320:: The victim is seeking a job and posts a resume on any internet job site. The scammer spots the resume and sends the victim an email claiming to be a legitimate job listing service, and claiming to have a client who is looking for an employee with their skills and experience. The victim is invited to click on a link to apply for the job. Clicking the link takes the victim to a job description specifically written for the skills and experience on the victim's resume, and provides a very high salary, and invites them to "click here" to apply for the job. If the victim clicks on that "apply" link, they are taken to an "application" form that asks for the normal job application information, PLUS the victim's social security number, date of birth, the name of the bank and account number where they will want their paycheck to be deposited to, a "relative" reference, etc. With this information, the scammer can open up a bank account in any on-line bank and utilize the victim's credit to buy items online and ship them to associates who are in on the scam.
294:: The intended victim is solicited via email to work as a 'secret shopper', often after the victim's resume has been posted at a job search site. Once engaged, the victim is sent a counterfeit check along with instructions and forms for work as a secret shopper. The provided instructions typically are to make several small transactions at nearby businesses, recording their experience on an official looking form. Universally is the instruction for the victim to also create a significant wire transfer, with a request to rate the experience. The counterfeit check is cashed at the unsuspecting victim's financial institution in order to accomplish the listed tasks.
237:: An email is sent to the victim's inbox, supposedly from a hitman who has been hired by a "close friend" of the recipient to kill him or her but will call off the hit in exchange for a large sum of money. This is usually backed up with a warning that if the victim informs local police or the FBI, the "hitman" will be forced to go through with the plan. This is less an advance-fee fraud and more outright extortion, but a reward can sometimes be offered in the form of the "hitman" offering to kill the man who ordered the original hit on the victim.
137:. Some spoof messages purport to be from an existing company, perhaps one with which the intended victim already has a business relationship. The 'bait' in this instance may appear to be a message from "the fraud department" of, for example, the victim's bank, which asks the customer to: "confirm their information"; "log in to their account"; "create a new password", or similar requests. Instead of being directed to the website they trust, they are referred to an identical looking page with a different URL.
258:: Usually this scam begins at an online dating site, and is quickly moved to personal email, online chat room, or social media site. Under this form, fraudsters (pretended males or females) build online relationships, and after some time, they ask for money from the victims. They claim the money is needed due to the fact they have lost their money (or their luggage was stolen), they have been beaten or otherwise harmed and they need to get out of the country to fly to the victim's country.
1773:
848:
224:: The intended victim is often told their name or email address was selected through a random computer ballot and sponsored by a marketing company. In order to claim their so-called winnings, the victim is asked to provide their bank account details and other personal information. The victim is asked to contact the claims agent or award department.
91:: 'phishing' involves sending thousands of emails claiming, for example, that an account has been compromised; 'spear phishing' typically involves targeted and personalized emails or messages designed to deceive specific individuals or organizations into revealing sensitive information or performing malicious actions.
272:
Death certificate scam: Person will get an obituary off
Internet. Find out relatives related. Get their emails. Contact them with fake story of another family member near death, which of course, is only told in ambiguous language. It originates out of Ethiopia with the "makelawi" tag in the email,
156:
Items may be offered in advance of their actual availability. For instance, the latest video game may be offered prior to its release, but at a similar price to a normal sale. In this case, the "greed factor" is the desire to get something that nobody else has, and before everyone else can get it,
140:
After entering their log-in details, their username and password is visible to the perpetrators. In many cases, phishing emails can appear to be benign - for example, a message prompting the receiver that they have a new friend request on a social media platform. Regardless of how innocent the
110:
Email sent from someone pretending to be someone else is known as spoofing. Spoofing may take place in a number of ways. Common to all of them is that the actual sender's name and the origin of the message are concealed or masked from the recipient. Many instances of email fraud use at least
288:. When a victim is engaged, they ask for communication expenses such as translations, voice phone calls, video calls, "agency fees". They impersonate the brides instead of providing a matchmaking service to them. The real ladies may not be aware that someone is using their identity.
185:" or "Turkish Prisoner" scam. In its original form, this scheme has the con man purport to be in correspondence with a wealthy person who has been imprisoned under a false identity and is relying on the confidence artist to raise money to secure his release. The con man tells the "
327:
Counterfeit
Invoice Ploy: You get an email with an invoice claiming you owe money for a product or service you never ordered. The email looks legitimate and includes the official logo of the business or school. Opening the attachment can potentially infect your computer with
173:
The "request for help" type of email fraud takes this form: an email is sent requesting help in some way. However, a reward is included for this help, which acts as a "hook". The reward may be a large amount of money, a treasure, or some artifact of supposedly great value.
265:
scam: After baiting an individual into intimate conversations, they are told to pay unless they want their conversations posted online and they are named a cheater. There are no reports from the FBI that indicate that the records are actually removed once payment has been
323:
PayPal scam: Fraudulent emails claiming the victim has been issued a payment to his/her account, however processing will be complete once the victim has sent the item he/she is selling to the individuals address. This scam is mostly common in selling items to individuals
230:
email: Claim to be an “official order” from the FBI’s Anti-Terrorist and
Monetary Crimes Division, from an alleged FBI unit in Nigeria, confirm an inheritance, or contain a lottery notification, all informing recipients they have been named the beneficiary of millions of
144:
In a study, researchers concluded that cognitive reflection and sensation-seeking tendencies are modest but significant predictors of susceptibility to phishing. Additionally, participants who were pressured to make quick email legitimacy judgments made more errors.
