10 Common Spam Scams

Share  
1  |  2  |  3  |  4  |  5  |  6  |  7  |  8  |  9  |  10  |  11  |  12
Previous Next

Click through to learn how to protect yourself from 10 common e-mail scams, as outlined by OnGuard Online. 

While some consumers find unsolicited commercial email – also known as "spam" – informative, others find it annoying and time consuming. Still others find it expensive: They're among the people who have lost money to spam that contained bogus offers and fraudulent promotions.

Many Internet Service Providers and computer operating systems offer filtering software to limit the spam in their users' e-mail inboxes. In addition, some old-fashioned 'filter tips' can help you save time and money by avoiding frauds pitched in email. OnGuard Online suggests computer users screen spam for scams, send unwanted spam on to the appropriate enforcement authorities, and then hit delete.

This slideshow features 10 common spam scams end users need to know about.


Fighting Back

Con artists are clever and cunning, constantly hatching new variations on age-old scams. Still, skeptical consumers can spot questionable or unsavory promotions in email offers. Should you receive an email that you think may be fraudulent, forward it to the FTC at spam@uce.gov, hit delete, and smile. You'll be doing your part to help put a scam artist out of work.

How to Report Spam

If you receive an email that you think may be a scam:

  • Forward it to the FTC at spam@uce.gov
  • Forward it to the abuse desk of the sender's ISP.
  • Also, if the email appears to be impersonating a bank or other company or organization, forward the message to the actual organization.

If you think you may have responded to an email that may be a scam:

  • File a report with the Federal Trade Commission at www.ftc.gov/complaint.
  • Report it to your state Attorney General, using contact information at naag.org.
  • Then visit the FTC's identity theft website at ftc.gov/idtheft. While you can't completely control whether you will become a victim of identity theft, you can take some steps to minimize your risk.

More Slideshows:

Top FREE Android Productivity Applications A list of 15 of the hottest free Android productivity applications.

10 Steps to an Ergonomic Workstation Steps you can take to improve the ergonomics of your workstation.


Top 10 Well-Compensated Execs of ‘09 Take a look at technology’s top 10 highest-paid executives in 2009.

 

Related Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

 
More Slideshows

Security49-190x128 Using Tokenization for Superior Data Security

With the launch of ApplePay for secure online and mobile payments, tokenization has become a hot topic in data security. ...  More >>

SurfWatch2014Q3IT0x IT Industry Shellshocked in Q3: How to Plan for What's Next

Making the right investments can minimize the cyber risks your organization faces, but this requires looking at the complete picture and not just a few pieces. ...  More >>

Security48-290x195 Five Myths Holding Your Security Program Back

In reviewing this list, continue to ask yourself how to apply the advice to your organization and its unique cybersecurity ecosystem. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.


 
Close
Thanks for your registration, follow us on our social networks to keep up-to-date