10 Common Spam Scams

Share  
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12
Previous Next

Click through to learn how to protect yourself from 10 common e-mail scams, as outlined by OnGuard Online. 

While some consumers find unsolicited commercial email – also known as "spam" – informative, others find it annoying and time consuming. Still others find it expensive: They're among the people who have lost money to spam that contained bogus offers and fraudulent promotions.

Many Internet Service Providers and computer operating systems offer filtering software to limit the spam in their users' e-mail inboxes. In addition, some old-fashioned 'filter tips' can help you save time and money by avoiding frauds pitched in email. OnGuard Online suggests computer users screen spam for scams, send unwanted spam on to the appropriate enforcement authorities, and then hit delete.

This slideshow features 10 common spam scams end users need to know about.


Fighting Back

Con artists are clever and cunning, constantly hatching new variations on age-old scams. Still, skeptical consumers can spot questionable or unsavory promotions in email offers. Should you receive an email that you think may be fraudulent, forward it to the FTC at spam@uce.gov, hit delete, and smile. You'll be doing your part to help put a scam artist out of work.

How to Report Spam

If you receive an email that you think may be a scam:

  • Forward it to the FTC at spam@uce.gov
  • Forward it to the abuse desk of the sender's ISP.
  • Also, if the email appears to be impersonating a bank or other company or organization, forward the message to the actual organization.

If you think you may have responded to an email that may be a scam:

  • File a report with the Federal Trade Commission at www.ftc.gov/complaint.
  • Report it to your state Attorney General, using contact information at naag.org.
  • Then visit the FTC's identity theft website at ftc.gov/idtheft. While you can't completely control whether you will become a victim of identity theft, you can take some steps to minimize your risk.

More Slideshows:

Top FREE Android Productivity Applications A list of 15 of the hottest free Android productivity applications.

10 Steps to an Ergonomic Workstation Steps you can take to improve the ergonomics of your workstation.


Top 10 Well-Compensated Execs of ‘09 Take a look at technology’s top 10 highest-paid executives in 2009.

 

Related Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

 
More Slideshows

Gov2-290x195.jpg Study Showcases Biggest Cyber Threat - Feds Trying to Do Their Jobs

Cybersecurity threats are growing. To defend against increasing threats, agencies must comply with various cybersecurity mandates that often fail to take the user experience into account. ...  More >>

Security65-190x128 Tipping the Data Breach Odds in Your Favor

A motivated attacker will get into your network. The key is how quickly and accurately you are able to find the active breach. ...  More >>

Security64-190x128 How to Navigate the Common Pitfalls of Security Policy Management

While many companies are deploying the latest and greatest technologies to fight back against cyber attacks, they often neglect security policy management basics. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.


 
Thanks for your registration, follow us on our social networks to keep up-to-date