164:
attempt to obtain the victim's credit card information, with the intent of using the information to fraudulently obtain goods or services, paid for by the hapless victim, who may not know they were scammed until their credit card has been "used up."
64:("con game", "scam", etc.). Some confidence tricks tend to exploit the inherent greed and dishonesty of its victims. The prospect of a 'bargain' or 'something for nothing' can be very tempting. Email fraud, as with other "
331:
Gift Card Scam: Someone has hacked into your close friend's email account, and you get a message from them asking for help buying gift cards. Kind-hearted people who are quick to help often fall victim to this
189:" (victim) that he is "allowed" to supply money, for which he should expect a generous reward when the prisoner returns. The confidence artist claims to have chosen the victim for their reputation for honesty.
68:", usually targets naĂŻve individuals who put their confidence in schemes to get rich quickly. These include 'too good to be true' investments or offers to sell popular items at 'impossibly low' prices.
153:
Email solicitations to purchase goods or services may be instances of attempted fraud. The fraudulent offer typically features a popular item or service, at a drastically reduced price.
345:
in email, simply opening an email can potentially alert the sender that the address to which the email is sent is a valid address. This can also happen when the mail is 'reported' as
1809:
2560:
240:
Investment schemes: Emails touting investments that promise high rates of return with little or no risk. One version seeks investors to help form an offshore bank. The
742:
300:
spam: Fraudulent emails claiming the recipient had been issued a traffic ticket. The spam, which spoofed a nyc.gov email address, claimed to be from the
201:
is a class of email fraud where employees with privileged access (such as to company finances) are deceived into making invalid payments or installing
1802:
1286:
378:
Not opening unexpected attachments, even if they appear to be from someone the user trusts. Many email fraudsters attach viruses or malware to emails.
2573:
349:, in some cases: if the email is forwarded for inspection, and opened, the sender will be notified in the same way as if the addressee opened it.
269:
Online business directory: Typically offering a free subscription to a non-existent directory with hefty fees for maintenance in the fine print.
252:
reports that, at the beginning of
September 2006, over 33% of phishing scam emails being reported to McAfee were using Fifth Third Bank's brand.
1263:
1795:
2449:
1626:
1294:
735:
285:
129:
where an attacker sends a fraudulent (e.g., spoofed, fake, or otherwise deceptive) message designed to trick a person into revealing
1226:
1022:
2578:
2514:
2439:
1332:
1276:
314:
states that an anonymous person posted a secret about the recipient and that he needs to pay a fee in order to see the message.
157:
rather than a reduction in price. Of course, the item is never delivered, as it was not a legitimate offer in the first place.
2621:
2018:
1405:
284:. They can use pictures of real people from other websites. Typically they are aimed at foreign men looking for brides from
2459:
2254:
1868:
1089:
728:
126:
2143:
1958:
518:
2008:
1281:
1202:
1002:
452:
83:) into making an anticipated payment into the fraudster's account rather than the correct one. The method is known as
280:, they do not actually translate emails nor connect to real brides, but fabricate emails and create fake profiles on
2606:
2504:
2494:
2464:
2219:
2103:
1258:
1216:
872:
2555:
2534:
2479:
1973:
1119:
837:
198:
2529:
2334:
2123:
1104:
982:
877:
2611:
2499:
2354:
2183:
1192:
1144:
807:
307:
111:
spoofing, and as most frauds are clearly criminal acts, criminals typically try to avoid easy traceability.
660:
2429:
2193:
2158:
2133:
2013:
1978:
1913:
1766:
1570:
1467:
409:
2585:
2396:
1993:
1983:
1738:
1714:
1233:
967:
301:
130:
141:
message is in itself, it will always lead the victim to an imitation web page and false log-in prompt.
2469:
2289:
2279:
2148:
1375:
1253:
1165:
1114:
1059:
927:
900:
882:
847:
780:
751:
381:
Ignoring offers from unknown sources. The contents of an email are not a formal or binding agreement.
2550:
2224:
2198:
2163:
2088:
2023:
1948:
1709:
1477:
1325:
1037:
812:
770:
394:
471:
2524:
2419:
2359:
1938:
1933:
1753:
1472:
1221:
1149:
1054:
538:
499:
45:
as the vehicle. Almost as soon as email became widely used, it began to be used as a means to de
2616:
2565:
2274:
2173:
2038:
1561:
1435:
1269:
1027:
962:
912:
859:
817:
765:
600:
582:
491:
245:
385:
Many frauds go unreported to authorities, due to feelings of shame, guilt, or embarrassment.
