TITLE

SEARCHING OUT FRAUDSTERS

PUB. DATE
February 2009
SOURCE
Travel Weekly (UK);2/13/2009, p5
SOURCE TYPE
Trade Publication
DOC. TYPE
Editorial
ABSTRACT
The author reflects on the search for Internet scammers. He notes that discovering a fraudster listed in Internet search results is worse in brand establishment. He points out that fraudsters can bid agaisnt brand terms, populate the page coding of their site with brand terms and mention these terms many times within their site content. He relates that one may ensure not to be a victim by taking a few minutes to check the search results.
ACCESSION #
36861707

 

Related Articles

  • Stay one step ahead of email scammers. Berman, Chloe // Travel Weekly (UK);2/13/2009, p4 

    The article focuses on the proliferation of the electronic mail scammers and the ways of countering them. It notes that annually an estimated three million people became victims to mass-marketed scams. Keeping tabs on the latest threats is significant as scam tactics are constantly changing....

  • U.S. Indicts 8 Members of Alleged International Cybercrime, Money Laundering and Identity Theft Ring for Hacking Into Banks, Brokerage and Payroll Processing Firms. Zagaris, Bruce // International Enforcement Law Reporter;Sep2013, Vol. 29 Issue 9, p341 

    The article reports on the indictment of eight members of alleged international cybercrime, money laudering and identity theft ring for hacking into banks, brokerage and payroll processing firms by the U.S. government. The arrested individuals include Olesksiy Sharapka, Oleg Pidtergerya, and...

  • THE GIVEAWAY SIGNS OF PHISHING.  // Australian PC User;Sep2006, Vol. 18 Issue 9, p63 

    The article offers information on signs of phishing, a form of computer crime and how to avoid them. Examples where phishers attempted to pass themselves off as Australian businesses are cited. It is learned that phishers steal usernames and passwords. Other forms of phishing take the form of...

  • Phishing gets between a rock and an easy place.  // MarketWatch: Technology;Sep2007, Vol. 6 Issue 9, p17 

    The article reports on the phishing skill developed and used by Rock Phish gang in stealing personal and financial assets from business firms worldwide. The group employs several techniques, which is difficult to trace and defend, to gain access to the victim's private information system. Among...

  • Recognizing a Phishing E-mail Before You Get Snagged. Clark, Deborah I. // Foreign Service Journal;Sep2007, Vol. 84 Issue 9, p76 

    The article discusses the issues about the risk for identity theft. It is called phishing, the practice of deceiving unsuspecting members into providing personal financial information such as account numbers, passwords, Social Security numbers and other confidential information that can be used...

  • Advertisers Losing Out To Malicious Bot Nets. MICHELE CHANDLER // Investors Business Daily;2/3/2015, pA04 

    The article discusses the impact of malicious bot nets to digital advertising networks. The author cites that online fraudsters use bot nets to infiltrate computers that are forced to unleash floods of fake information requests on an unsuspecting website. Also tackled is the incrising financial...

  • The Real Cost Of A Security Breach. Hobson, David // Software World;Jul2008, Vol. 39 Issue 4, p16 

    The article discusses the impact of security breach to companies in Great Britain. Due to the prevalence of identity theft, malware and computer crimes, sometimes companies are not sure whether their data are secured from data fraud or breach. Because of its great importance and impact, there...

  • Phishing for Corporate Dollars: The Emerging Global Threat Posed by Spear Phishing and Business Email Compromise. Rabkin, Jeff; Becker, Shireen M.; Little, Jonathan; Shadmand, Sheila L.; Shields, Rasha Gerges; Silberman, Gregory P.; Stephens, Neal J.; von Diemar, Undine; Wang, Peter J.; Johnson, Jay; Morgan, Michael G.; Haas, Olivier // Venulex Legal Summaries;2015 Q3, p1 

    The article discusses the emerging global threat posed by spear phishing and business email compromise (BEC) on corporations as of July 2015. It looks on how hackers gain access to Internet users' information. It also offers five tips for preventing data breaches and other cyber crimes that...

  • The Newest Internet Scams. Bauknight, Trevor Zion // Business & Economic Review;Oct-Dec2005, Vol. 52 Issue 1, p19 

    Explains that "spear-phishing electronic mail" is an Internet scam that involves the use of social engineering to convince Internet users to surrender their personal information such as passwords. Targeting of a small, clearly defined group of potential victims; Implications for enterprise...

Share

Read the Article

Courtesy of VIRGINIA BEACH PUBLIC LIBRARY AND SYSTEM

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics