[15/02/2011] Valentine’s Day scams
Valentine’s Day is the day, which you would want to spend with your loved one, buy her or him a romantic gift, and spend some quality time together. However, many scammers are praying on the love-struck and trying to con them out of their hard-earned cash, using various schemes.
Online phishing scams
Thousands of men and women receive unsolicited email messages before Valentine’s day, which messages come from a ‘flower shop” and asks the receiver to enter their credit card details or the flowers that they have bought for their loved ones would not be delivered on time. The fact is that great many people have actually ordered flowers either online or over the phone and could easily fall for this scam. If you receive an email or phone call, where you are being asked for your credit card details, it is best to hang up and call back the shop, where you have actually placed your order and find out if the call is legit. If you have already paid for the flowers, there is no need to give anyone your credit card details once again.
Online dating scams
These have many twists, but the basics are usually the same – you meet a charming woman or man online, who takes the time to chat with you until they gain your trust. After many exchanged emails or phone calls, you decide that you would want to meet in person and this is when the swindler would ask you to help them out with money for a plane ticket or gas. The con artists often use fake pictures of attractive men or women, come up with believable stories, and appear to be as much interested in you as you are in them, but all they want is your cash.
Valentine’s Day E-card Scam
Using the fact that many people send e-cards on Valentines, the scammers send out thousands of e-cards themselves, which then redirect the receiver to a genuine looking website. Once there, you are prompt to install the “latest version” of Flash Player or other software in order to be able to view the e-card. The installation will actually drop a virus or Trojan on your computer and steal sensitive information or use your computer to send further unsolicited emails and messages, while quietly working in the background.
Other articles from this category:
[15/02/2011] How CYTT works?
[15/02/2011] Does it really work?
[15/02/2011] Stay away from these scams
[12/03/2011] How you can complain about financial services
[12/03/2011] Payment fraud – know your rights
[12/03/2011] What is Phishing?
[12/03/2011] What is Malware?
[12/03/2011] What is Spear phishing?
[12/07/2011] How to write a Complaint Letter
[03/04/2012] How to fight a case in a small court
There are no comments
Please log in before you add a new comment
Not a member yet? Click here »
Forgot password? Click here »