2424:
2386:
2314:
2249:
2178:
2168:
2128:
2058:
1998:
1898:
1883:
1878:
1873:
1600:
1595:
1551:
1546:
1529:
1385:
1366:
1361:
1238:
1178:
942:
932:
827:
590:
572:
530:
483:
400:
241:
207:
182:
61:
2484:
2454:
2381:
2364:
2229:
2033:
1893:
1631:
1575:
1565:
1513:
1503:
1440:
1420:
1129:
1109:
832:
822:
277:
215:
2406:
2391:
2208:
2113:
2093:
2028:
1776:
1704:
1662:
1636:
1590:
1457:
1425:
1410:
1400:
1318:
1299:
1197:
1047:
997:
972:
937:
917:
797:
785:
595:
560:
424:
418:
297:
291:
133:
to the attacker or to deploy malicious software on the victim's infrastructure such as
105:
88:
76:
2600:
2519:
2489:
2319:
2118:
2083:
2068:
1923:
1903:
1835:
1694:
1667:
1646:
1580:
1508:
1445:
1356:
1209:
1170:
1139:
1134:
987:
977:
947:
542:
210:: Among the variations on this type of scam, are the Nigerian Letter also called the
186:
72:
2509:
2474:
2411:
2349:
2344:
2329:
2299:
2244:
2188:
2098:
2048:
1943:
1908:
1726:
1556:
1534:
1482:
1462:
1395:
1243:
1099:
802:
503:
255:
221:
577:
559:
Jones, Helen S.; Towse, John N.; Race, Nicholas; Harrison, Timothy (2019-01-16).
487:
369:
Noticing the several spelling errors in the body of the "official looking" email.
2434:
2376:
2294:
2264:
2239:
2153:
2078:
2073:
2063:
2053:
1963:
1888:
1850:
1748:
1684:
1677:
1672:
1610:
1430:
1183:
1017:
957:
792:
363:
281:
178:
639:
27:
Deception through email, made for personal gain or to damage another individual
2371:
2324:
2269:
2259:
2234:
2108:
2043:
1968:
1928:
1918:
1787:
1731:
1641:
1585:
1541:
1487:
1390:
1371:
1248:
1064:
1012:
895:
775:
311:
202:
134:
702:
681:
618:
586:
495:
1953:
1415:
1124:
1079:
1074:
922:
890:
519:"How persuasive is a phishing email? A phishing game for phishing awareness"
430:
317:
262:
211:
50:
38:
604:
17:
2339:
2309:
2138:
2003:
1988:
1450:
1084:
1042:
905:
346:
161:
120:
84:
561:"Email fraud: The search for psychological predictors of susceptibility"
1845:
1743:
1689:
1094:
1069:
1032:
720:
534:
342:
244:
brand, name, and logo have been frequently exploited in this scam. The
214:
fraud, Nigerian scam, Nigerian bank scam, or
Nigerian money offer. The
412: – Scam that promises high rates of return for a small investment
2444:
2304:
1007:
952:
867:
249:
234:
517:
Fatima, Rubia; Yasin, Affan; Liu, Lin; Wang, Jianmin (2019-10-11).
1840:
1605:
1342:
65:
46:
42:
1310:
1830:
1721:
1699:
54:
1791:
1314:
724:
41:
for either personal gain or to damage another individual using
227:
276:
Marriage agency scam: Pretending to be translation agency or
846:
372:
Ignoring unsolicited emails of all types and deleting them.
79:: the recipient is misled by falsified origin information (
273:
but it can have de (German free email tag) along with it.
703:"Internet Crime Complaint Center's (IC3) – Scam Alerts"
414:
Pages displaying short descriptions of redirect targets
405:
Pages displaying short descriptions of redirect targets
2543:
2405:
2207:
1859:
1823:
1655:
1619:
1522:
1496:
1349:
1158:
858:
758:
80:
359:Keeping one's email address as secret as possible.
177:This type of scam has existed at least since the
433: – Hidden images to track viewing of emails
682:"Internet Crime Complaint Center's Scam Alerts"
1803:
1326:
736:
421: – Fraud or deception using the Internet
8:
403: – Attempt to defraud a person or group
397: – Federal crimes in the United States
2561:Criminal enterprises, gangs and syndicates
1810:
1796:
1788:
1333:
1319:
1311:
743:
729:
721:
427: – To check if an email has been read
1287:Security information and event management
594:
576:
470:Jansson, K.; von Solms, R. (2011-11-09).
160:Such an offer may even be no more than a
443:
476:Behaviour & Information Technology
218:emblem is sometimes used in this scam.
1264:Host-based intrusion detection system
7:
2460:High-yield investment program (HYIP)
554:
552:
356:Not responding to suspicious emails.
2450:Foundation for New Era Philanthropy
1295:Runtime application self-protection
60:Email fraud can take the form of a
57:were used by previous generations.
