Web Hosting Security

  Home arrow Web Hosting Security arrow Page 2 - Tips to Avoid Online Scams
Web Hosting Articles  
Web Hosting FAQs  
Web Hosting How-Tos  
Web Hosting News  
Web Hosting Reviews  
Web Hosting Security  
Weekly Newsletter 
Developer Updates  
Free Website Content 
 RSS  Articles
 RSS  Forums
 RSS  All Feeds
Write For Us 
Contact Us 
Site Map 
Privacy Policy 
  >>> SIGN UP!  
  Lost Password? 

Tips to Avoid Online Scams
By: wubayou
  • Search For More Articles!
  • Disclaimer
  • Author Terms
  • Rating: 5 stars5 stars5 stars5 stars5 stars / 1

    Table of Contents:
  • Tips to Avoid Online Scams
  • Never reveal your personal information

  • Rate this Article: Poor Best 
      Del.ici.ous Digg
      Blink Simpy
      Google Spurl
      Y! MyWeb Furl
    Email Me Similar Content When Posted
    Add Developer Shed Article Feed To Your Site
    Email Article To Friend
    Print Version Of Article
    PDF Version Of Article




    Tips to Avoid Online Scams - Never reveal your personal information

    (Page 2 of 2 )


    Phishing attacks are quite popular nowadays as hackers do everything they can to pry personal information from the grips of consumers online. While email has been used for phishing in the past, hackers have now decided to use text messages via cell phones as another avenue to steal personal information. A slight variation on phishing, called smishing, is becoming popular as well.

    Smishing, named such because of its use of SMS as a basis for transmittal, is when a scammer sends a text message to a person. The text message claims to be sent from the person's bank or another business they have dealt with in the past. In an attempt to extract personal information, the text will say that a transaction must be confirmed or something similar. To confirm, the person is asked to send personal information, such as their bank account numbers, log-in data, and more. 

    If you receive such a message, do not respond to it directly. Never send sensitive information via text or email. Instead, contact the bank or business in question through their direct phone number and reference the message you have received when speaking to a representative. This is the best way to find out if the message is legitimate. The likelihood of the message being legitimate is very low, however.

    Use Facebook carefully

    Facebook is a great way to keep in touch with others, but the popular social network is also becoming a breeding ground of choice for hackers. Hackers know that Facebook is popular. They also know that many of its members may be trustful of messages and links contained on friends' walls and pages. They use this knowledge to create scams on the social network with the hopes of transmitting malware and/or stealing your personal data.

    Many of the recent Facebook scams involve faulty links that lead to sites that spread malware. The links may entice users to click on them by promising racy videos, unbelievable promotions, and more. Hackers also use compromised accounts to spread such malware, as they know that some users will trust and click on links from friends regardless of the subject matter.

    To protect yourself from Facebook scams, do not click on suspicious links. Also, beware of apps that claim to have certain functions. For instance, many Facebook scams originate in apps claiming to show you who has viewed your profile. Not only is this function non-existent, but engaging such fraudulent apps will result in malware or your account being compromised.

    While this discussion on online scams does not represent all the threats that currently exist, it does show some examples of what you must keep your eyes open for. Make sure to practice the tips listed to protect yourself and your belongings from hackers and other cybercriminals.

    DISCLAIMER: The content provided in this article is not warranted or guaranteed by Developer Shed, Inc. The content provided is intended for entertainment and/or educational purposes in order to introduce to the reader key ideas, concepts, and/or product reviews. As such it is incumbent upon the reader to employ real-world tactics for security and implementation of best practices. We are not liable for any negative consequences that may result from implementing any information covered in our articles or tutorials. If this is a hardware review, it is not recommended to open and/or modify your hardware.


    - For Online Security, Invest in People
    - World`s Third-Largest Botnet Bites the Dust
    - Yahoo Security Breach Highlights Poor Practi...
    - How to Prevent Mobile Malware
    - FBI Issues Internet Security for Travelers a...
    - More of the Top Internet Scams
    - How to Stop Phishing Scams
    - Social Networking Safety Tips
    - How to Avoid Financial Fraud Online
    - Android`s Most Notorious Trojans and Viruses
    - GFI Report Details Top 10 Threat Detections ...
    - Sophos Releases Security Threat Report 2012
    - Facebook Safety Tips for 2012
    - Email Scam Hits Apple Users
    - Tips for Mobile Security

    Developer Shed Affiliates


    © 2003-2019 by Developer Shed. All rights reserved. DS Cluster - Follow our Sitemap