Saturday, November 1, 2014

Avoiding Internet &Telephone Con Artists



This month’s article deals with the ever increasing risk of being “conned” out of your money by Internet thieves. I’ve written about this several times before but some of the newer cons deserve that I revisit the subject.

The Telephone Con
How it works:
  1. You receive a call on your landline or mobile from someone claiming to be from Microsoft or some other technology company. The caller may identify himself as from “windows” or an anti-virus company.
  2. The caller tells you that your computer has been identified as having a problem. The problem described can be anything from “being ready to crash” to “having been involved in a criminal act”.
  3. The caller offers to connect with your computer or directs you to a website for
  4. Further assistance.
  5. Once you allow this you are prompted by either the caller or the website or your computer that you need to pay an amount to fix the issue. The amount is always under €100.
  6. You, the victim, enters you bank account or credit account details on the website or gives them to the individual.
  7. You realize later you have been scammed as money has disappeared from your account. The amounts range from €300 up to €3,000.

How To Avoid This Scam:
  1. Do not engage in any way with this individual simply hang up the phone.
  2. Assume all such calls are scams and if you need clarification contact a known computer technician for advice.
  3. Never visit the site offered, and never allow access to your computer.

Who They Are:
1. These conmen (it seems to be mostly men) are organized criminal gangs located in countries outside the jurisdiction of Interpol (and consequently the Guards).
2. They are using freely available internet telephone directories which lists your name and telephone number.
3. They are using low cost internet calling services such as skype to contact you. You will notice the quality of the telephone call will sometimes be poor.
4. The will try repeatedly, using different methods, to get you to give them access to your computer or compromise the security on your computer.
5. The will, if they can, also use email as a second tier attack on you.

Stay alert, stay safe!