71:Another form of email fraud is an
25:
1227:Security-focused operating system
619:"New E-Scams & Warnings. FBI"
472:"Phishing for phishing awareness"
1772:
1771:
1023:Insecure direct object reference
2515:Saradha Group financial scandal
1277:Information security management
352:Email fraud may be avoided by:
1:
1869:1992 Indian stock market scam
341:Due to the widespread use of
2144:Strip search phone call scam
1959:Extraterrestrial real estate
578:10.1371/journal.pone.0209684
523:Journal of Computer Security
488:10.1080/0144929X.2011.632650
2019:Intellectual property scams
2009:Indian coal allocation scam
1818:Scams and confidence tricks
1282:Information risk management
1203:Multi-factor authentication
759:Related security categories
705:. ic3.gov. October 17, 2011
286:the former Soviet countries
2638:
2505:Pyramid schemes in Albania
2465:Investors Overseas Service
2397:Website reputation ratings
1259:Intrusion detection system
1217:Computer security software
873:Advanced persistent threat
118:
103:
2535:Welsh Thrasher faith scam
2480:Madoff investment scandal
1974:Foreclosure rescue scheme
1762:
844:
838:Digital rights management
199:Business email compromise
2530:Stanford Financial Group
2335:Russian Business Network
2124:Slavery reparations scam
983:Denial-of-service attack
878:Arbitrary code execution
453:"What is Spear Phishing"
2500:Petters Group Worldwide
1193:Computer access control
1145:Rogue security software
808:Electromagnetic warfare
2194:White van speaker scam
2159:Technical support scam
2134:SSA impersonation scam
2089:Redemption/A4V schemes
2014:IRS impersonation scam
1979:Foreign exchange fraud
1239:Obfuscation (software)
968:Browser Helper Objects
852:
410:Get-rich-quick schemes
375:Not clicking on links.
125:Phishing is a type of
2622:Types of cyberattacks
1994:Get-rich-quick scheme
1984:Fortune telling fraud
1406:Intellectual property
1234:Data-centric security
1115:Remote access trojans
850:
684:. IC3.gov. 2012-10-23
302:New York State Police
131:sensitive information
2470:Kapa investment scam
2290:Internet vigilantism
2280:Email authentication
2255:Cryptocurrency scams
2149:Swampland in Florida
1166:Application security
1060:Privilege escalation
928:Cross-site scripting
781:Cybersex trafficking
752:Information security
663:. McAfee. 2006-09-01
661:"Top 10 Phish Scams"
337:Avoiding email fraud
2574:Film and television
2295:Lenny anti-scam bot
2199:Work-at-home scheme
2164:Telemarketing fraud
2024:Kansas City Shuffle
1949:Embarrassing cheque
813:Information warfare
771:Automotive security
640:"Hitman Bribe Scam"
395:Mail and wire fraud
75:technique known as
2525:Scott W. Rothstein
2420:Aman Futures Group
1939:Coin rolling scams
1934:Coin-matching game
1754:White-collar crime
1620:Government-related
1222:Antivirus software
1090:Social engineering
1055:Polymorphic engine
1008:Fraudulent dialers
913:Hardware backdoors
853:
535:10.3233/JCS-181253
127:social engineering
2607:Confidence tricks
2594:
2593:
2556:Confidence tricks
2275:Domain name scams
2174:Thai zig zag scam
2039:Miracle cars scam
1862:confidence tricks
1860:Notable scams and
1785:
1784:
1523:Financial-related
1308:
1307:
1270:Anomaly detection
1175:Secure by default
1028:Keystroke loggers
963:Drive-by download
851:vectorial version
818:Internet security
766:Computer security
246:computer security
169:Requests for help
37:) is intentional
16:(Redirected from
2629:
2425:Bernard Cornfeld
2387:Stock Generation
2315:Referer spoofing
2179:Three-card monte
2169:Thai tailor scam
2129:Spanish Prisoner
2059:Overpayment scam
1999:Green goods scam
1899:Black money scam
1884:Art student scam
1879:Advance-fee scam
1874:2G spectrum case
1812:
1805:
1798:
1789:
1775:
1774:
1350:Business-related
1335:
1328:
1321:
1312:
1179:Secure by design
1110:Hardware Trojans
943:History sniffing
933:Cross-site leaks
828:Network security
745:
738:
731:
722:
715:
714:
712:
710:
699:
693:
692:
690:
689:
678:
672:
671:
669:
668:
657:
651:
650:
648:
647:
636:
630:
629:
627:
626:
615:
609:
608:
598:
580:
556:
547:
546:
514:
508:
507:
467:
461:
460:
451:Myers, Brandon.
448:
415:
406:
401:Confidence trick
242:Fifth Third Bank
208:Advance-fee scam
183:Spanish Prisoner
181:, known as the "
82:
62:confidence trick
49:people, just as
21:
2637:
2636:
2632:
2631:
2630:
2628:
2627:
2626:
2597:
2596:
2595:
2590:
2539:
2485:Make Money Fast
2455:Franchise fraud
2410:
2401:
2382:Spoofing attack
2365:Scammer Payback
2213:countermeasures
2212:
2203:
1894:Bait-and-switch
1861:
1855:
1819:
1816:
1786:
1781:
1758:
1715:honest services
1651:
1615:
1518:
1492:
1345:
1339:
1309:
1304:
1154:
854:
842:
833:Copy protection
823:Mobile security
754:
749:
719:
718:
708:
706:
701:
700:
696:
687:
685:
680:
679:
675:
666:
664:
659:
658:
654:
645:
643:
638:
637:
633:
624:
622:
617:
616:
612:
571:(1): e0209684.
