Society of Internet Professional

FOLLOW US

   

T

SECURITY

Spamming, Stalking, Reputation Management

 

SPAM WITH DISCOUNT CARDS

In what security experts describe as "cyber money laundering" or "e-fencing," scammers have perfected yet another way to convert stolen data into cash while sitting at a computer.

How it works: Thieves use a stolen credit card number to buy a gift card online, then sell it to the highest bidder at an online auction Web site or for a set discount at a gift-card exchange Web site.

"People have found that purchasing gift cards with stolen credit card information and selling them online is very lucrative," says Joseph LaRocca, vice president of loss prevention at the National Retail Federation.

The ruse helps crooks make use of pilfered credit card numbers before the victim has a chance to deactivate the account. It "extends the life of credit card fraud," says Paul Cogswell, vice president of loss prevention and risk services at Comdata, one of the nation's largest gift card producers and processors.

EBAY AND PAYPAL SPAMMING

This is not an email from PayPal. Oh, it looks real enough, but it's not. Its called phishing and it's a way for spammers to get their hands on your personal, private inf

Beware! There are people out there trying to get your personal information to use for their own means. This is just one example. I have have also received similar emails from eBay, Amazon and many other's. When you click on the link in the email you will be taken to a site that looks like PayPal, but it's not. Then you enter your personal information and now they have it.

To avoid this problem never click on the link in the email. If you are not sure if the email is real or not open your browser and go to the site itself. Never trust the email.


STALKING

Lately the news has been littered with cases of internet stalkers who hunt down, assault and even kill their victims. According to the National Institute of Justice annually 1.4 million American are victims of stalking. As a security specialist, I am often called upon to research and investigate internet related stories. I can say with certainty that most victims of stalkers never report their cases to the authorities. Moreover, there are factors that help contribute to a stalker's obsession; and, there are ways that everyone can participate in helping to ensure that the internet is safe for all. Using my experience as a security specialist, I will endeavour to detail this article with the signs you can look for; and, how you can stop internet stalkers.

For more information on more Internet related security crimes, please log on to www.jbm.net and subscribe to our weekly newsletter. We also offer on-line interactive videos which will illuminate this growing field.
--
Courtesy Brent MacLean, www.jbm.net ww.brentmaclean.com

 

REPUTATION MANAGEMENT

What and How of Online reputation management http://www.bestcolleges.com/resources/manage-your-online-reputation/

Back to Resources

Benefits of becoming Member

Pics From Our Events since 1997