Federal Trade Commission consumer.ftc.gov
Phone Scams Federal Trade Commission consumer.ftc.gov Every year, thousands of people lose money to telephone scams from a few dollars to their life savings. Scammers will say anything to cheat people
More informationAttorney General Ellen Rosenblum Warns Oregon Nonprofits to Watch Out for Phony Donors
From: Sent: To: Subject: Attorney General Ellen F. Rosenblum Thursday, January 16, 2014 1:21 PM Watch Out for Phony Donors! Having trouble viewing this email? Click here
More informationIntroduction. Tips for Email Success. Email 101 Email Etiquette and Safety. Page 1
Email 101 Email Etiquette and Safety Introduction Page 1 Like any form of online communication, it's important to practice good etiquette and safety when using email. Etiquette is a set of rules and guidelines
More informationVICARS VICTIMS INITIATIVE FOR COUNSELING, ADVOCACY, AND RESTORATION OF THE SOUTHWEST
VICARS VICTIMS INITIATIVE FOR COUNSELING, ADVOCACY, AND RESTORATION OF THE SOUTHWEST A program of the Texas Legal Services Center supported by Grant No. 2007-VF-GX-K032 awarded by the Office for Victims
More informationLow-Income Taxpayer Clinic (LITC) Choosing a Tax Return Preparer
Low-Income Taxpayer Clinic (LITC) Choosing a Tax Return Preparer Choosing a Tax Return Preparer If you plan to pay a preparer, please review the following points to ensure your return is correctly filed
More information8765 CA_ScamBroc 10/10/11 10:45 AM Page 1 www.tn.gov/consumer
www.tn.gov/consumer Tennessee Division of Consumer Affairs Don t Get Scammed Table of Contents Auction Fraud...1 Counterfeit Cashier s Check...1 Credit Card Fraud...1 Debt Elimination...2 DHL/UPS...2 Employment/Business
More informationSocial Media and Cyber Safety
Social Media and Cyber Safety Presented to the National Association of REALTORS by Andrew Wooten Safety and Security Consultant andrew@justbesafe.com Social Media and Cyber Safety Our instructor today
More informationDon t be a victim... Providing useful information to help you recognize criminals and the hallmarks of their scams.
SERIES Don t be a victim... Providing useful information to help you recognize criminals and the hallmarks of their scams. You may not think twice of an individual from the IRS asking for personal information
More informationPractical tips for a. Safe Christmas
Practical tips for a Safe Christmas CONTENTS 1. Online shopping 2 2. Online games 4 3. Instant messaging and mail 5 4. Practical tips for a safe digital Christmas 6 The Christmas holidays normally see
More informationOUR GUIDE TO PROTECTING YOUR PERSONAL INFORMATION
OUR GUIDE TO PROTECTING YOUR PERSONAL INFORMATION What is personal information? Personal information is information about you. It can be your name, address, or telephone number. It can also be the type
More informationAre you Smarter than a Scam Artist? 2015 AASC National Conference Nashville, Tennessee
Are you Smarter than a Scam Artist? 2015 AASC National Conference Nashville, Tennessee Government Grants The government gives grants to special people like you! Stimulus money is still available through
More informationFraud Advice for Businesses
Fraud Advice for Businesses What is Fraud? Fraud is a crime in which some kind of deception is used for personal gain. Fraud is sometimes also referred to by other names such as a scam or con. Businesses
More informationScams AND. Swindles. Avoiding Investment Fraud. An Educational Guide to
Scams AND Swindles An Educational Guide to Avoiding Investment Fraud Scams AND Swindles An Educational Guide to Avoiding Investment Fraud Double your money in six months with absolutely no risk! You must
More informationFAKE ANTIVIRUS MALWARE This information has come from http://www.bleepingcomputer.com/ - a very useful resource if you are having computer issues.
FAKE ANTIVIRUS MALWARE This information has come from http://www.bleepingcomputer.com/ - a very useful resource if you are having computer issues. The latest tactic currently being used by malware creators
More informationCould you spot a scammer?