558:
557:
550:
516:
515:
511:
469:
468:
464:
450:
449:
445:
440:
413:
404:
391:
339:
310:: This type of
278:marriage agency
216:Nigerian Senate
195:
171:
151:
123:
117:
108:
102:
97:
28:
23:
22:
15:
12:
11:
5:
2635:
2633:
2625:
2624:
2619:
2614:
2612:Internet fraud
2609:
2599:
2598:
2592:
2591:
2589:
2588:
2583:
2582:
2581:
2576:
2568:
2563:
2558:
2553:
2547:
2545:
2541:
2540:
2538:
2537:
2532:
2527:
2522:
2517:
2512:
2507:
2502:
2497:
2492:
2487:
2482:
2477:
2472:
2467:
2462:
2457:
2452:
2447:
2442:
2437:
2432:
2427:
2422:
2416:
2414:
2403:
2402:
2400:
2399:
2394:
2392:Voice phishing
2389:
2384:
2379:
2374:
2369:
2368:
2367:
2362:
2357:
2352:
2342:
2337:
2332:
2327:
2322:
2317:
2312:
2307:
2302:
2297:
2292:
2287:
2282:
2277:
2272:
2267:
2262:
2257:
2252:
2247:
2242:
2237:
2232:
2227:
2225:Pig Butchering
2222:
2216:
2214:
2209:Internet scams
2205:
2204:
2202:
2201:
2196:
2191:
2186:
2181:
2176:
2171:
2166:
2161:
2156:
2151:
2146:
2141:
2136:
2131:
2126:
2121:
2116:
2114:Sick baby hoax
2111:
2106:
2101:
2096:
2094:Reloading scam
2091:
2086:
2081:
2076:
2071:
2066:
2061:
2056:
2051:
2046:
2041:
2036:
2031:
2029:Locksmith scam
2026:
2021:
2016:
2011:
2006:
2001:
1996:
1991:
1986:
1981:
1976:
1971:
1966:
1961:
1956:
1951:
1946:
1941:
1936:
1931:
1926:
1921:
1916:
1911:
1906:
1901:
1896:
1891:
1886:
1881:
1876:
1871:
1865:
1863:
1857:
1856:
1854:
1853:
1848:
1843:
1838:
1833:
1827:
1825:
1821:
1820:
1817:
1815:
1814:
1807:
1800:
1792:
1783:
1782:
1780:
1779:
1769:
1763:
1760:
1759:
1757:
1756:
1751:
1746:
1741:
1736:
1735:
1734:
1729:
1719:
1718:
1717:
1707:
1702:
1697:
1692:
1687:
1682:
1681:
1680:
1673:Counterfeiting
1670:
1665:
1659:
1657:
1653:
1652:
1650:
1649:
1644:
1639:
1634:
1629:
1623:
1621:
1617:
1616:
1614:
1613:
1608:
1603:
1598:
1593:
1588:
1583:
1578:
1573:
1568:
1559:
1554:
1549:
1544:
1539:
1538:
1537:
1526:
1524:
1520:
1519:
1517:
1516:
1511:
1506:
1500:
1498:
1497:Family-related
1494:
1493:
1491:
1490:
1485:
1480:
1475:
1470:
1465:
1460:
1455:
1454:
1453:
1448:
1443:
1433:
1428:
1423:
1418:
1413:
1408:
1403:
1398:
1393:
1388:
1383:
1378:
1376:Pharmaceutical
1369:
1364:
1359:
1353:
1351:
1347:
1346:
1340:
1338:
1337:
1330:
1323:
1315:
1306:
1305:
1303:
1302:
1300:Site isolation
1297:
1292:
1291:
1290:
1284:
1274:
1273:
1272:
1267:
1256:
1251:
1246:
1241:
1236:
1231:
1230:
1229:
1224:
1214:
1213:
1212:
1207:
1206:
1205:
1198:Authentication
1190:
1189:
1188:
1187:
1186:
1176:
1173:
1162:
1160:
1156:
1155:
1153:
1152:
1147:
1142:
1137:
1132:
1127:
1122:
1117:
1112:
1107:
1102:
1097:
1092:
1087:
1082:
1077:
1072:
1067:
1062:
1057:
1052:
1051:
1050:
1040:
1035:
1030:
1025:
1020:
1015:
1010:
1005:
1000:
998:Email spoofing
995:
990:
985:
980:
975:
970:
965:
960:
955:
950:
945:
940:
938:DOM clobbering
935:
930:
925:
920:
918:Code injection
915:
910:
909:
908:
903:
898:
893:
885:
880:
875:
870:
864:
862:
856:
855:
845:
843:
841:
840:
835:
830:
825:
820:
815:
810:
805:
800:
798:Cyberterrorism
795:
790:
789:
788:
786:Computer fraud
783:
773:
768:
762:
760:
756:
755:
750:
748:
747:
740:
733:
725:
717:
716:
694:
673:
652:
631:
610:
548:
529:(6): 581–612.
