From this morning’s Tech Thoughts Daily Net News column – “Some of these campaigns consist of emails that are so effectively crafted that they could fool even some of the more advance users, while others look so obviously fake that they are spotted by all but the most inexperienced ones.”
Does this sound like “new” news to you? If, you’re a long time reader here – I suspect, not. Still, at the risk of sounding like a broken record – I’m reposting one of the most read posts from 2012, that can help users (especially less aware users), avoid being scammed online.
Yes, it’s repetitive – Yes, it’s repetitive – Yes, it’s repetitive! But that’s the point. In order to achieve a change in behavior (and, average users must change their online behavior) – repetition of the correct behavior, is fundamental to achieving that goal.
Cyber crooks and scam emails – a natural fit – aimed at the significant number of Internet users who remain unaware of the very real dangers that scam emails hold for their safety, security, identity – and, their wallet.
Cyber criminals are experts at crafting “attention grabbers” designed to reel in the unwary and undereducated Internet surfer. Here’s a few attention grabbers that consistently pay off – targeted towards the blissfully unaware Internet user. Especially those users who seem to have a natural tendency to “just click”.
Online shopping offers e.g. bargains from unknown stores.
Get rich quick schemes/work from home offers.
Offers to download mobile protection software.
Offers to download antivirus software.
Offers to win a prize e.g. answer this survey ‘for your chance to win’…
Movie offers e.g. search for a popular movie such as Twilight and an offer comes up to download the movie for free.
Occasionally, I’ll post an article directed at the “just click” crowd and, I can say without any hesitation – users who fall into this category of Internet user are ripe for the taking – it’s like picking apples from a tree. It couldn’t be easier.
Here’s a couple of past articles which continue to draw huge numbers of the “just click” crowd.
Nude Pics Of Your Wife/Girlfriend Attached – Click Here
Frankly, I fail to understand how anyone with a lick of common sense, would be drawn in by those nonsense article titles. On the other hand, maybe common sense has nothing to do with it.
It could just as easily be that innate sense of overconfidence that seems to have infected society as a whole – most particularly the “tech savvy” generation.
Mark Twain had it right, I think, when he said – “It aint what we don’t know that hurts us. It’s what we do know that ain’t so – that does.” The “tech savvy” generation in a nutshell – maybe.
My friends over a PC Tools, recognizing the continuing need to educate users, have put together a Top Tips article – How to Outsmart Online Scammers – designed to help the unwary (overconfident) Internet user, to identify online scams.
Richard Clooke, PC Tools online security expert reveals in this article – how to avoid being scammed online:
1. ASK – is this too good to be true?
$50 here, a holiday there, unlimited online offers from the world’s biggest brands – if you’re tempted by any of these free offers, then the answer is probably yes.
Many online scams trick us into revealing our personal information to secure something in return. It’s important to be aware of ‘fake offers’ to avoid being lured by savvy scammers.
2. DON’T – dish your details unless the site is secure.
Never provide personal or financial information in exchange for online offers. Details such as your mobile number, address, and credit card or banking details should never be entered on a non-secure site. When in doubt:
- Double check the URL before typing a link into your browser.
- Check there is a padlock icon in your browser before using your credit card online.
- Check you’re on a secure site and that the address starts with ‘HTTPS’.
3. THINK – it can happen to me.
Many of us think we are savvy online, but the reality is cybercriminals are cashing in on relaxed attitudes to sharing personal details online. Results from the PC Tools study also showed that most people think scams are more likely to happen to others, rather than themselves.
We need to educate ourselves about online scams and be aware of the risk.
4. DO – invest in scam protection software.
What most of us don’t realize is some online scams don’t involve malware and while traditional Internet security is still essential, we now require additional protection to prevent cybercriminals gaining personal information via other methods.
Regular readers here are familiar with this old request – still, it’s as pertinent as ever.
Be kind to your friends, relatives, and associates, particularly those who are inexperienced Internet users – let them know that there is an epidemic of this types of scam on the Internet. In doing so, you help raise the level of protection for all of us.
Tom Sanders SEO – A Bottom Feeding Specialist
Over the last 60 days or so, comment spam here has taken a huge jump. Not a big deal you might suppose – after all, with one or two clicks the damn stuff can be deleted. With 400 or more spam comments every day, I find that deletion is the only sane solution. Taking as little as 10 seconds to peruse each spam comment, would add roughly one hour of unproductive activity to an already full day.
So, the solution to this aggravation is simple enough (or, so it seems) – but, the downside to hitting the “Empty Spam” button is an increased risk of seemingly ignoring a reader’s comment which has been spam trapped. In terms of “blogging sins” – ignoring a reader’s comment, ranks well up on the list of grievous offenses.
The screen capture shown below (taken from my blog’s Dashboard several weeks ago), shows 259 spam comments awaiting moderation.
I have little doubt, that trapped within these fake comments (such as the one shown below), were bona fide readers’ comments which (as they normally do), would have expanded the scope of the relevant article. The power of reader comments to enhance, and round out an article, is a key feature of blogging in my estimation.
Which brings me to Tom Sanders (if that’s his real name). Tom is in the business of pissing people off. Tom, like so many of his competitors in the search engine optimization (SEO) business, is an unethical twit – a parasitic ignoramus who is content to feed off, and potentially damage, the works of others.
Sanders, and others like him, ignore the impact their SEO schemes (as illustrated in the following email dated October 13), are likely to have on web content providers. Slimy, sleazy practices, such as this, inevitably lead to an onslaught of spam email which the content provider is then forced to deal with.
Tom Sanders email@example.com to me (show details 6:32 AM (47 minutes ago)
Normally, I wouldn’t bother writing an article on what might be perceived to be a “so what” internal issue. Except, my good buddy Michael F., questioned me this morning as to whether I was knowingly rejecting his comments. Which, immediately raised the question – “how many other readers have encountered the same ‘rejection’ issue?”
If you have commented here, and then failed to receive an acknowledgement from me, please accept my apology. Tom Sanders (in reality, just another cyber criminal), and his leech-like SEO industry operatives, have created a bottleneck in the free flow of reader comments. Another obstacle to overcome – created by the marginal morons who slither through the Internet.
Just a passing note – There are bloggers (known to me), who regularly post “edited” spam comments passed off as legitimate comments. Sleeping with the enemy just about covers that. You (and you know who you are), need to give your head a shake.
If you found this article useful, why not subscribe to this Blog via RSS, or email? It’s easy; just click on this link and you’ll never miss another Tech Thoughts article.
Filed under blogging, Comment Spam, Cyber Crime, Cyber Criminals, Opinion, Point of View, SEO, spam
Tagged as Bill Mullins, blogging sins, comment spam, content, fake, feed off, key feature, marginal morons, parasitic ignoramus, potentially damage, Tech Thoughts, Tom Sanders