10 Common Spam Scams - Slide 5

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12
Next 10 Common Spam Scams-5 Next

The Bait: Emails promising a revolutionary pill, patch, cream, or other product that will result in weight loss without diet or exercise. Some products claim to block the absorption of fat, carbs, or calories; others guarantee permanent weight loss; still others suggest you'll lose lots of weight at lightening speed.

The Catch: These are gimmicks, playing on your sense of hopefulness. There's nothing available through email you can wear or apply to your skin that can cause permanent – or even significant weight loss.

Your Safety Net: Experts agree that the best way to lose weight is to eat fewer calories and increase your physical activity so you burn more energy. A reasonable goal is to lose about a pound a week. For most people, that means cutting about 500 calories a day from your diet, eating a variety of nutritious foods, and exercising regularly. Permanent weight loss happens with permanent lifestyle changes. Talk to your health care provider about a nutrition and exercise program suited to your lifestyle and metabolism.

Forward weight loss emails to spam@uce.gov.

While some consumers find unsolicited commercial email – also known as "spam" – informative, others find it annoying and time consuming. Still others find it expensive: They're among the people who have lost money to spam that contained bogus offers and fraudulent promotions.

Many Internet Service Providers and computer operating systems offer filtering software to limit the spam in their users' e-mail inboxes. In addition, some old-fashioned 'filter tips' can help you save time and money by avoiding frauds pitched in email. OnGuard Online suggests computer users screen spam for scams, send unwanted spam on to the appropriate enforcement authorities, and then hit delete.

This slideshow features 10 common spam scams end users need to know about.

Fighting Back

Con artists are clever and cunning, constantly hatching new variations on age-old scams. Still, skeptical consumers can spot questionable or unsavory promotions in email offers. Should you receive an email that you think may be fraudulent, forward it to the FTC at spam@uce.gov, hit delete, and smile. You'll be doing your part to help put a scam artist out of work.

How to Report Spam

If you receive an email that you think may be a scam:

  • Forward it to the FTC at spam@uce.gov
  • Forward it to the abuse desk of the sender's ISP.
  • Also, if the email appears to be impersonating a bank or other company or organization, forward the message to the actual organization.

If you think you may have responded to an email that may be a scam:

  • File a report with the Federal Trade Commission at www.ftc.gov/complaint.
  • Report it to your state Attorney General, using contact information at naag.org.
  • Then visit the FTC's identity theft website at ftc.gov/idtheft. While you can't completely control whether you will become a victim of identity theft, you can take some steps to minimize your risk.

More Slideshows:

Top FREE Android Productivity Applications A list of 15 of the hottest free Android productivity applications.

10 Steps to an Ergonomic Workstation Steps you can take to improve the ergonomics of your workstation.

Top 10 Well-Compensated Execs of ‘09 Take a look at technology’s top 10 highest-paid executives in 2009.


Related Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

More Slideshows

Social14-190x128.jpg 10 Ways to Improve Your Social Media Security Policy and Posture

When phone calls, video conference information, pictures, chat logs, etc. are all stored in a central location via social media, a potential hacker has access to just about everything, quickly and easily. ...  More >>

Security120-290x195 5 DDoS Myths Debunked

Unearth the real story behind five commonly held myths about distributed denial-of-service attacks. ...  More >>

Security119-190x128 8 Tips for Ensuring Employee Security Compliance

IT security ultimately depends on making sure employees use the appropriate tools and comply with policies designed to protect them and their data/applications. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.