509:
482:(6): 584–593.
462:
442:
441:
439:
436:
435:
434:
428:
425:Email tracking
422:
419:Internet fraud
416:
407:
398:
390:
387:
383:
382:
379:
376:
373:
370:
367:
360:
357:
338:
335:
334:
333:
329:
325:
321:
315:
305:
298:Traffic ticket
295:
292:Secret shopper
289:
274:
270:
267:
259:
253:
238:
232:
225:
219:
205:
194:
191:
170:
167:
150:
147:
119:Main article:
116:
113:
106:Email spoofing
104:Main article:
101:
98:
96:
93:
89:spear phishing
77:email spoofing
26:
24:
14:
13:
10:
9:
6:
4:
3:
2:
2634:
2623:
2620:
2618:
2615:
2613:
2610:
2608:
2605:
2604:
2602:
2587:
2586:Ponzi schemes
2584:
2580:
2577:
2575:
2572:
2571:
2570:In the media
2569:
2567:
2564:
2562:
2559:
2557:
2554:
2552:
2549:
2548:
2546:
2542:
2536:
2533:
2531:
2528:
2526:
2523:
2521:
2520:Secret Sister
2518:
2516:
2513:
2511:
2508:
2506:
2503:
2501:
2498:
2496:
2493:
2491:
2490:Matrix scheme
2488:
2486:
2483:
2481:
2478:
2476:
2473:
2471:
2468:
2466:
2463:
2461:
2458:
2456:
2453:
2451:
2448:
2446:
2443:
2441:
2438:
2436:
2433:
2431:
2428:
2426:
2423:
2421:
2418:
2417:
2415:
2413:
2412:Ponzi schemes
2408:
2404:
2398:
2395:
2393:
2390:
2388:
2385:
2383:
2380:
2378:
2375:
2373:
2370:
2366:
2363:
2361:
2358:
2356:
2353:
2351:
2348:
2347:
2346:
2343:
2341:
2338:
2336:
2333:
2331:
2328:
2326:
2323:
2321:
2320:Ripoff Report
2318:
2316:
2313:
2311:
2308:
2306:
2303:
2301:
2298:
2296:
2293:
2291:
2288:
2286:
2283:
2281:
2278:
2276:
2273:
2271:
2268:
2266:
2263:
2261:
2258:
2256:
2253:
2251:
2248:
2246:
2243:
2241:
2238:
2236:
2233:
2231:
2228:
2226:
2223:
2221:
2218:
2217:
2215:
2210:
2206:
2200:
2197:
2195:
2192:
2190:
2187:
2185:
2182:
2180:
2177:
2175:
2172:
2170:
2167:
2165:
2162:
2160:
2157:
2155:
2152:
2150:
2147:
2145:
2142:
2140:
2137:
2135:
2132:
2130:
2127:
2125:
2122:
2120:
2119:SIM swap scam
2117:
2115:
2112:
2110:
2107:
2105:
2102:
2100:
2097:
2095:
2092:
2090:
2087:
2085:
2084:Pump and dump
2082:
2080:
2077:
2075:
2072:
2070:
2069:Pig in a poke
2067:
2065:
2062:
2060:
2057:
2055:
2052:
2050:
2047:
2045:
2042:
2040:
2037:
2035:
2032:
2030:
2027:
2025:
2022:
2020:
2017:
2015:
2012:
2010:
2007:
2005:
2002:
2000:
1997:
1995:
1992:
1990:
1987:
1985:
1982:
1980:
1977:
1975:
1972:
1970:
1967:
1965:
1962:
1960:
1957:
1955:
1952:
1950:
1947:
1945:
1942:
1940:
1937:
1935:
1932:
1930:
1927:
1925:
1924:Charity fraud
1922:
1920:
1917:
1915:
1912:
1910:
1907:
1905:
1904:Blessing scam
1902:
1900:
1897:
1895:
1892:
1890:
1887:
1885:
1882:
1880:
1877:
1875:
1872:
1870:
1867:
1866:
1864:
1858:
1852:
1849:
1847:
1844:
1842:
1839:
1837:
1836:Error account
1834:
1832:
1829:
1828:
1826:
1822:
1813:
1808:
1806:
1801:
1799:
1794:
1793:
1790:
1778:
1770:
1768:
1765:
1764:
1761:
1755:
1752:
1750:
1747:
1745:
1742:
1740:
1737:
1733:
1730:
1728:
1725:
1724:
1723:
1720:
1716:
1713:
1712:
1711:
1710:Mail and wire
1708:
1706:
1705:Impersonation
1703:
1701:
1698:
1696:
1695:Fraud factory
1693:
1691:
1688:
1686:
1683:
1679:
1676:
1675:
1674:
1671:
1669:
1666:
1664:
1661:
1660:
1658:
1654:
1648:
1645:
1643:
1640:
1638:
1635:
1633:
1630:
1628:
1625:
1624:
1622:
1618:
1612:
1609:
1607:
1606:Shill bidding
1604:
1602:
1599:
1597:
1594:
1592:
1589:
1587:
1584:
1582:
1579:
1577:
1574:
1572:
1569:
1567:
1563:
1560:
1558:
1555:
1553:
1550:
1548:
1545:
1543:
1540:
1536:
1533:
1532:
1531:
1528:
1527:
1525:
1521:
1515:
1512:
1510:
1507:
1505:
1502:
1501:
