Scams on the Internet

In: Social Issues

Submitted By GodGod2011
Words 1657
Pages 7
Scams on the Internet

Charity Rittman


Dr. Maisah Robinson

May 14, 2010

Scams on the Internet Thieves are always finding ways to steal individual’s money or personal information. The Internet, phone and the United States mail service have quickly become preferred methods of perpetrating crimes. These mediums provide predators with a safe platform to run scams with little risk of their identities revealed. Knowledge and education are the keys to confronting these types of crimes. The e-mails have misspellings, poor grammar and run-on-sentences. Please keep in mind that common sense is the best defense concerning cons and scams: if something seems too good to be true, it probably is, and if something does not seem attainable, it probably is not. If anyone receives these bogus e-mails do not reply or click on any links attached to it; attachments may contain codes or viruses that could infect the person computer. The scams now being implemented are too numerous to list, though most are just a different version of scams previously used and found to be successful for these would be successful for these would-be criminals. The tricks and scams are the same just different people doing the same con games. The internet has made it easy to retrieve information, almost an open book to anyone with a computer. Some of the favorite frauds are: • Ponzi schemes promise high returns , early investor only benefit • Affinity fraud use religious organization and bogus charities to gain investor trust • Oil and gas scams offer the get-rich-overnight scheme and high gas price, • Unlicensed individual selling securities, variable annuity sales, and senior investment fund (Daks, 2005). Many seniors lose their entire life investment behind schemes like the one mentioned above. According to Heathfacts (2009), two…...

Similar Documents

Satyam Scam

...Satyam Likely To Exist Post Scam : Gartner Study 3,300 views Although several companies are trying to have a bite into Satyam Computers, according to Gartner study, the company is likely to exist in its current form. It is expected to discontinue some of its businesses, service lines or cease to exist in certain geographies by 2010. The study indicated that even the name Satyam may not be around by that time, as the company is expected to undergo a complete change, in ownership and organizationally. Satyam’s ability to sign on new clients during 2009 has significantly diminished, says the study. ‘‘In addition, it will be challenged to invest in client engagements, staff developments or R&D, all critical elements for IT services,’’ said Gartner’s V-P for research, Frances Karamouzis. Read more Posted by Satyam Fraud News Reporter on Sunday, February 1, 2009 at 7:46 am Filed under Impact Of Satyam Scam On Indian Economy Ex-Satyam Director Resigns From Sasken Board 1,536 views Serial entrepreneur and NewPath Ventures co-founder Vinod K Dham resigned from the board of Sasken Communications as an independent director, a top official of the communications solutions provider said on Monday. “Yes, Dham has resigned as a director of the company from the board on January 17,” Sasken chairman and managing director Rajiv C. Mody told IANS but declined to elaborate. “We will inform you later, as we are busy with investors and analysts in a conference call on our third......

Words: 1924 - Pages: 8

Cyber Scam

...CYBER SCAM AND ITS EFFECTS November 27, 2011 SUBMITTED BY: FETALVER, FRANCIS VIOLETA, ROGENE CRIS SUBMITTED TO: MRS. MARY GRACE P. ALFANTA I Introduction Background of the Study Experts and law-enforcement officials who track Internet crime say scams have intensified in the past six months, as fraudsters take advantage of economic confusion and anxiety to target both consumers and businesses. Thieves are sending out phony emails and putting up fake Web sites pretending to be banks, mortgage-service providers or even government agencies like the Federal Bureau of Investigation or the Federal Deposit Insurance Corp. Cell phones and Internet-based phone services have also been used to seek out victims. The object: to drain customer accounts of money or to gain information for identity theft. Most scams are done by e-mail (Spam). They entice users to give them critical information like usernames, passwords, credit card information, or other types of account information. Most of these e-mails can easily be identified as fraudulent, by identifying a couple of general characteristics. If someone pretending to represent a company or organization contact you by e-mail to supply them with usernames, passwords or other critical information by e-mail, then you can be certain it’s fraudulent. Today we have something we call SSL (Secure Socket Layer). E-mail is one of the most un-secure methods to send user information and passwords. Most......