Could you spot a scammer? Keeping you safe and secure Fraud can affect anyone whatever your background, age or experience And attempts can come in all shapes and sizes over the phone, on the internet or
More informationCENTRAL DIVISION PRESS FORT WORTH POLICE DEPARTMENT APRIL 2015 NEWSLETTER PAGE 1 of 6
CENTRAL DIVISION PRESS FORT WORTH POLICE DEPARTMENT APRIL 2015 NEWSLETTER PAGE 1 of 6 Officer Vance Keyes (pictured right) is our new Captain for Central Division. He has been a member of the Fort Worth
More informationChapter 9. Debt Collection
Chapter 9 73 Bill collectors will use many tactics to force a consumer to pay his or her debt. However, it is important for a consumer to know the laws about debt collection to avoid being scammed or
More informationProtect Yourself. Who is asking? What information are they asking for? Why do they need it?
Protect Yourself Your home computer serves many purposes: email, shopping, social networking and more. As you surf the Internet, you should be aware of the various ways to protect yourself. Of primary
More informationSCAM MAIL IS BLACKMAIL
SCAM MAIL IS BLACKMAIL Information and advice about scam mail and the Think Jessica campaign Supported by Criminals worldwide are sending scam letters, which trick, seem to befriend and even threaten millions
More informationTypes of Elder Abuse
SENIOR SELF DEFENSE Protect Yourself From All Types of Fraud and Abuse 1 Types of Elder Abuse Physical Abuse Sexual Abuse Verbal and Mental Abuse Financial Abuse Neglect Self-Neglect Isolation and Violations
More informationMoneySmart Rookie Community educator guide. Financial literacy for young people
MoneySmart Rookie Community educator guide Financial literacy for young people Copyright information Website: ISBN: 978 0 9805533 9 0. Creative Commons This Community educator guide is available under
More informationwww.thalesgroup.com Business Ethics Conduct Guide Best practice guidelines for using e-mail
www.thalesgroup.com Business Ethics Conduct Guide Best practice guidelines for using e-mail Contents PREFACE...3 DID YOU KNOW?...4 Make better use of time... 4 Manage the mass of information... 5 Avoid
More informationOIG Fraud Alert Phishing
U.S. EQUAL EMPLOYMENT OPPORTUNITY COMMISSION Washington, D.C. 20507 Office of Inspector General Aletha L. Brown Inspector General July 22, 2005 OIG Fraud Alert Phishing What is Phishing? Phishing is a
More informationOnline Security Tips
Online Security Tips Is your computer set to automatically check for software and security updates? Do you type your name in search engines to see what personal information is online? Have you customized
More informationC-SAVE. Scenario #1 Jake and the Bad Virus. The two major C3 concepts this scenario illustrates are:
Scenario #1 Jake and the Bad Virus The two major C3 concepts this scenario illustrates are: Cyber Security: Jake compromised his computer s security by providing personal information to an unknown online
More informationS t r o n a 1 Nauki ścisłe priorytetem społeczeństwa opartego na wiedzy Artykuły na platformę CMS
S t r o n a 1 Introduction This article is informative, it is routed to the secondary school students - can be a reminder of issues raised in middle school. Text and multimedia materials are here to encourage
More informationIdentity Theft Awareness: Don t Fall Victim to these Common Scams
Identity Theft Awareness: Don t Fall Victim to these Common Scams We want you to understand what identity theft is, how it happens, and how to protect yourself. Please read and familiarize yourself with
More informationWhite paper. Phishing, Vishing and Smishing: Old Threats Present New Risks
White paper Phishing, Vishing and Smishing: Old Threats Present New Risks How much do you really know about phishing, vishing and smishing? Phishing, vishing, and smishing are not new threats. They have
More informationCyber Security. Maintaining Your Identity on the Net
Cyber Security Maintaining Your Identity on the Net Why Cyber Security? There are three points of failure in any secure network: Technology (hardware and software) Technology Support (ITS) End Users (USD
More informationProtecting your business from some of the current fraud threats
Protecting your business from some of the current fraud threats This literature provides guidance on fraud prevention and is provided for information purposes only. Where noted the guidance provided has
More information:: Free but Fake: Rogue Anti-malware. Cristian Borghello, CISSP