1499:
1495:
1489:
1486:
1484:
1481:
1479:
1478:Telemarketing
1476:
1474:
1471:
1469:
1466:
1464:
1461:
1459:
1456:
1452:
1449:
1447:
1446:Ghost network
1444:
1442:
1439:
1438:
1437:
1434:
1432:
1429:
1427:
1424:
1422:
1419:
1417:
1414:
1412:
1409:
1407:
1404:
1402:
1401:Impersonation
1399:
1397:
1394:
1392:
1389:
1387:
1384:
1382:
1379:
1377:
1373:
1370:
1368:
1365:
1363:
1360:
1358:
1355:
1354:
1352:
1348:
1344:
1336:
1331:
1329:
1324:
1322:
1317:
1316:
1313:
1301:
1298:
1296:
1293:
1288:
1285:
1283:
1280:
1279:
1278:
1275:
1271:
1268:
1265:
1262:
1261:
1260:
1257:
1255:
1252:
1250:
1247:
1245:
1242:
1240:
1237:
1235:
1232:
1228:
1225:
1223:
1220:
1219:
1218:
1215:
1211:
1210:Authorization
1208:
1204:
1201:
1200:
1199:
1196:
1195:
1194:
1191:
1185:
1182:
1181:
1180:
1177:
1174:
1172:
1171:Secure coding
1169:
1168:
1167:
1164:
1163:
1161:
1157:
1151:
1148:
1146:
1143:
1141:
1140:SQL injection
1138:
1136:
1133:
1131:
1128:
1126:
1123:
1121:
1120:Vulnerability
1118:
1116:
1113:
1111:
1108:
1106:
1105:Trojan horses
1103:
1101:
1100:Software bugs
1098:
1096:
1093:
1091:
1088:
1086:
1083:
1081:
1078:
1076:
1073:
1071:
1068:
1066:
1063:
1061:
1058:
1056:
1053:
1049:
1046:
1045:
1044:
1041:
1039:
1036:
1034:
1031:
1029:
1026:
1024:
1021:
1019:
1016:
1014:
1011:
1009:
1006:
1004:
1001:
999:
996:
994:
991:
989:
988:Eavesdropping
986:
984:
981:
979:
978:Data scraping
976:
974:
971:
969:
966:
964:
961:
959:
956:
954:
951:
949:
948:Cryptojacking
946:
944:
941:
939:
936:
934:
931:
929:
926:
924:
921:
919:
916:
914:
911:
907:
904:
902:
899:
897:
894:
892:
889:
888:
886:
884:
881:
879:
876:
874:
871:
869:
866:
865:
863:
861:
857:
849:
839:
836:
834:
831:
829:
826:
824:
821:
819:
816:
814:
811:
809:
806:
804:
801:
799:
796:
794:
791:
787:
784:
782:
779:
778:
777:
774:
772:
769:
767:
764:
763:
761:
757:
753:
746:
741:
739:
734:
732:
727:
726:
723:
704:
698:
695:
683:
677:
674:
662:
656:
653:
641:
635:
632:
620:
614:
611:
606:
602:
597:
592:
588:
584:
579:
574:
570:
566:
562:
555:
553:
549:
544:
540:
536:
532:
528:
524:
520:
513:
510:
505:
501:
497:
493:
489:
485:
481:
477:
473:
466:
463:
458:
454:
447:
444:
437:
432:
429:
426:
423:
420:
417:
411:
408:
402:
399:
396:
393:
392:
388:
386:
380:
377:
374:
371:
368:
365:
361:
358:
355:
354:
353:
350:
348:
344:
336:
330:
326:
322:
319:
316:
313:
309:
308:Word of Mouth
306:
303:
299:
296:
293:
290:
287:
283:
279:
275:
271:
268:
264:
260:
257:
254:
251:
247:
243:
239:
236:
233:
229:
226:
223:
220:
217:
213:
209:
206:
204:
200:
197:
196:
192:
190:
188:
184:
180:
175:
168:
166:
163:
158:
154:
148:
146:
142:
138:
136:
132:
128:
122:
114:
112:
107:
99:
94:
92:
90:
86:
78:
74:
73:impersonation
69:
67:
66:bunco schemes
63:
58:
56:
52:
48:
44:
40:
36:
32:
19:
2510:Reed Slatkin
2475:Kubus scheme
2355:Jim Browning
2350:419eater.com
2345:Scam baiting
2330:Romance scam
2300:Lottery scam
2284:
2245:Clickjacking
2189:Wash trading
2184:Trojan horse
2099:Return fraud
2049:Mock auction
1944:Drop swindle
1909:Bogus escrow
1535:lottery scam
1468:Tech support
1458:Racketeering
1380:
1244:Data masking
992:
803:Cyberwarfare
707:. Retrieved
697:
686:. Retrieved
676:
665:. Retrieved
655:
644:. Retrieved
642:. snopes.com
634:
623:. Retrieved
613:
568:
564:
526:
522:
512:
479:
475:
465:
456:
446:
384:
351:
340:
282:dating sites
256:Romance scam
222:Lottery scam
176:
172:
159:
155:
