While some consumers find unsolicited commercial email – also known as "spam" – informative, others find it annoying and time consuming. Still others find it expensive: They're among the people who have lost money to spam that contained bogus offers and fraudulent promotions.
Many Internet Service Providers and computer operating systems offer filtering software to limit the spam in their users' e-mail inboxes. In addition, some old-fashioned 'filter tips' can help you save time and money by avoiding frauds pitched in email. OnGuard Online suggests computer users screen spam for scams, send unwanted spam on to the appropriate enforcement authorities, and then hit delete.
This slideshow features 10 common spam scams end users need to know about.
Con artists are clever and cunning, constantly hatching new variations on age-old scams. Still, skeptical consumers can spot questionable or unsavory promotions in email offers. Should you receive an email that you think may be fraudulent, forward it to the FTC at email@example.com, hit delete, and smile. You'll be doing your part to help put a scam artist out of work.
If you receive an email that you think may be a scam:
If you think you may have responded to an email that may be a scam:
Top FREE Android Productivity Applications A list of 15 of the hottest free Android productivity applications.
10 Steps to an Ergonomic Workstation Steps you can take to improve the ergonomics of your workstation.
Top 10 Well-Compensated Execs of ‘09 Take a look at technology’s top 10 highest-paid executives in 2009.
In February 2015, Financials was the lone industry sector with cybercrime incidents above six-month averages. This is largely attributed to the massive breach at health insurer Anthem. ... More >>
No matter how advanced SIEM tools become, security pros must back up their findings with data rooted in the company's daily IT activities in order to glean valuable insights. ... More >>
What if security tools could do more? What if they could enable the business by providing deeper visibility and a better understanding of how corporate compute resources are being used? ... More >>