website statistics

What is the next Gadget you want?

View Results

Loading ... Loading ...
1 Star2 Stars3 Stars4 Stars5 Stars (Rate This)
Loading ... Loading ...

Internet scams continue to make the world wide web a dangerous place to navigate, and there seems to be no respite from cyberscams from criminals and no shortage of their ingenuity. Just recently, the newspapers reported of another scam whereby people were conned into giving up their Facebook passwords to the scammers. A brand new scam technique is reported on almost every week.

As part of its annual wide-ranging look at Internet crime, the Federal Bureau of Investigation took a look at the top Internet scams of 2009. “The figures contained in [the FBI's] report indicate that criminals are continuing to take full advantage of the anonymity afforded them by the Internet. They are also developing increasingly sophisticated means of defrauding unsuspecting consumers. Internet crime is evolving in ways we couldn’t have imagined just five years ago,” said National White Collar Crime Center Director Donald Brackman in the report. Annual crime complaints reported to Internet Crime Complaint Center (IC3) have increased 667.8% between 2001 and 2009.

According to the FBI and the IC3 Web site, the “popular scam trends for 2009″ included hitman scams, astrological reading frauds, economic scams, job site scams, and fake pop-up ads for antivirus software. (See also “How to Spot an E-Mail Scam.”)

From the report, here’s a look at the top Internet scams of 2009:

Fake Pop-up Ads for Antivirus Software

One of the truly nasty scams involves pop-up ads for rogue antivirus software. Victims reportedly receive ads warning them of the existence of threatening viruses and/or illegal content allegedly found on the victim’s computer. When victims click on the fake pop-ups, malicious code is downloaded. Victims are directed to purchase antivirus software to repair their computers, but in some instances this resulted in viruses, Trojans, or keyloggers downloaded onto their computers.

Attempts to contact the antivirus software companies were unsuccessful. The IC3 says that users who see these unexpected antivirus pop-up warnings should shut down their browsers or their computers immediately and then run an antivirus scan to see what’s going on. The FBI says these scammers have made more than $150 million in the past year.

The online “hitman” scammer who threatens to kill recipients if they do not pay thousands of dollars to the sender, is still sending out thousands of e-mails.

Two new versions of the scheme began appearing in July 2008, the FBI said. One instructed the recipient to contact a telephone number contained in the e-mail and the other claimed the recipient or a “loved one” was going to be kidnapped unless a ransom was paid. Recipients of the kidnapping threat were told to respond via e-mail within 48 hours. The sender was to provide the location of the wire transfer five minutes before the deadline and threatened bodily harm if the ransom was not received within 30 minutes of the time frame given.

The recipients’ personally identifiable information was included in the e-mail to promote that appearance that the sender actually knew the recipient and their location, the FBI said. In some instances, the use of names, titles, addresses, and telephone numbers of government officials, business executives and/or victims’ personal information are used in an attempt to make the fraud appear more authentic, the FBI stated. Victims of this e-mail are typically instructed to send the money via Western Union or Money Gram to a receiver in the United Kingdom.

Economic Stimulus

A down economy is the opportunity for fraud. This one involved unsolicited calls regarding fraudulent “government stimulus money.” IC3 received numerous complaints from victims receiving unsolicited telephone calls with a recorded message. The recorded voice message reportedly sounds very much like President Barrack Obama discussing alleged government funds available for those who apply. Victims are warned that the offer is only available for a limited time and are instructed to visit the Web sites or to receive their money. These sites require victims to enter personal identifying information after which they are directed to a second page to receive notification of eligibility. Upon completion of an online application and payment of $28 in fees, victims are guaranteed to receive a large sum of stimulus money, but they never do, the FBI said.

The Federal Trade Commission also warned of these scams. In July it opened Dubbed “Operation Short Change,” the law enforcement sweep announced today includes 15 FTC cases, 44 law enforcement actions by the Department of Justice, and actions by at least 13 states against those looking to bilk consumers through a variety of schemes, such as promising non-existent jobs; promoting overhyped get-rich-quick plans, bogus government grants, and phony debt-reduction services; or putting unauthorized charges on consumers’ credit or debit cards, the FBI said.
Astrological Reading

The FBI said this familiar scam has resurfaced in which a victim receives spam or pop-up messages offering free astrological readings. The victim must provide his/her birth date and birth location to receive a free reading.

After receiving the reading, the victim is enticed to purchase a full reading with the promise that something favorable is about to happen. The victim pays for the full reading but never receives it, and most attempts to contact the “Professional Astrologer,” via email, return as undeliverable, the FBI said.

Job Site

Hand-in-hand with the economic scams were the at-home and survey scams related to online job sites. With work-at-home scams, victims fall prey to fraudulent postings for a variety of positions, ranging from personnel managers to secret shoppers.

Victims are lured into providing the fraudster with personal identifying information with promises of above average hourly wages or several hundred dollars per week. Some victims are promised the hardware and/or software equipment needed to perform the job. These sites can be so convincing that victims are oftentimes scammed into cashing checks or money orders that they receive; then redistributing a portion of the funds by way of their personal check, cash, money orders, or wire transfers to a third party

In survey scams, fraudsters post ads for participation in a survey regarding employee/employer relationships during the current economic crisis. Those who apply are required to send a copy of their payroll check as proof of employment. After sending the copy, the victim never hears from the fraudster again; however, the employer’s account is drained of thousands of dollars by way of fraudulent checks, the FBI said.

