Scams in April 2014

Scams in April 2014

IRS Email Scam

What to Look For:

The Treasury Inspector General for Taxpayer Administration is warning consumers that crooks are contacting individuals posing as IRS officials claiming they owe taxes. The caller demands payment over the phone requesting payment through a debit card, wire transfer or a credit card number. If the individual does not comply with the demand for payment, the caller threatens the individual with an arrest, deportation or threatens to take away a driver’s license or business. It has been reported that thousands of victims have lost money to these tax scams. For more details on this scam visit IRS.gov.

TIPS:

  • The IRS contacts people by mail first, NOT by phone.
  • The IRS will NOT ask for payment using a prepaid debit card or wire transfer.
  • The IRS will NOT ask for a credit card over the phone.
  • If you don’t owe taxes, call and report the incident to the Treasury Inspector General for Tax Administration at 800-366-4484
  • If you do owe taxes, hang up and call the IRS at 800-829-1040.


 

Facebook Post Scam: FLIGHT M370 FOUND!

What to Look For:

As Flight M370 gains worldwide media attention it  becomes a “hot” topic for cyber criminals on Facebook. This is an example of how cyber criminals use media events to exploit an individual’s curiosity to trick them into opening malicious messages. The post encourages the reader to share or like it with friends and family. Once the post is shared the video of the rescue is supposed to become accessible to the reader of the post. The video is never seen and the post goes on to ask for more of your information. Cyber criminals get paid for the number of times this post is shared or liked.

TIPS:

  • If you are not familiar with the source, NEVER like or share it.
  • DELETE these types of posts immediately.
  • DO NOT fill out any requested surveys associated with these posts.
FB Scam_2

Image courtesy of Online Threat Alliance


 

Message from Your Attorney Scam

What to Look For:

The theme of this communication is that your attorney stopped by your neighbors and left you a message. The neighbor was kind enough to scan the note into an email along with an attachment that your attorney needs you to open. Here’s a sample of the scam email:

Subject: message from your attorney  Hi, there! This is your neighbor writing here. Today your attorney popped you, but you were out, so he left a message for you. I have attached the file in this email, so you can open and check everything you need. Your attorney told me it is quite urgent and as soon as you check this message you should call him back. If something is not clear, you can find the cell phone number of your attorney into the file,  so you can dial it at once Have a good night!

please call me back asap.zip (469)

Opening the attachment will release a Trojan virus into your system.

TIPS:

  • DO NOT open the attachment and DELETE the email immediately.
  • NEVER open attachments that have the extension”.zip” or “.rar”  unless you know who they are from. Cyber criminals compress their virus software into these extensions in order to bypass your PC security.

Top 5 “Pick-Up” Lines of Scammers

Activity Report HeaderAlbert Einstein once said, “Logic will get you from A to Z; imagination will get you everywhere.”

Who: The Email Pick-Up Artist

The email scammer is a cybercriminal who creatively uses email to exploit predictable reactions for nefarious reasons. Using plenty of imagination and research to hone their phishing skills, they practice their craft and polish their end product to make it difficult to distinguish their emails from legitimate communications. Their work pays off when you click. That puts the pressure on you, the email recipient, to decipher a scam. The subject is their “pick-up line.” If you don’t determine the con at that level and open the email, your computer may already be infected. Continue reading

2013 in the Rearview, and the Security Lessons We’ve Learned

2013 Year in Review
Infographic: Security Lessions Learned in 2013

Infographic: Security Lessions Learned in 2013

To say that 2013 wasn’t a very good year for security is an understatement. From endless NSA leaks to major data breaches at LivingSocial, Adobe, and Target, it’s a year that I hope you won’t forget too quickly. Otherwise you may learn nothing from the security failures, leaving you more vulnerable to becoming a fraud victim yourself. If you want a head start on security for 2014, but the security headlines from 2013 already seem blurry, here are brief reminders of some of the bigger fraud-related news stories, events and failures.

January – The New York Times confirms that it was the victim of a sophisticated attack by Chinese hackers using advanced malware. The hackers used at least 45 different types of malware, only one of which was detected by the firm’s security systems. Continue reading

Security Lessons We’ve Learned in 2013 [Infographic]

As we move forward into a new year, it’s important to continue improving our security measures to protect our personal information. This year had its share of security slip-ups, from leaks of NSA information to major data breaches at nationwide companies like LivingSocial, Adobe and Target. Let’s take a look at this infographic to see how we can improve our security strategies to prevent from becoming a fraud victim ourselves. Let’s take a look back at 2013 to see what lessons we can learn.

Read the full article here.

EZShield Infographic Security Lessons Learned In 2013

EZShield Infographic Security Lessons Learned In 2013