Five Tips to Avoid Falling Victim to Online Scammers

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8
Next Five Tips to Avoid Falling Victim to Online Scammers-2 Next

Money-Off Coupons

If it seems too good to be true, then it probably is. In the last 12 months, numerous retailers have admitted to suffering a massive data breach. As a result, compromised customer data can be used against unsuspecting users to lure them into financial traps. For example, let's say you purchased a Sony PlayStation this year at Target. Soon thereafter, you start receiving emails that suggest you buy games and accessories for your console at a greatly reduced price. Can you trust the message? The sender? While cybercriminals are extremely clever, there are a few things to look out for when deciding if an offer is authentic:

  • Is the sender's email address different from before?
  • Is the manner in which you are addressed unusual?
  • Does the message contain typing errors or grammatical mistakes?

Tip: Never follow links embedded in a message, especially one that's not completely ringing true. Instead, type the usual address into the URL bar. If the offers are genuine, the website will be displaying them too.

Black Friday and Cyber Monday may sound like titles from science fiction novels, but they actually refer to the two busiest shopping days of the year for retailers.

Last year saw record figures for e-tailers against the previous year. While vendors are busy planning ways to push sales even higher in 2014, you can be certain that just as many cyber criminals are plotting to profit from this year's "season of goodwill."

It is true, Black Friday and Cyber Monday offer great deals. But, how do we spot the real deal from the scam? In this slideshow, Troy Gill, senior security analytist at AppRiver, provides five tips that will help prevent you from unwittingly parting with your money - and putting it directly into a cyber-crook's wallet - this holiday season.


Related Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

More Slideshows

Social14-190x128.jpg 10 Ways to Improve Your Social Media Security Policy and Posture

When phone calls, video conference information, pictures, chat logs, etc. are all stored in a central location via social media, a potential hacker has access to just about everything, quickly and easily. ...  More >>

Security120-290x195 5 DDoS Myths Debunked

Unearth the real story behind five commonly held myths about distributed denial-of-service attacks. ...  More >>

Security119-190x128 8 Tips for Ensuring Employee Security Compliance

IT security ultimately depends on making sure employees use the appropriate tools and comply with policies designed to protect them and their data/applications. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.