Source: PC World.

A Look At Kindle’s iPad App And Interface

Google China Search Engine Terminated
You can also press the left/right arrow key on your keyboard to go to previous/next post
  On March 22, 2010(4 years, 1 month ago.)
  • Edward Craig

    No problem as long as users stop using Windows on the net. Malware authors have yet to bother with any minority OS since Windows gained dominance, not adware, not trojans, no viruses, nothing except Windows has been targeted. Some malware might be introduced for Apple, I suppose, but it has been decades since anybody has even tried. Why bother? I suppose, still plenty of vulnerabilities known in Windows.
    Nobody else needs anti-malware software except to protect from infecting Windows systems.

  • Pingback: astrological readings | ABOUT ASTROLOGY

  • Pingback: Fake Waiter - Credit Card Scam |

  • Pingback: Top Antivirus Software

  • Pingback: astrological readings | ABOUT ASTROLOGY

  • Pingback: astrological readings | ABOUT ASTROLOGY

  • Pingback: astrological readings | ABOUT ASTROLOGY

  • symptoms of vitamin d deficiency

    Hey! This is really cool, exactly what I was looking for. The designs here are so fabulous!. Thanks for uploading this stuff.

  • Pingback: astrological readings | ABOUT ASTROLOGY

  • Pingback: astrological readings | ABOUT ASTROLOGY

  • Pingback: astrological readings | ABOUT ASTROLOGY

  • Pingback: astrological readings | ABOUT ASTROLOGY

  • Pingback: astrological readings | ABOUT ASTROLOGY

  • Pingback: astrological readings | ABOUT ASTROLOGY

  • Pingback: astrological readings | ABOUT ASTROLOGY

  • Pingback: astrological readings | ABOUT ASTROLOGY

  • Pingback: astrological readings | ABOUT ASTROLOGY

  • Wholesale Cheap Jersey

    hey,you have posted such a effectful article that it will certainly help me

  • Jy7

    Trusted site to earn money online 100% no scam..
    Do online survey see the immediate effect.
    You won’t make thousands of dollars really fast, but you can make a good sum of money each month, with very little effort.

  • Jy7

    Trusted site to earn money online 100% no scam..
    Do online survey see the immediate effect.
    You won’t make thousands of dollars really fast, but you can make a good sum of money each month, with very little effort.

  • Pingback: http://%/bvxhuet4

  • logan

    has anyone heard bad things about

  • logan

    has anyone heard bad things about

  • Thebodaclan

    I have this popup that keeps coming up but only when I use firefox. It came out of nowhere and I can’t get it to go away. I want it gone…..

  • Website Regulator

    Such a fucking gay website

  • Rsmath

    Its a real shame that you yourselves are part of these five most crimes : in your description , you even have ads that are malware, unscrupulously ” FAKE ” popup ads on Top of that ….. grow up ————- take these doen for gods sake

  • alex

    there’s one site called, anyone know about it?

  • Sdfsd

    Apple is not as popular as PC and if you even waste your time hacking an Apple, let alone regularly use one, you’re a fag anyway

  • Robert

    Internet scammers are the worst!!!!

    HGH InformationDeer Antler Spray

  • Bobby

    Very good information about scams here. I learned some stuff for sure!

    Moringa LeafMoringa Benefits

  • r. samaranch


  • Tong593377705

    louis vuitton outlet store Women would usually carry mobile phones in their pockets. The weight of the mobile phone may vary depending on the model you have. Well, not so much as women how mobile thin light compared to heavy and bulky to contribute. Then they would surely a vanity kit in your pocket. The weight of the cosmetic products should not be much but you never know if the lady is moisturizers and body lotions as well as in the pockets.Buy designer bags could not be simpler for all, replica or imitation designer bags could be viewed as an alternative.Imitation may be less than half the price available at the Louis Vuitton Online Outle. This does not mean that only non-designer bags, which are available in order to fulfill the criteria of the ideal weight. Take time to reflect on the local market could also help women inexpensive with many options. There are non-designer brands on the market that are known for quality.

  • techielove

    It’s better not to engage to internet scams for they will steal not just your money but also all your personal information.

    That’s why i’d rather join in some (legit) online contest than on scams…

Recent Search

Recent Tutorials

Adobe CS products are not free, but the good news is you can now download Photoshop CS2 & all other CS2 product completely free and it's absolutely legal.
At the beginning level, many people don't know how to use Gmail properly. For them, a here's a helpful guideline.
Skype now allows you to call directly from your Outlook account. Find the step-by-step installation process from this tutorial.
This tutorial helps you quickly resolve four of the most common problems that occur with Windows XP.
After releasing Look Back, many people didn't like it. So Facebook planned to add an Edit tool to the feature and now you can edit your Facebook Look Back video.
Do you want to record Skype calls but don't know how to do that? Then this guide is absolutely for you. Get inside the article for details.
Do you know that many companies can track you on Facebook? Do you want to know who they are? Do you want to block them?
So you've been planning on replacing your old hard drive with the new drive? This tutorial helps you with a few simple steps.
Bitcoin is a digital currency that has gained extraordinary momentum in the last few months. This tutorial helps you get started with the basics.
Android lockscreen can be secured in a number of ways, some of which are described in this brief tutorial.
Close You Have To Login
Login With »Login With TwitterLogin With Facebook