6 Essential Tips on How to Prevent Online Shopping Fraud
Dear readers and followers, I would first like to wish you a very Happy New Year, good health and great personal and professional accomplishments.
As some of you have already purchased products/services online (and I would like to invite you to share your experience with us) and some others will have at a some point, I am featuring today Israel Defeo as guest blogger on this common topic: Online shopping.
Shopping online is easy. You get what you want in a matter of seconds. Just input your credit card information and voila, that book or jacket or bag is already on its way to you within 24 hours.
This is why more shoppers are switching to e-stores and e-transactions—e-payments, e-banking—are fast becoming the norm. Convenience is the ultimate game-changer. Plenty of online shops, too, offer discounts and freebies like free delivery or free shipping.
However, the rise in e-transactions has also made online fraud possible. To prevent online shopping fraud from happening to you, here are some easy tips you can follow:
1. Keep your credit details a secret.
Like the famous quote said, “There are things better left unsaid.” That may be true especially if it’s about your credit, debit or other essential information that need to be kept secret.
2. Use caution when using your devices for online shopping.
Because it’s more convenient to shop online using smartphones, tablets, and other mobile devices with internet access, more consumers prefer to use these gadgets than computers and laptops—which are more secure. Beware of using your handheld devices for transactions that carry your personal and credit card information. In case your device is misplaced or lost, you’re at risk of falling victim to fraudsters and scammers who can extract your private information through the lost device.
3. Beware of phishing websites.
Have you ever seen items on some websites offered at very low prices? Though it can be tempting to purchase low-priced bargain items, it can also come at great risk to the safety of your credit and personal details.
There are internet criminals who create phishing or fraudulent websites which trick you into signing up and disclosing your private information. Some of these websites duplicate the content and design of legitimate ones to fool shoppers like you into revealing their credit card details. At this point, it may be better for you to let common sense—or your gut feel—rule. If you feel like the price is unbelievable or a deal sounds too good to be true, chances are, it is. Stay away from fishy-looking sites as much as possible to keep from being a victim of identity theft.
4. Verify if the website is legitimate or not.
Remember, Google is your friend. This search engine can help you find any information you need to get your hands on. Search for the name of the website and see if there’s anything involving “scam” or “fraud” mentioned in blogs, forums or other online sources.
5. Don’t click hyperlinks from random emails.
You probably received not just one, not just two, but more emails about offers and discounts about a product or service in your email. Be mindful of clicking links attached to those messages because it may redirect you to fraudulent websites or phishing sites. Also beware of attachments you receive from untrusted sources. These may contain viruses and malwares that may not just harm your electronic devices, but can also swipe information from your units.
Sometimes, web mail servers can filter unreliable messages and put these messages in the Spam folder of your email. So make sure this feature is enabled in your settings.
6. Beware of bogus sellers lurking in social media sites
Social media sites are also used by small-scale entrepreneurs to market their products and promote their services to a wider audience. It has been an advantage to both sellers and buyers because Facebook, Twitter, Instagram and other social media platforms can be used for easy communication, placing orders, and completing transactions because it allows real-time responses.
However, scammers can easily post photos and create bogus accounts about bogus products or services. So be mindful of the sellers you buy from. If they cannot ship or send the product they promised after a transaction, you may have already been scammed. To avoid this fate, make sure to call up the seller before you even buy anything. If you smell or hear something fishy or that makes your antennae quiver in suspicion, go and search for another seller until you find one you can trust.
So be careful whenever you use your credit card. Follow the tips mentioned above to help you make sure your credit card and credit information are both safe—and to keep online fraud from happening to you.
This guest post is written by Israel Defeo. He is the writer and online promoter of the leading financial comparison website in Hong Kong, Money Hero. The online portal presents up-to-date and unbiased information about insurance companies, credit cards, loans, deposit accounts and broadband and mobile plans.
Any questions can be submitted to: dan@e-crimeexpert.com
Additional information can be found at: http://www.e-crimeexppert.com
To find out more about Dan Manolescu, visit his LinkedIn page here.
Hit the “subscribe” button in order to be notified when new videos and Articles are posted on this blog
Share this:
Cyberbullying
As the number of volunteer contributors to this blog is significantly increasing, today, E-Crime Expert welcomes Bonnie’s guest post on Cyberbullying. A commanding new infographic from Besteducationdegrees.com is explaining the rate & causes of cyberbullying and is brought to you by Bonnie Moore. She is a freelance writer and blog junkie.