Words: 2516 - Pages: 11

Keylogger Scam

...Keylogger Scam 2 The word "Key Logger" is also called "KeyLogging". The Keystroke logging is used to track user's key stroke during software development. The typical use of this tool is to increase efficiency of employee in data entry or word processing related work. The tool is also used in software development and for monitoring activities on computers under surveillance or used by government agencies monitoring criminals or parties interested in decoding passwords for computer networks. In order to be able to tell if you have key logger spyware on your computer, you need to know what it is and understand how it works. This spyware is an invisible software program that is used by identity thieves to track your activity online. Unfortunately, it is nearly impossible to know if you have this software on your computer and it does not matter how careful you are, you will never be able to tell if your information personal information is being recorded. This is scary since those who use key logger spyware are usually after your bank account passwords and credit card numbers. The recording of key strokes on keyboard can be done either by software or hardware. The hardware attachment comes portable which can be attached to keyboard for recording. There are some keyboards, which has it already built-in. On software side key logging can be written as software program and then downloaded on computer or computer network, this program secretly records......

Words: 560 - Pages: 3


...Generation of mobile phone services. Next phase of mobile services is 3G, or 3rd Generation. The difference between 2G and 3G is that we can have faster internet services in 3G, whereas in 2G the speed is slow How the telecom operation is administered? The entire country is divided into 22 Telecom Circles and Metros. Each state is one circle, like Bihar, UP (E), UP (W), Tamil Nadu, etc. All the seven sisterly states in the North East except Assam, comes under a single circle called North East Circle. There are now three Metros (Delhi, Mumbai, and Kolkata), the fourth Metro (Chennai) was combined in Tamil Nadu circle. For every Circle or a Metro, a separate telecom license is issued. For each license, separate applications are to be submitted. We call a company is having a Pan-India license, when that company has telecom licenses for all the 22 Telecom Circles and Metros. A Pan-India license (in fact 22 licenses) was issued for an Entry Fee of Rs 1,658 crore during an open bidding in the year 2001. This rate eventually became reference rates for licenses issued in future under FCFS policy, and is a matter of scam. Comptroller Auditor General of India (CAG) started auditing of new licenses in March 2010. On 8.11.2010, CAG submitted its report to the President of India in which it estimated the loss on account of 2G scam as Rs 1.76 lakh crore. Apart from this, it also found that of the 122 licenses issued on 10.01.2008, 85 licenses were issued to companies......

Words: 2183 - Pages: 9


...yourself about the types of scams on the Internet so that you are better equipped to defeat them. Read up on the latest phishing scams, for example, and learn how to recognize them. 2. Use a firewall – Firewalls monitor traffic between your computer or network and the Internet and are your first and best line of defense. Most operating systems come with a firewall, but it won't help you if you don't activate it. 3. Click with caution – When checking e-mail or instant messaging, be careful not to click on links in messages from people you don't know. Such links could connect to phony websites designed to solicit personal information, or they could download Trojan horses or other malware designed to steal personal information. Even if the message is from someone you do know, it could still contain a computer virus; check with the sender if you have any concerns about the validity of the message. 4. Surf safely – When browsing the Web for financial institutions or other sites, take steps to avoid fraudulent sites that ask for personal information. Most legitimate sites don't ask for such information, but instead require registration ahead of time. Use a search engine that corrects misspellings so that you navigate to legitimate sites and avoid landing on a fake webpage. Creating fake sites with a similarly spelled address is a fairly common scam known as "typosquatting." 5. Practice safe shopping – Shopping online or planning vacations via the Internet can be a......