152:
149:Bogus offers
143:
139:
124:
109:
70:
59:
34:
30:
29:
2551:Con artists
2435:Dona Branca
2377:Spoofed URL
2285:Email fraud
2265:CyberThrill
2240:Click fraud
2154:Tarmac scam
2079:Pork barrel
2074:Pigeon drop
2064:Patent safe
2054:Moving scam
1964:Fiddle game
1914:Boiler room
1889:Badger game
1851:Sucker list
1824:Terminology
1685:Faked death
1678:Superdollar
1656:Other types
1596:Overpayment
1562:Credit card
1530:Advance-fee
1436:Health care
1184:Misuse case
1018:Infostealer
993:Email fraud
958:Data breach
793:Cybergeddon
709:October 26,
364:spam filter
179:Renaissance
31:Email fraud
18:Email scams
2601:Categories
2579:Literature
2440:Earl Jones
2372:ShadowCrew
2325:Rock Phish
2270:DarkMarket
2260:Cybercrime
2235:Catfishing
2109:Shell game
2044:Mismarking
1969:Fine print
1929:Clip joint
1919:Bride scam
1739:Scientific
1601:Securities
1586:Mismarking
1552:Chargeback
1547:Bankruptcy
1386:Employment
1367:Disability
1249:Encryption
1125:Web shells
1065:Ransomware
1013:Hacktivism
776:Cybercrime
688:2013-12-22
667:2006-09-01
646:2012-02-18
625:2012-02-18
457:PC Support
438:References
312:email spam
203:ransomware
135:ransomware
53:and paper
35:email scam
2566:Impostors
2220:Avalanche
2034:Long firm
1954:Exit scam
1632:Electoral
1576:Insurance
1514:Paternity
1504:Fertility
1441:fertility
1421:Long firm
1341:Types of
1080:Shellcode
1075:Scareware
923:Crimeware
883:Backdoors
621:. Fbi.gov
587:1932-6203
543:204538981
496:0144-929X
431:Spy pixel
318:Job Scams
263:extortion
51:telephony
39:deception
2617:Spamming
2340:SaferNet
2310:Phishing
2250:Cramming
2139:SSC Scam
2004:Hustling
1989:Gem scam
1777:Category
1663:Affinity
1637:Medicare
1591:Mortgage
1509:Marriage
1473:Slamming
1451:quackery
1426:Odometer
1411:Internet
1362:Cramming
1254:Firewall
1159:Defenses
1085:Spamming
1070:Rootkits
1043:Phishing
1003:Exploits
605:30650114
565:PLOS ONE
389:See also
362:Using a
343:web bugs
328:malware.
248:company
231:dollars.
162:phishing
121:Phishing
115:Phishing
100:Spoofing
85:phishing
2430:Caritas
2407:Pyramid
2360:Kitboga
2230:Carding
2104:Salting
1846:Shyster
1744:Spyware
1727:Romance
1690:Forgery
1668:Charity
1647:Welfare
1627:Benefit
1581:Lottery
1566:carding
1357:Billing
1095:Spyware
1038:Payload
1033:Malware
973:Viruses
953:Botnets
860:Threats
596:6334892
504:5472217
324:abroad.
304:(NYSP).
261:Dating
2445:Ezubao
2305:PayPai
1557:Cheque
1483:Weight
1463:Return
1396:Fixing
1289:(SIEM)
1266:(HIDS)
1150:Zombie
887:Bombs
868:Adware
603:
593:
585:
541:
502:
494:
250:McAfee
235:Hitman
2544:Lists
1841:Shill
1749:Vomit
1732:Bride
1571:Forex
1431:Phone
1381:Email
1343:fraud
1135:Worms
1130:Wiper
1048:Voice
896:Logic
539:S2CID
500:S2CID
332:scam.
266:made.
193:Other
95:Forms
81:From:
47:fraud
43:email
1831:Scam
1767:list
1722:Scam
1700:Hoax
1642:Visa
1564:and
1542:Bank
1488:Wine
1391:Food
1372:Drug
901:Time
891:Fork
711:2011
601:PMID
583:ISSN
492:ISSN
347:spam
187:mark
55:mail
33:(or
2495:MMM
2409:and
2211:and
1611:Tax
1416:Job
906:Zip
591:PMC
573:doi
531:doi
484:doi
228:FBI
212:419
87:or
2603::
1374:/
599:.
589:.
581:.
569:14
567:.
563:.
551:^
537:.
527:27
525:.
521:.
498:.
490:.
480:32
478:.
474:.
455:.
1811:e
1804:t
1797:v
1334:e
1327:t
1320:v
744:e
737:t
730:v
713:.
691:.
670:.
649:.
628:.
607:.
575::
545:.
533::
506:.
486::
459:.
366:.
20:)
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.