According to Bonnie, Cyberbullying is an online hazard through the use of electronic devices. It include harassing text messages or emails, rumours sent by email or posted on social networking sites, and embarrassing pictures, videos, websites, or fake profiles. It has become more common in society, particularly among young people and most of the young generations are facing cyber harassment.
Below is the Infographic created and shared by Bonnie.
Source: Best Education Degrees
To view the original Post click here.
Any questions can be submitted to: dan@e-crimeexpert.com
Additional information can be found at: http://www.e-crimeexppert.com
To find out more about Dan Manolescu, visit his LinkedIn page here.
Hit the “subscribe” button in order to be notified when new videos and Articles are posted on this blog
Share this:
10 Ways to Prevent Your Identity From Being Stolen
Today, we welcome our guest Amanda Kostina who is a green living enthusiast and a blogger for withefence.com. She generally writes about green lifestyles, eco-friendly businesses, and frugal living. Amanda is always passionate about making the world a better place for the generations ahead.
Bellow, you can read Amanda’s interesting guest post on how to prevent identity theft.
One of the fastest growing crimes in the United States, identity theft affects millions of Americans. From phishing scams to taking advantage of the information in a lost or stolen wallet, criminals have a variety of options when it comes to methods of exploiting your information for their own gain. Fortunately, there are also a few simple steps you can take to protect yourself against their nefarious efforts, maintaining control over your own identity and preventing it from being stolen.
1.Clean Out Your Wallet – Many people keep their Social Security cards on their person for easy access, but this practice can easily put one of your most sensitive pieces of personal information into the hands of identity thieves if your wallet is stolen or becomes lost. Make a point of storing your Social Security card in a safe place other than your wallet, and of periodically clearing out any bits of paper bearing sensitive information.
2.Come Up With Creative PIN Numbers – Choosing your wedding anniversary or the birth date of a child for account pin numbers makes them easy to remember, but it also makes them relatively easy for would-be identity thieves to guess. A jumble of numbers or letters that have no connection to one another is ideal, as the random nature makes them much more difficult to suss out.
3.Memorize PIN Numbers – The major selling point of using an important date or significant number as the PIN on a financial account is ease of memorization, but that also makes them easy to guess. When you do come up with a secure PIN, don’t write it down and leave the slip of paper in your wallet or on your person, as that information would fall into the hands of an identity thief right along with the card it’s attached to if your wallet is ever stolen. Take the time to memorize the number instead.
4.Check Your Mail – Letting your mail pile up while you’re on vacation or simply forgetful can leave you with more than just a clogged mailbox. It can also up the chances of documents containing sensitive information being taken by an unscrupulous passerby. Make sure that you’re clearing the mailbox every day, or that you make arrangements for the postal service to hold your mail while you’re traveling.
5.Invest in a Document Shredder – Dropping sensitive documents into a shredder is the work of a moment, and it makes it much more difficult for criminals to steal discarded papers from your garbage can or recycling bin with sinister aims.
6.Monitor Account Activity – Opting out of paper statements from your bank and other financial institutions not only keeps your statement out of the mailbox, but also helps you to do your part for the environment by eliminating a bit of unnecessary paper use. Instead, check your statements and monitor activity online. You’ll be able to keep an eye on your account any time you like, and you won’t be leaving personal information on a statement that’s up for grabs to any thief in the area.
7.Check Your Credit Report Annually – By federal law, you are entitled to one free credit report each year. It’s wise to take advantage of that right, not only to keep an eye on your rating, but also to check for signs of old identity theft or fraudulent activity.
8.Install Anti-Virus Software – Your computer makes paperless billing and statements available, allows you to conduct transactions from the comfort of your home and is an indispensible tool for the modern American. Without proper anti-virus and security software, it’s also an open invitation for identity theft and fraud. Make sure that you’re running up-to-date and reliable software to protect your PC, too.
9.Be Cautious Online – Whether you’re looking for work online or applying for financing, there are a wide variety of helpful tools to be found on the Internet. Unfortunately, there can also be a minefield of potential issues for those who aren’t cautious in their online dealings. Make sure that you’re only sharing sensitive information with reputable sources.
10.Practice Smart Phone Strategies – Unless you initiated a phone call and are sure you’ve reached the intended party, it’s wise to make a practice of never providing personal information over the phone. This especially holds true with unsolicited sales or marketing calls, because you can’t always be sure that the person on the other end of the line is a legitimate representative. To be safe, decline any offers that would require the sharing of your social security number, financial account details or other sensitive information.
