While some consumers find unsolicited commercial email – also known as "spam" – informative, others find it annoying and time consuming. Still others find it expensive: They're among the people who have lost money to spam that contained bogus offers and fraudulent promotions.
Many Internet Service Providers and computer operating systems offer filtering software to limit the spam in their users' e-mail inboxes. In addition, some old-fashioned 'filter tips' can help you save time and money by avoiding frauds pitched in email. OnGuard Online suggests computer users screen spam for scams, send unwanted spam on to the appropriate enforcement authorities, and then hit delete.
This slideshow features 10 common spam scams end users need to know about.
Con artists are clever and cunning, constantly hatching new variations on age-old scams. Still, skeptical consumers can spot questionable or unsavory promotions in email offers. Should you receive an email that you think may be fraudulent, forward it to the FTC at firstname.lastname@example.org, hit delete, and smile. You'll be doing your part to help put a scam artist out of work.
If you receive an email that you think may be a scam:
If you think you may have responded to an email that may be a scam:
Top FREE Android Productivity Applications A list of 15 of the hottest free Android productivity applications.
10 Steps to an Ergonomic Workstation Steps you can take to improve the ergonomics of your workstation.
Top 10 Well-Compensated Execs of ‘09 Take a look at technology’s top 10 highest-paid executives in 2009.
Cybersecurity threats are growing. To defend against increasing threats, agencies must comply with various cybersecurity mandates that often fail to take the user experience into account. ... More >>
A motivated attacker will get into your network. The key is how quickly and accurately you are able to find the active breach. ... More >>
While many companies are deploying the latest and greatest technologies to fight back against cyber attacks, they often neglect security policy management basics. ... More >>