While some consumers find unsolicited commercial email – also known as "spam" – informative, others find it annoying and time consuming. Still others find it expensive: They're among the people who have lost money to spam that contained bogus offers and fraudulent promotions.
Many Internet Service Providers and computer operating systems offer filtering software to limit the spam in their users' e-mail inboxes. In addition, some old-fashioned 'filter tips' can help you save time and money by avoiding frauds pitched in email. OnGuard Online suggests computer users screen spam for scams, send unwanted spam on to the appropriate enforcement authorities, and then hit delete.
This slideshow features 10 common spam scams end users need to know about.
Con artists are clever and cunning, constantly hatching new variations on age-old scams. Still, skeptical consumers can spot questionable or unsavory promotions in email offers. Should you receive an email that you think may be fraudulent, forward it to the FTC at firstname.lastname@example.org, hit delete, and smile. You'll be doing your part to help put a scam artist out of work.
If you receive an email that you think may be a scam:
If you think you may have responded to an email that may be a scam:
Top FREE Android Productivity Applications A list of 15 of the hottest free Android productivity applications.
10 Steps to an Ergonomic Workstation Steps you can take to improve the ergonomics of your workstation.
Top 10 Well-Compensated Execs of ‘09 Take a look at technology’s top 10 highest-paid executives in 2009.
While the use of IoT technology enables retailers to better track their products from production through delivery in the supply chain, it also introduces a variety of security and data risks. ... More >>
Take a closer look at the explosion of zero-day threats and how deep learning can help organizations better protect their valuable cyber assets. ... More >>
To help improve overall cybersecurity practices, the first line of defense is often an educated user with strong password practices. ... More >>