Source: Amanda Kostina for: whitefence.com
To view the original Post click here.
Any questions can be submitted to: dan@e-crimeexpert.com
Additional information can be found at: http://www.e-crimeexppert.com
To find out more about Dan Manolescu, visit his LinkedIn page here.
Hit the “subscribe” button in order to be notified when new videos and Articles are posted on this blog
Share this:
Infographic-Privacy and Security on Facebook
Today, E-Crime Expert has Naomi Paton as guest blogger. She is a passionate writer and loves to write articles related to internet, teen & amp; crime. She writes for Best Computer Science Schools.
The majority of today’s populace uses the internet and social media on a regular basis, but at what cost? Although there has been some research conducted representing the negative effects of internet addiction, less is known about how young adults are being affected by misuse of facebook like bulling, reputation damage, burglary etc.
Bellow is the infographic, created by Naomi Paton, which listed the researched data and the do and don’t facts on Facebook.
Source: BestComputerScienceSchools.net
To view the original Post click here.
Any questions can be submitted to: dan@e-crimeexpert.com
Additional information can be found at: http://www.e-crimeexppert.com
To find out more about Dan Manolescu, visit his LinkedIn page here.
Hit the “subscribe” button in order to be notified when new videos and Articles are posted on this blog
Share this:
Nigerian letter-like on LinkedIn
Read this quick E-Crime Expert Blog Post to see how now LinkedIn is used for the “Nigerian Letter” classic scam.
This scam is also known as 419 scam, because the number “419” refers to the article of the Nigerian Criminal Code dealing with fraud.
Yesterday, I responded to an invitation to connect with someone on LinkedIn, who appeared to be a Lawyer (and later a liar:).
Even more, my “new connection” and I appeared to have in common 14 shared connection (this made it even more credible).
Today, I’ve received a LinkedIn message from that “new connection”, message that seems to be the old, classic, Nigerian-letter scam.
How it woks:
This scam usually begins with a letter or email purportedly sent to a selected recipient but actually sent to many, making an offer that would result in a large payoff for the victim. The email’s subject line often says something like “From the desk of barrister [X]”, “Your assistance is needed”, and so on. The details vary, but the usual story is that a person, often a government or bank employee, knows of a large amount of unclaimed money or gold which he cannot access directly, usually because he has no right to it. Such people, who may be real but impersonated people or fictitious characters played by the con artist, could include, for example, the wife or son of a deposed African leader or dictator who has amassed a stolen fortune, or a bank employee who knows of a terminally ill wealthy person with no relatives or a wealthy foreigner who deposited money in the bank just before dying in a plane crash (leaving no will or known next of kin), a US soldier who has stumbled upon a hidden cache of gold in Iraq, a business being audited by the government, a disgruntled worker or corrupt government official who has embezzled funds, a refugee, and similar characters. The money could be in the form of gold bullion, gold dust, money in a bank account, blood diamonds, a series of checks or bank drafts, and so forth. The sums involved are usually in the millions of dollars, and the investor is promised a large share, typically ten to forty percent, in return for assisting the fraudster to retrieve or expatriate the money. Although the vast majority of recipients do not respond to these emails, a very small percentage do, enough to make the fraud worthwhile, as many millions of messages can be sent daily.
Advice:
If you receive similar messages or invitations to connect be suspicious and always double check. The ingenious idea is that now scammers are using LinkedIn which is known as a social platform for professionals, which automatically give the scammer more credibility.
If you recently connected with this person PIUS AVENIDA, better delete her from your connections.
Any questions can be submitted to: dan@e-crimeexpert.com
Additional information can be found at: http://www.e-crimeexppert.com
To find out more about Dan Manolescu, visit his LinkedIn page here.
Hit the “subscribe” button in order to be notified when new videos and Articles are posted on this blog
Share this:
Important security settings on Facebook
Information security is important. Remember that: Without security there is no privacy!Today, E-Crime Expert presents several security measures Facebook has in place for securing your private data and account.
1. Change your password (Frequently)
i. Log on your Facebook Account, go to (click) “Settings” (1)and then click on “Account settings” (2) from the fold down menu(Fig.1).
Fig. 1
ii. Go to and select the “General Settings” menu on the left and then click on the “Edit” tab from the Password field (on the right side of the page). See Fig.2.