Words: 621 - Pages: 3

Pdaf Scam

...The 10-Billion Pork Barrel Scam The Priority Development Assistance Fund (PDAF) more commonly known as Pork Barrel is a budgetary allocation that is given to the House of Representatives and the senate from 2006. ₱70 Million for each of the congressmen and ₱200 Million for each of the senators. This fund should be used for financial assistance in development projects which the senate and congressmen would sponsor. However, on August 2013 a public outrage have blasted after whistleblower Benhur Luy have alleged that Janet Lim-Napoles, a Filipino-born Chinese woman was behind the P10 billion scam that also involved several senators and congressmen. They have allocated their PDAF to ghost projects which were “implemented” through Napoles’s companies but have produced no tangible output. Napoles, who specialized in trading agricultural products, frequently used the procurement of agricultural inputs in the propagation of the scam. Either her employees would write to legislators requesting for funds for the implementation of a particular project (e.g. farm inputs), or a legislator would indicate to the DBM a particular recipient agency for his or her PDAF funds that would be pre-selected by Napoles. Once received, this is forwarded to the DBM, which would then issue a Special Allotment Release Order (SARO) indicating the amount deducted from the legislator's PDAF allocation, and later a Notice of Cash Allocation (NCA) given to the recipient agency. The NCA would then be......

Words: 330 - Pages: 2

Ncaa Scam

...Manziel would be making well into six figures ($225,000) every year still in college and exceed the amount they would have received originally from the schools scholarship (Gregory 1). Those student athletes who still wish to receive a scholarship may, but they will be in the same boat as they are now and not receive any kind of compensation for their contributions that they bring to the university. Audience: The audience that I am targeting with this proposal is all current college athletes and future college athletes Rhetorical Strategy: The purpose of this proposal is to help college and future college athletes be informed about what they are missing out on and the reality of what the NCAA is doing. The NCAA is getting away with a scam that has been going on for years and years with no change in site until now. The older generations are finally figuring out what is going on here, but younger generations are still being sucked into these universities because they have no idea about the situation. They get offers left and right from big time schools and are so wrapped up in the moment, they don’t take a second to think about it. I think that a small but informational pamphlet would be great for my audience. It will let them know about a situation they are most likely unaware of. When college coaches are recruiting and selling them these great stories, I doubt they mention anything about how they make a killing of their athletes. Areas of Research: The areas of research...

Words: 1434 - Pages: 6

Satyam Scam

...based on strong ethics. we examine the gross negligence of stakeholder concerns and over indulgence of key management on a personal and organizational level in immortal practices for personal benefit. We also assess the implications of ethics in the business environment. We then delve into the ethical dilemmas faced by the executives at Satyam, apply Hosmer’s framework to moral decision-making and suggest alternatives to handle such moral uncertainties. Finally, we conclude by providing recommendations for ethical code of conduct in organizations and the need to foster a culture of integrity and trust. Ethical Issues Involved 1. Not Following Corporate Governance Norms Satyam scam exposed huge cracks in India’s corporate governance structures and system of regulation through the SEBI, Ministry of Corporate Affairs and the SFIO. Raju is estimated to have made Rs. 20.65 billion by artificially jacking up the price of Satyam’s shares and selling his holdings (14 percent of the total. One fails to comprehend as to how a company with global presence and professionals of high standard can deceive themselves that they are not aware of what was going on inside their organization for so long. 2. Tampering the financial data - Satyam's accounts had been falsified over a number of years. Mr Raju admitted to an accounting dupery to the tune of 7000 crore rupees and resigned from the Satyam board on January 7, 2009.......

