While some consumers find unsolicited commercial email – also known as "spam" – informative, others find it annoying and time consuming. Still others find it expensive: They're among the people who have lost money to spam that contained bogus offers and fraudulent promotions.
Many Internet Service Providers and computer operating systems offer filtering software to limit the spam in their users' e-mail inboxes. In addition, some old-fashioned 'filter tips' can help you save time and money by avoiding frauds pitched in email. OnGuard Online suggests computer users screen spam for scams, send unwanted spam on to the appropriate enforcement authorities, and then hit delete.
This slideshow features 10 common spam scams end users need to know about.
Con artists are clever and cunning, constantly hatching new variations on age-old scams. Still, skeptical consumers can spot questionable or unsavory promotions in email offers. Should you receive an email that you think may be fraudulent, forward it to the FTC at email@example.com, hit delete, and smile. You'll be doing your part to help put a scam artist out of work.
If you receive an email that you think may be a scam:
If you think you may have responded to an email that may be a scam:
Top FREE Android Productivity Applications A list of 15 of the hottest free Android productivity applications.
10 Steps to an Ergonomic Workstation Steps you can take to improve the ergonomics of your workstation.
Top 10 Well-Compensated Execs of ‘09 Take a look at technology’s top 10 highest-paid executives in 2009.
Here are the top 10 strategic technology trends that will impact most organizations in 2017. Strategic technology trends are defined as those with substantial disruptive potential or those reaching the tipping point over the next five years. ... More >>
Experience shows that organizations that manage GRC as an integrated program — involving people, processes and technologies — are more successful in delivering value to their organizations ... More >>
When phone calls, video conference information, pictures, chat logs, etc. are all stored in a central location via social media, a potential hacker has access to just about everything, quickly and easily. ... More >>