Fig. 2
iii. Now, you have to follow the three steps bellow:
-type your current password (for security reasons);
-type your new password (check this blog post here on how to have a strong password);
-type your new password again.
Click “Change password” and your password will be changed. (Fig.3).
Fig.3.
iv. In order to be sure your password is effectively changed on all your devices, select the “Log me out of other devices” box, click on the “Submit” button from the displayed message that appears after you changed your password. That will enable you to sign out from all the devices you are automaticaley logged on. In this way, once you use them again, you will be prompted to type your new password. This is an extra security measure which enables you to protect your information if one of your devices got lost or stollen or when it is shared with other people (Fig. 4).
Fig. 4.
2. Check your active sessions
i. You can also check from where you logged on your account lately.
Click on the “Security settings” tab (see pictures above for how to get there) on the left and then go to the right-bottom of the page and select “Edit” from the “Active sessions” menu (Fig.5)
Fig.5
ii. Now, you can check from where you are logged on during the current session (top of the page) and also, you can check bellow from where you were logged on in your previous sessions.
*Note: if you notice that you appeared logged on from countries you never been or you have not been lately or from devices you do not use that means someone else logged on your account without authorization (Fig.6).
**If you notice any unfamiliar devices or locations, click ‘End Activity’ to end the session and automatically log out someone who’s using your account fraudulently.
Change your password immediately as explained under section 1 of this Blog post!
Fig.6
3. Secure browsing.
i. Go to “Security settings“, as explained above, find the “Login Notifications” menu and click “Edit“. (Fig.7)
Fig.7
ii. Then you can select either “Email” or “Text message“. Or you can always select both! Click “Save changes“.
This will enable you to be notified via email or text message when your Facebook account is accessed from a device that you do not recognize (Fig.8).
Fig.8
iii. Furthermore, you could set up a Log in approval used when login into your account from unknown devices.
Go to “Security settings” (see above) and from there to “Login approvals” (bellow to “Login Notifications”). Click “Edit” and then select the box that reads: “Require a security code to access my account from unknown browsers“. Don’t forget to click “Save changes“. Now you are set for receiving notifications or be prompted a code (that will be delivered via your email or text message as a one-time token) before logging into your Facebook account, from unknown devices (Fig.9).
In order to learn what an unknown or unrecognized device means, keep reading this post bellow.
Fig.9
4. Recognized devices.
You can always set up the devices of your choice when using Facebook.
Go to “Security Settings” (as explained above), click “Edit” on the “Recognized Devices” menu and see which your recognized devices are. Devices will be assigned to your account as recognized when you will first time log on your Facebook account (using a new password) from a certain device (You will be prompted with a message whether you would like to save a certain devices as a recognized device or not). Be careful; do not select as a “Recognized Devices” a computer from school, work, public library or hotel. For this reason and in order to check which are your recognized devices check that menu and see if the devices listed there are the one you trust. If not, you just simply click “Remove” on the right side of a particular device (for example when there is listed a device you used once in a library).
Don’t forget to click “Save changes” as usually (Fig.10).
Fig.10
5. Trusted friends
i. To get set up, visit your “Security Settings” (as explained above), where you can select three to five friends to be your trusted contacts.
Find “Trusted contacts” and click on “Edit” and then on “Chose trusted contacts“(Fig. 11).
Fig.11
ii. Type the names of 3-5 of your trusted friends. You can select them one by one.
Don’t forget to click “Confirm” (Fig.12).
To select good trusted contacts:
– Choose people you trust, like friends you’d give a spare key to your house.
– Choose people you can reach without using Facebook, ideally over the phone or in person, since you’ll need to contact them when you can’t log in.
– Choose more people to help you. The more friends you choose, the more people who can help you when you need it.
Fig.12
iii. As a security measures you’ll be prompted to introduce your account password (even if you are already logged on). Click “Submit” after you are done ( Fig. 13).
Fig. 13
iv. Immediately after, your trusted friends will appear under “Trusted Contacts“. You can now use them all, remove one or all if not pleased with your choice (Fig.14).
Fig.14
v. In order to make sure you are the one who made the selection of your trusted friends, Facebook sends you a message (check your mailbox linked to your Facebook account) confirming you added trusted friends (Fig.15).
If you did not do it, then someone most likely hacked into your account. Change your password immediately!
