Five Tips to Avoid Falling Victim to Online Scammers

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8
Next Five Tips to Avoid Falling Victim to Online Scammers-2 Next

Money-Off Coupons

If it seems too good to be true, then it probably is. In the last 12 months, numerous retailers have admitted to suffering a massive data breach. As a result, compromised customer data can be used against unsuspecting users to lure them into financial traps. For example, let's say you purchased a Sony PlayStation this year at Target. Soon thereafter, you start receiving emails that suggest you buy games and accessories for your console at a greatly reduced price. Can you trust the message? The sender? While cybercriminals are extremely clever, there are a few things to look out for when deciding if an offer is authentic:

  • Is the sender's email address different from before?
  • Is the manner in which you are addressed unusual?
  • Does the message contain typing errors or grammatical mistakes?

Tip: Never follow links embedded in a message, especially one that's not completely ringing true. Instead, type the usual address into the URL bar. If the offers are genuine, the website will be displaying them too.

Black Friday and Cyber Monday may sound like titles from science fiction novels, but they actually refer to the two busiest shopping days of the year for retailers.

Last year saw record figures for e-tailers against the previous year. While vendors are busy planning ways to push sales even higher in 2014, you can be certain that just as many cyber criminals are plotting to profit from this year's "season of goodwill."

It is true, Black Friday and Cyber Monday offer great deals. But, how do we spot the real deal from the scam? In this slideshow, Troy Gill, senior security analytist at AppRiver, provides five tips that will help prevent you from unwittingly parting with your money - and putting it directly into a cyber-crook's wallet - this holiday season.

 

Related Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

 
More Slideshows

PAM PAM Solutions: Critical to Securing Privileged Access

To protect the company from those insiders who abuse their privileged access and from hackers with stolen credentials, many companies are turning to a privileged access management (PAM) solution. ...  More >>

Fake news How Can We Fix the Fake News Problem?

Is fake news a security issue? Some say yes, as it can be used as a social engineering tool to spread disinformation and conceivably to get unsuspecting users to click on malicious links. ...  More >>

blockchain The World According to Blockchain

Blockchain comes with many costs and is surrounded by confusion. Here, we examine realistic use cases, drawbacks and the potential of blockchain. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.