:: Free but Fake: Rogue Anti-malware Cristian Borghello, CISSP Table of Contents Introduction 2 Analysis of a Well-known Case 3 Conclusion 7 Further Information 8 1 Introduction Most antivirus products
More informationAVOIDING ONLINE THREATS CYBER SECURITY MYTHS, FACTS, TIPS. ftrsecure.com
AVOIDING ONLINE THREATS CYBER SECURITY MYTHS, FACTS, TIPS ftrsecure.com Can You Separate Myths From Facts? Many Internet myths still persist that could leave you vulnerable to internet crimes. Check out
More informationAvoiding Malware in Your Dental Practice. 10 Best Practices to Defend Your Data
Avoiding Malware in Your Dental Practice 10 Best Practices to Defend Your Data Avoiding Malware in Your Dental Practice Like most small business owners, you must protect your dental practice s computer
More informationFrequently Asked Questions [Updated January 20, 2015]
Frequently Asked Questions [Updated January 20, 2015] Some information in these FAQs has been provided to the Archdiocese of Portland in Oregon by the Internal Revenue Service. Note: Given the immediate
More informationBad Ads Trend Alert: Shining a Light on Tech Support Advertising Scams. May 2014. TrustInAds.org. Keeping people safe from bad online ads
Bad Ads Trend Alert: Shining a Light on Tech Support Advertising Scams May 2014 TrustInAds.org Keeping people safe from bad online ads OVERVIEW Today, even the most tech savvy individuals can find themselves
More informationCorona Police Department
By Detective John Alvarez Corona Police Department High Technology Crimes Unit California Penal Code 530.5(a) defines Identity Theft: Every person who willfully obtains personal identifying information,
More informationAvoiding Malware in Your Dental Practice. 10 Best Practices to Defend Your Data
Avoiding Malware in Your Dental Practice 10 Best Practices to Defend Your Data Avoiding Malware in Your Dental Practice Like most small business owners, you must protect your dental practice s computer
More informationBefore Giving to a Charity
Before Giving to a Charity Federal Trade Commission consumer.ftc.gov If you re considering a request for a donation to a charity, do some research before you give. By finding out as much as you can about
More informationSCAMS. Action: Throw out the letter and contact Social Security directly by phone at 1-800-441-2555 or visit their website. http://www.ssa.
SCAMS SOCIAL SECURITY SCAMS You use your Social Security number for your identity, to get a job, and to apply for Medicare and Social Security as you become older. Unfortunately though, there are a lot
More informationComputer Security Self-Test: Questions & Scenarios
Computer Security Self-Test: Questions & Scenarios Rev. Sept 2015 Scenario #1: Your supervisor is very busy and asks you to log into the HR Server using her user-id and password to retrieve some reports.
More informationTop Cyber Threats Of 2009
Top Cyber Threats Of 2009 Who were the top 5 riskiest celebrities in 2009? Did spammers really know who killed Michael Jackson? Data from Symantec Security Response November 2009 Top 5 Riskiest Celebrities
More informationInternet basics 2.3 Protecting your computer
Basics Use this document with the glossary Beginner s guide to Internet basics 2.3 Protecting your computer How can I protect my computer? This activity will show you how to protect your computer from
More informationPhishing and the threat to corporate networks
Phishing and the threat to corporate networks A Sophos white paper August 2005 SUMMARY This paper explains the online fraud known as phishing, examining how it threatens businesses and looking at the dramatic
More informationTHINGS YOU SHOULD KNOW ABOUT IDENTITY THEFT
THINGS YOU SHOULD KNOW ABOUT IDENTITY THEFT Compliments of: Fripp Island Security and FIPOA Security Committee November 2013 1 INTRODUCTION Identity theft is a serious crime. It occurs when your personal
More informationF-Secure Anti-Virus for Mac 2015
F-Secure Anti-Virus for Mac 2015 TOC F-Secure Anti-Virus for Mac 2015 Contents Chapter 1: Getting started...3 1.1 Manage subscription...4 1.2 How to make sure that my computer is protected...4 1.2.1 Protection
More informationFRAUD PROTECTION AND ONLINE SAFETY 2015 EDITION
FRAUD PROTECTION AND ONLINE SAFETY 2015 EDITION 1 Table of Contents Mobile Device Settings Creating & Managing Passwords Phishing & Imposter Scams Healthcare, Charity, and Lottery Scams Identity Theft
More informationSCAMBOOK SCAMS AND FRAUDS TARGETING RESIDENTS AND BUSINESSES. Tamworth Neighbourhood Watch Don Palmer Community Engagement Co-ordinator.