Fig.15
vi. Using Trusted Contacts
Once you’ve set up your trusted contacts, if you ever have trouble logging in, you’ll have your trusted contacts as an option to help. You just need to call your trusted contacts and let them know you need their help to regain access to your account. Each of them can get a security code for you with instructions on how to help you. Once you get three security codes from your trusted contacts, you can enter them into Facebook to recover your account.
With trusted contacts, there’s no need to worry about remembering the answer to your security question or filling out long web forms to prove who you are. You can recover your account with help from your friends.
***Note: If you have set up your secure browsing, login notifications and chose your recognized devices and you receive an email from Facebook notifying you that someone tried to log on your account on X day from Y location using Z device (and none of those are related to you), then Change your password immediately (as explained under section 1 of this Blog post), because definitely someone tried or succeeded to fraudulently log into your account! (See example in Fig.16).
Fig.16
Any questions can be submitted to: dan@e-crimeexpert.com
Additional information can be found at: http://www.e-crimeexppert.com
To find out more about Dan Manolescu, visit his LinkedIn page here.
Hit the “subscribe” button in order to be notified when new videos and Articles are posted on this blog
Share this:
How to download your own data from Facebook
From the same series on how to access, delete, download, transfer your data when using a major Online Social Service (Facebook) or email Provider (i.e. Google, Yahoo), today E-Crime Expert explains how a user can have access and also download his/her data Facebook collects and keeps under that particular user account.
Follow the steps bellow if you would like to have access to the data Facebook holds under your account:
1. Log on Facebook and access the “Settings” tab. From there, click on the “Account settings” from the drop-down menu (Fig. 1).
Fig. 1.
2. Navigate to the “General Account Settings” tab and click on the “Download a copy of your Facebook data” (on the bottom of the page). Fig. 2.
Fig. 2.
3. You will be promoted with a message that enables you to download your data. Also, Facebook warns the users in regards to the sensitive character of the data under their personal Facebook account. Think twice before downloading your data if you do not trust the computer you are using (i.e. Public Library, etc.). If you do trust it, just click the “Download archive” button in order to get access to your data. Fig. 3.
Fig. 3.
4. Next, you will need to type your password again, even though you are logged into your account (for security reasons). After typing your password, click on the “Submit” button. (Fig. 4).
Fig.4.
5. Again, a message is displayed informing the user which data will be downloaded: Pictures, archives, messages, timeline posts, AND MORE! (Fig. 5).
Fig. 5.
6. Also, you can manually chose to select what data you would like to download such as: photos, messages, videos, etc. For this, click here and you will be automatically redirected to another page where you could select what data you want to download (Fig.6). Or you could also click on the “And more” tab as shown in Fig.5 above.
Fig.6.
7. Now, depending on your Operating System (i.e. Windows or Apple), or your Browser (i.e. Internet Explorer or Safari) and also on the time elapsed since you last requested your data from Facebook (if ever), your data will either start downloading immediately to your computer or it will be sent to the email address associated with your Facebook account. We are explaining bellow both possibilities:
I. Data starts downloading immediately.
After clicking the “Submit” button (see Fig. 4 above), you will be prompted to save your data on your computer. Chose a location you are familiar with and also which it is neither public nor shared with other users and click “Save”. Your data will start downloading automatically. (Fig.7).
Fig.7.
II. Data is sent to the email address associated with your Facebook account.
You will be prompted with another message called “Start my archive”. Click on it. (Fig. 8).
Fig.8.
-The email address associate with your Facebook account is displayed in order for the user to confirm that this is the right email address. If so, click on “Okay”. (Fig. 9).
Fig.9.
-Check your Inbox folder (under your email account) and click on the message received from Facebook. On the bottom of the message you will find a link similar to this: https://www.facebook.com/joe.doexfnr11……..Qdxwe…..rlaA9LVP. Click on it. (Fig. 10).
Fig.10.
-Again, be careful and chose a location you are familiar with and also which it is neither public nor shared with other users and click “Save”. Your data will start downloading automatically. The folder with your Facebook data will look like in the pictures bellow. (Fig. 11 and 12).
Fig. 11.
Fig.12.
Any questions can be submitted to: dan@e-crimeexpert.com
Additional information can be found at: http://www.e-crimeexppert.com
To find out more about Dan Manolescu, visit his LinkedIn page here.
Hit the “subscribe” button in order to be notified when new videos and Articles are posted on this blog
Share this:
Other Articles
Recent Articles
E-Crime Expert Tweets
Error: Twitter did not respond. Please wait a few minutes and refresh this page.