Five Tips to Avoid Falling Victim to Online Scammers

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8
Next Five Tips to Avoid Falling Victim to Online Scammers-6 Next

Fake Purchase or Delivery Receipts

It has become a very popular ploy for malware authors to send what appears to be a purchase receipt to users. These "receipts" are meant to lure recipients into believing someone has made unauthorized purchases on their behalf. Fake delivery receipts can also confuse recipients into believing that something they may have actually ordered online has transit issues. With many people doing a majority of their online shopping during this time of year, this is a perfect time to see these scams in the wild.

Tip: Never click on a link or an attachment from an unsolicited email. Remain vigilant and read all purchase and delivery receipts carefully before clicking on a link or entering personal information.

Black Friday and Cyber Monday may sound like titles from science fiction novels, but they actually refer to the two busiest shopping days of the year for retailers.

Last year saw record figures for e-tailers against the previous year. While vendors are busy planning ways to push sales even higher in 2014, you can be certain that just as many cyber criminals are plotting to profit from this year's "season of goodwill."

It is true, Black Friday and Cyber Monday offer great deals. But, how do we spot the real deal from the scam? In this slideshow, Troy Gill, senior security analytist at AppRiver, provides five tips that will help prevent you from unwittingly parting with your money - and putting it directly into a cyber-crook's wallet - this holiday season.


Related Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

More Slideshows

Social14-190x128.jpg 10 Ways to Improve Your Social Media Security Policy and Posture

When phone calls, video conference information, pictures, chat logs, etc. are all stored in a central location via social media, a potential hacker has access to just about everything, quickly and easily. ...  More >>

Security120-290x195 5 DDoS Myths Debunked

Unearth the real story behind five commonly held myths about distributed denial-of-service attacks. ...  More >>

Security119-190x128 8 Tips for Ensuring Employee Security Compliance

IT security ultimately depends on making sure employees use the appropriate tools and comply with policies designed to protect them and their data/applications. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.