Internet Vane

Internet Scam Terminology

"Internet fraud" uses online services to present fraudulent solicitations to prospective victims, to conduct fraudulent transactions, or to transmit the proceeds of fraud to financial institutions or to others connected with the scheme. Internet fraud can occur in chat rooms, e-mail, message boards, or Web sites.

Phishing (also called spoofing)
The act of sending an e-mail or pop-up message that tricks people the computer's user into believing it is from a bank, legitimate business, or government source in an attempt to get recipients to reveal information that can be used to steal identity.The fastest-growing form of bank card fraud is "phishing" in which fraudsters set up a fake version of a genuine bank website and then send out thousands or even millions of spam emails driving consumers to the site.

Bait and Switch
An illegal sales practice in which a business advertises a bargain price for an item in order to draw customers into the store, then tells the prospective buyer that the advertised item is of poor quality or no longer available and attempts to sell them something else that is higher priced.
Bait and switch is also used by foreclosure rescue scammers to get victims to sign what they believe are loan documents but turn out to be documents that transfer ownership of the victim;s property to the scammer..

A network of computers secretly taken over by scammers and used as "robots" to send spam. Your computer can become a "bot" without your knowledge.

The act of adding services to your phone bill that you did not ask for or charging you for calls you did not make.

A scam meant to cheat people by using misleading information or misrepresenting legitimate information.

Someone who uses the Internet to access computers without permission.

Deliberate trickery or deceit used to gain an advantage.

Malicious software installed on your computer without your knowledge. It is used by scammers to steal your personal information, send spam, and commit fraud.

A virus or malicious program that is placed on your computer and takes control of your Web browser in an attempt to direct you to sites owned by identity thieves.

An attempt to intentionally mislead a person for financial gain. Sometimes the scam involves a second person who "believes" the scam is legitimate.

The act of sending a text message in an attempt to get you to reveal personal information.
Spam (also known as junk e-mail)
Unsolicited commercial e-mail; also unsolicited commercial calls to cell phones.

Telemarketing scam
A scam that uses the phone to con people into sending money or revealing personal information that can be used to steal identity.

The act of sending a recorded message, e-mail or text message to a cell phone that tricks the user into believing it is from a bank, legitimate business, or government source in an attempt to get recipients to reveal information that can be used to steal identity.

Work-at-home scam
A scam that involves an easy work-at-home job opportunity with hidden costs or paychecks that bounce.

Pop-up Ads
Unsolicited advertising in a new browser window. Criminals create pop-up ads that seem to be from a trusted source and ask for personal details or download spyware, when clicked.

Trojan Horse
Malicious programs that are often hidden within legitimate programs and secretly executed when the legitimate program is installed or run on the user's computer.

malicious code or program that can be carried by any attachment. Such an executable file, when opened, copies itself and uses up memory to damage software or hardware

A program that replicates itself within a network to hijack or shut down systems.

The black money scam
sometimes also known as the 'wash wash scam', is a scam where con artists attempt to fraudulently obtain money from a victim by persuading him or her that piles of banknote-sized paper in a trunk or a safe is really money which has been dyed black (e.g. to avoid detection by customs). The victim is persuaded to pay for chemicals to wash the "money" with a promise that he will share in the proceeds.

419 scam
A Fraud (usually advance fee fraud) perpetrated online or by email. There are many variations, but typically the victim is offered a very large sum of money (usually millions of dollars) in exchange for a relatively small amount of money (usually a few thousand dollars). Variants include lottery scams, inheritance scams and loan scams.

Pump and Dump Scams
Spam email messages will sometimes reach your mailbox, claiming to know about a stock investment that will rapidly grow within days. But these are often scams.

Home computers that have been taken over by spammers who then use them to send spam in a way that hides the true origin.

Browser Hijacker
A common spyware program that changes your web browser's home page automatically, even if you change it back.

Misspellings in emails
Scammers, being largely uneducated criminals, frequently misspell words in their scam emails or the English is broken or unstrutured. No legitimate company would make these mistakes!

Hidden Dialers
Programs that you may unknowingly download that can use your computer to silently dial expensive phone calls which later show up on your phone bill.

Scareware or rogue anti-virus software
An ongoing threat exists for computer users who, while browsing the Internet, began receiving pop-up security warnings that state their computers are infected with numerous viruses.The scareware is intimidating to most users and extremely aggressive in its attempt to lure the user into purchasing the rogue software that will allegedly remove the viruses from their computer.

And the beat goes on...stay turned for updates......

A Penny for your Thoughts....