Five Tips to Avoid Falling Victim to Online Scammers

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8
Next Five Tips to Avoid Falling Victim to Online Scammers-3 Next

Search Results

Just as marketing executives spend time and money improving page rank in search engines, so do cyber criminals. In fact, on many occasions, legitimate sites have been compromised and malware inserted to trap unsuspecting visitors. With so many people seeking out the best online deals, canny criminals have undoubtedly set up their traps.

Tip: Be wary of sites that claim to have trawled the web in order to compile a list of the best Black Friday and Cyber Monday deals. While some may be genuine, proceed with caution.  

Black Friday and Cyber Monday may sound like titles from science fiction novels, but they actually refer to the two busiest shopping days of the year for retailers.

Last year saw record figures for e-tailers against the previous year. While vendors are busy planning ways to push sales even higher in 2014, you can be certain that just as many cyber criminals are plotting to profit from this year's "season of goodwill."

It is true, Black Friday and Cyber Monday offer great deals. But, how do we spot the real deal from the scam? In this slideshow, Troy Gill, senior security analytist at AppRiver, provides five tips that will help prevent you from unwittingly parting with your money - and putting it directly into a cyber-crook's wallet - this holiday season.


Related Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

More Slideshows

Compliance4-190x128 GRC Programs: Building the Business Case for Value

Experience shows that organizations that manage GRC as an integrated program — involving people, processes and technologies — are more successful in delivering value to their organizations ...  More >>

Social14-190x128.jpg 10 Ways to Improve Your Social Media Security Policy and Posture

When phone calls, video conference information, pictures, chat logs, etc. are all stored in a central location via social media, a potential hacker has access to just about everything, quickly and easily. ...  More >>

Security120-290x195 5 DDoS Myths Debunked

Unearth the real story behind five commonly held myths about distributed denial-of-service attacks. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.