Words: 2208 - Pages: 9

Hallmark Scam

...Scandal “. This crisis identified in the year 2012 and it has been took place from the year 2010 and finally disclosed in 2012. To learn lesson from this incident and prevent further recurrence, study in depth of this crisis is very important. Background: A central bank probe found that Sonali Bank high-ups, including a deputy managing director, a general manager and the branch manager, were directly involved in the scam. The amount embezzled by the six entities is equivalent to almost 15 percent of the total estimated cost of the $2.9 billion Padma bridge project. Of Tk. 3,547 crore, Hallmark Group alone took away Tk. 2,686.14 crore, T and Brothers Tk. 609.69 crore, Paragon Group Tk. 146.60 crore, Nakshi Knit Tk. 66.36 crore, DN Sports Tk. 33.25 crore and Khanjahan Ali Tk. 4.96 crore. Of the six borrowers, Hallmark has been found to be the biggest fraudster. Analysis and Research: Bangladesh experienced the biggest financial scam in the year 2012 which is commonly known as the “Hallmark-Sonali Bank Loan Scandal “. To understand, analyze and research this scam in depth, let’s look for the answer of the following questions: . What happened? . How did it happen? . Why wasn’t the malpractice prevented or discovered sooner? . What has been the fall out? . Is it Hallmark’s success or failure of Sonali bank? The first question is: What happened? In May 2012, a report from the Bangladesh Bank revealed that, the Ruposhi Bangla Hotel Branch of the state-owned......

Words: 6705 - Pages: 27


...Internet Safety Guidelines The Internet and the World Wide Web have helped to place information at our fingertips. Unfortunately, the Internet has also created a great deal of potential problems and hazards that have multiplied due to the speed at which the Internet can transmit data. Common Types of Internet Crimes According to a recent report, the number of complaints filed with the Internet Crime Complaint Center has increased from 16,838 in 2000 to 303,809 in 2010. Of those complaints reported the top 5 include: Non-delivery payment/merchandise FBI-related scams Identity theft Computer crimes Miscellaneous fraud Guidelines to Protect Yourself The US government provides the following suggestions to help protect you online. Beef up your security. Invest in personal firewalls and security software packages. Make sure you have the latest security patches, and make sure you only use secure sites when performing financial transactions online. Use a security token (if available). These small number-generating devices offer a second layer of security. Be careful what you download. When you download a program or file from an unknown source, you risk loading malicious software programs on your computer. Use your own computer if you can. If you have to use another computer, delete your temporary Internet files and clear your history after you log off your account. Don’t respond to emails requesting personal information. Legitimate entities will not ask you to......

Words: 356 - Pages: 2

2g Scam

...Financial Frauds in India The 2G scam Aniruddh Narsimhan - P35114 Disha - P35125 Manu Vatayan – P35149 Mrinalini - P35152 Svethal Bhasin - P35188 2G spectrum scam took place in India in late 2000’s which involved politicians and government officials who tried illegal undercharging mobile telephone companies for frequency allocation licenses, which they would then use to create 2G spectrum subscriptions for mobiles. The entire process of allocation of UAS licences lacked transparency and was undertaken in an arbitrary, unfair and inequitable manner. The Hon'ble Prime Minister had stressed on the need for a fair and transparent allocation of spectrum. Let us understand the intricacies of the scam. What is Spectrum? Radio Frequency Spectrum is the entire range of wavelengths of electromagnetic radiation which is used as carrier of wireless transmission and thus a basic requirement for providing wireless services. It is a finite but non-consumable global natural resource and commands high economic value in the telecommunication sector In simple words , Whenever data is being transferred from one place to another, say Ahmedabad to Mumbai. So, If data was a “truck”, how would you transport it from Ahmedabad to Mumbai ? Obviously through a path. Spectrum is that path. Radio frequency spectrum, i.e., the entire range of wavelengths of electromagnetic radiation, is a finite global natural resource with a high economic value, due to its heavy demand in the......

Words: 5398 - Pages: 22

Satyam Scam

...'S_ENRON (point 5) (page 9 onwards imp) The Satyam Computer Services scandal is a corporate scandal that worked in India in 2009 where chairman Ramalinga Raju confessed that the company's accounts had been falsified. The Global corporate community was shocked and scandalised when the chairman of Satyam, Ramalinga Raju resigned on 7 January......

