How to Spot Scam Emails

It used to be easy to spot scam emails. They were littered with grammatical and spelling errors, and their so-called Scammer Grammar was anything but what you’d expect from well-educated “barristers,” Nigerian kings or executives from respected American corporations. Well, the typos may remain - and not only because foreign-based fraudsters with weak command of English are often behind emails that hide malware-laden links or phish for sensitive information that could lead to identity theft. Now, tech-savvy tricksters are purposely misspelling certain words …

$25: What Scammers Pay for Your Identity

Consider it the law of Evil Economics: With the identity theft business booming, prices for stolen personal information sold on the black market have reached record low prices. “It’s simple supply and demand,” explains Jon Ramsey, chief technology officer at Dell SecureWorks, a division of the computer behemoth. “The identity theft business is so good that there’s a glut on the market” of everything crooks need to commit financial fraud. The result: It costs them less to obtain your stolen identity …

Beware of Fake Funeral Notices

With the latest malware campaign aimed at hijacking sensitive computer files and online accounts, scammers have sunk to a new low - specifically, six feet under. Cybercrooks are emailing fake funeral notifications. Stealing the names and logos of legitimate funeral homes, they appear to be an e-invite to a funeral or remembrance service for an unnamed friend or acquaintance. The gotcha is a link, alleged to provide details about the “upcoming celebration of your friend’s life service.” Click it and “instead …

1-Click Tricks in Valentine’s Day Scams

It’s not just hearts that are stolen come Valentine’s Day. Also at risk: Your money, identity and sensitive computer files and online accounts – thanks to the many opportunities to infect computers with malware this love-filled season. True, most attention – and the biggest financial losses – occurs with “long-con” romance scams. That’s when crooks (often part of overseas organized crime rings) scroll dating websites and chat rooms, inventing fake identities tailored to their victims’ interests. After weeks or months …

How Target-Like Breaches Occur (P.S. More Are Expected)

Maybe you are among the 110 million Target shoppers whose payment card or personal information was hacked during the recent holiday shopping season. Perhaps you are one of the 1 million-plus Neiman Marcus customers whose data was exposed in a 2013 breach just recently announced. Been to Michael’s lately? The arts and crafts retailer is the latest well-known company whose customer payment details were reportedly stolen in the same type of data breach. How are con artists doing it - and which …

Cyber Scam Predictions for 2014

As the year closes, leading online security vendors are looking into their crystal balls – or rather, reviewing recent trends of trickery – to predict the top cyber scams of 2014. Some notables worth a mention: TVs watching you. Many traditionally “dumb” devices are getting “smarter” – televisions, gaming systems and even baby monitors are being connected to the Internet and often contain cameras or microphones. So, many cybercops predict them to be a magnet for attack, such as remote spying. …