May 2015 SCAMBOOK SCAMS AND FRAUDS TARGETING RESIDENTS AND BUSINESSES Tamworth Neighbourhood Watch Don Palmer Community Engagement Co-ordinator. May 2015 Page 1 A CONFIDENCE TRICK or SCAM is an attempt
More informationCSUF Tech Day 2015. Security Awareness Overview Dale Coddington, Information Security Office dcoddington@fullerton.edu
CSUF Tech Day 2015 Security Awareness Overview Dale Coddington, Information Security Office dcoddington@fullerton.edu Agenda Introduction Large scale data breaches: 2014 and beyond Email based attacks:
More informationHow to Identify Phishing E-Mails
How to Identify Phishing E-Mails How to recognize fraudulent emails and avoid being phished. Presented by : Miguel Fra, Falcon IT Services (miguel@falconitservices.com) http://www.falconitservices.com
More informationMind your money. Keeping Your Money Safe
Mind your money Keeping Your Money Safe Keeping Your Money Safe What we want you to take out of this lesson: Be aware be careful with your money Understand a little more about keeping your money safe online
More informationPhoenix Information Technology Services. Julio Cardenas
Phoenix Information Technology Services Julio Cardenas Email spam, also known as junk email or unsolicited bulk email (UBE), is a subset of electronic spam involving nearly identical messages sent to numerous
More informationCaller ID Spoofing Good and Bad
ITU Workshop on Caller ID Spoofing (Geneva, Switzerland, 2 June 2014) Caller ID Spoofing Good and Bad Freddie McBride Numbering & Networks European Communications Office freddie.mcbride@eco.cept.org Follow
More informationRetail/Consumer Client. Internet Banking Awareness and Education Program
Retail/Consumer Client Internet Banking Awareness and Education Program Table of Contents Securing Your Environment... 3 Unsolicited Client Contact... 3 Protecting Your Identity... 3 E-mail Risk... 3 Internet
More informationSTUDENT S INFORMATION SECURITY GUIDE
STUDENT S INFORMATION SECURITY GUIDE April 2013 Table of contents Information security is important - also for you...1 Use strong passwords and keep them safe...2 E-mail use...3 Beware of phishing and
More informationClass 3: Identify Tricks and Scams Online
Class 3: Identify Tricks and Scams Online Identify Tricks and Scams Online Instructor s Overview DESCRIPTION: In this lesson, students will learn how to avoid online tricks and scams, and learn best practices
More informationData protection. Protecting your personal information online
Data protection Protecting your personal information online 3 Introduction More and more people are conducting their personal affairs online. Online shopping, social networking, job hunting and the ability
More informationCyberCrime and ID Theft
CyberCrime and ID Theft Be Suspicious Chad Crummer Washington Attorney General s Office Trust No One (only slightly kidding) Overview Statistics CyberCrime Examples We See and Target Phishing / Smshing
More informationHow to stay safe online
How to stay safe online Everyone knows about computer viruses...or at least they think they do. Nearly 30 years ago, the first computer virus was written and since then, millions of viruses and other malware
More informationIn fact, most of us are so excited at the thought of being out of debt that we often don t check out things as thoroughly as we should.
Debt Scams Debt scams are more common than most people might think; in fact they are more prevalent than most people would even care to think. Not being aware of this can make a person more at risk of
More information