Words: 1639 - Pages: 7

College Scam, there are two sides to the argument. The Christian Science Monitor Editorial Board, Davis Leonhardt, John Stossel, and Marty Nemko all wrote articles based on what they feel a current college education is worth. Though they all agree that college is a major issue at the moment, their opinions are different from each other. The Monitor Editorial Board believes that the United States needs college graduates and encourages people to attend college. David Leonhardt points out that college isn't very expensive and that having a degree is better than nothing. John Stossel believes that college is a scam and that you don't have to be a college graduate to be successful in life. Finally, Marty Nemko points out some flaws in the college system that students may face. All of these articles are tied together and have arguments on both sides of the issue on whether college is a scam and if a degree is worth anything. Many people and colleges tell students that people with a college education make more money than just a high school graduate. "Hillary Clinton tells students: 'Graduates from four-year colleges earn nearly twice as much as high school graduates, an estimated $1 million more'" (Stossel). Stossel argues that this is not necessarily true. Stossel believes that who did better in high school would've made more money in the first place anyways. He also goes on and states that students would have had more money if they did not go to college in the first place. ......

Words: 1083 - Pages: 5

10 Internet Scam

... 10 Internet Scam 1. Phishing scams Phishing email try to trick the intended victim into visiting a fraudulent website disguised to look like a valid eCommerce or banking site. The victim thinks they are logging into their real account, but instead everything they enter on the fake site is being sent to the scammers. Armed with this information, the scammer can wipe out the victim's accounts, run up their credit cards, or even steal their identity. 2.Nigerian 419 Scams Nigerian 419 scams (aka Advanced Fee Fraud) date back to the days when fax machines and snail mail were the primary business communication tools. Today, email is the preferred method of these scammers and there are more Nigerian 419 Advanced Fee Fraud scams - and victims - than ever before. 3. Lottery Winning Scams Lottery winner scams attempt to trick recipients into believing they have won large sums of cash, and then bilks them out of their own dough in a similar fashion to the Nigerian 419 scam. 4.Scareware Scams Scareware erroneously claims the system is infected and instructs the user to purchase a 'full version' in order to clean the bogus infections. Sometimes, fake antivirus software gets installed by the user who became a victim to an advertising scam. Other times, a rogue antispyware scanner may be installed by exploit, a so called 'drive-by install'. Regardless of how the rogue software gets installed, the user is often left with a hijacked, crippled system. To avoid becoming a victim, before......

Words: 850 - Pages: 4

2g Scam

... 2G Scam an UPDATE From the time allegations of misappropriation during the bidding for allocation of 2G spectrum surfaced, till Telecom Minister A Raja's ouster, high drama charged both politics in Delhi and Tamil Nadu. So what exactly is the Spectrum Scam that led to all this? WHAT IS SPECTRUM SCAM?   • 2G licenses issued to private telecom players at throwaway prices in 2008 • CAG: Spectrum scam has cost the government Rs. 1.76 lakh crore • CAG: Rules and procedures flouted while issuing licenses WHAT ARE THE CHARGES ON FORMER TELECOM MINISTER A RAJA?   CHEAP TELECOM LICENSES   •  Entry fee for spectrum licenses in 2008 pegged at 2001 prices •  Mobile subscriber base had shot up to 350 million in 2008 from 4 million in 2001    NO PROCEDURES FOLLOWED • Rules changed after the game had begun • Cut-off date for applications advanced by a week • Licenses issued on a first-come-first-served basis • No proper auction process followed, no bids invited • Raja ignored advice of TRAI, Law Ministry, Finance Ministry • TRAI had recommended auctioning of spectrum at market rates   FAVOURITISM, CORPORATES ENCASH PREMIUM   • Unitech, Swan Telecom got licenses without any prior telecom experience • Swan Telecom given license even though it did not meet eligibility criteria • Swan got license for Rs. 1537 crore, sold 45% stake to Etisalat for Rs. 4200 crore • Unitech Wireless got license for Rs. 1661 crore, sold 60% stake for...

Words: 551 - Pages: 3