Knowledge (XXG)

Email fraud

Source đź“ť

320:: The victim is seeking a job and posts a resume on any internet job site. The scammer spots the resume and sends the victim an email claiming to be a legitimate job listing service, and claiming to have a client who is looking for an employee with their skills and experience. The victim is invited to click on a link to apply for the job. Clicking the link takes the victim to a job description specifically written for the skills and experience on the victim's resume, and provides a very high salary, and invites them to "click here" to apply for the job. If the victim clicks on that "apply" link, they are taken to an "application" form that asks for the normal job application information, PLUS the victim's social security number, date of birth, the name of the bank and account number where they will want their paycheck to be deposited to, a "relative" reference, etc. With this information, the scammer can open up a bank account in any on-line bank and utilize the victim's credit to buy items online and ship them to associates who are in on the scam. 294:: The intended victim is solicited via email to work as a 'secret shopper', often after the victim's resume has been posted at a job search site. Once engaged, the victim is sent a counterfeit check along with instructions and forms for work as a secret shopper. The provided instructions typically are to make several small transactions at nearby businesses, recording their experience on an official looking form. Universally is the instruction for the victim to also create a significant wire transfer, with a request to rate the experience. The counterfeit check is cashed at the unsuspecting victim's financial institution in order to accomplish the listed tasks. 237:: An email is sent to the victim's inbox, supposedly from a hitman who has been hired by a "close friend" of the recipient to kill him or her but will call off the hit in exchange for a large sum of money. This is usually backed up with a warning that if the victim informs local police or the FBI, the "hitman" will be forced to go through with the plan. This is less an advance-fee fraud and more outright extortion, but a reward can sometimes be offered in the form of the "hitman" offering to kill the man who ordered the original hit on the victim. 137:. Some spoof messages purport to be from an existing company, perhaps one with which the intended victim already has a business relationship. The 'bait' in this instance may appear to be a message from "the fraud department" of, for example, the victim's bank, which asks the customer to: "confirm their information"; "log in to their account"; "create a new password", or similar requests. Instead of being directed to the website they trust, they are referred to an identical looking page with a different URL. 258:: Usually this scam begins at an online dating site, and is quickly moved to personal email, online chat room, or social media site. Under this form, fraudsters (pretended males or females) build online relationships, and after some time, they ask for money from the victims. They claim the money is needed due to the fact they have lost their money (or their luggage was stolen), they have been beaten or otherwise harmed and they need to get out of the country to fly to the victim's country. 1773: 848: 224:: The intended victim is often told their name or email address was selected through a random computer ballot and sponsored by a marketing company. In order to claim their so-called winnings, the victim is asked to provide their bank account details and other personal information. The victim is asked to contact the claims agent or award department. 91:: 'phishing' involves sending thousands of emails claiming, for example, that an account has been compromised; 'spear phishing' typically involves targeted and personalized emails or messages designed to deceive specific individuals or organizations into revealing sensitive information or performing malicious actions. 272:
Death certificate scam: Person will get an obituary off Internet. Find out relatives related. Get their emails. Contact them with fake story of another family member near death, which of course, is only told in ambiguous language. It originates out of Ethiopia with the "makelawi" tag in the email,
156:
Items may be offered in advance of their actual availability. For instance, the latest video game may be offered prior to its release, but at a similar price to a normal sale. In this case, the "greed factor" is the desire to get something that nobody else has, and before everyone else can get it,
140:
After entering their log-in details, their username and password is visible to the perpetrators. In many cases, phishing emails can appear to be benign - for example, a message prompting the receiver that they have a new friend request on a social media platform. Regardless of how innocent the
110:
Email sent from someone pretending to be someone else is known as spoofing. Spoofing may take place in a number of ways. Common to all of them is that the actual sender's name and the origin of the message are concealed or masked from the recipient. Many instances of email fraud use at least
288:. When a victim is engaged, they ask for communication expenses such as translations, voice phone calls, video calls, "agency fees". They impersonate the brides instead of providing a matchmaking service to them. The real ladies may not be aware that someone is using their identity. 185:" or "Turkish Prisoner" scam. In its original form, this scheme has the con man purport to be in correspondence with a wealthy person who has been imprisoned under a false identity and is relying on the confidence artist to raise money to secure his release. The con man tells the " 327:
Counterfeit Invoice Ploy: You get an email with an invoice claiming you owe money for a product or service you never ordered. The email looks legitimate and includes the official logo of the business or school. Opening the attachment can potentially infect your computer with
173:
The "request for help" type of email fraud takes this form: an email is sent requesting help in some way. However, a reward is included for this help, which acts as a "hook". The reward may be a large amount of money, a treasure, or some artifact of supposedly great value.
265:
scam: After baiting an individual into intimate conversations, they are told to pay unless they want their conversations posted online and they are named a cheater. There are no reports from the FBI that indicate that the records are actually removed once payment has been
323:
PayPal scam: Fraudulent emails claiming the victim has been issued a payment to his/her account, however processing will be complete once the victim has sent the item he/she is selling to the individuals address. This scam is mostly common in selling items to individuals
230:
email: Claim to be an “official order” from the FBI’s Anti-Terrorist and Monetary Crimes Division, from an alleged FBI unit in Nigeria, confirm an inheritance, or contain a lottery notification, all informing recipients they have been named the beneficiary of millions of
144:
In a study, researchers concluded that cognitive reflection and sensation-seeking tendencies are modest but significant predictors of susceptibility to phishing. Additionally, participants who were pressured to make quick email legitimacy judgments made more errors.
164:
attempt to obtain the victim's credit card information, with the intent of using the information to fraudulently obtain goods or services, paid for by the hapless victim, who may not know they were scammed until their credit card has been "used up."
64:("con game", "scam", etc.). Some confidence tricks tend to exploit the inherent greed and dishonesty of its victims. The prospect of a 'bargain' or 'something for nothing' can be very tempting. Email fraud, as with other " 331:
Gift Card Scam: Someone has hacked into your close friend's email account, and you get a message from them asking for help buying gift cards. Kind-hearted people who are quick to help often fall victim to this
189:" (victim) that he is "allowed" to supply money, for which he should expect a generous reward when the prisoner returns. The confidence artist claims to have chosen the victim for their reputation for honesty. 68:", usually targets naĂŻve individuals who put their confidence in schemes to get rich quickly. These include 'too good to be true' investments or offers to sell popular items at 'impossibly low' prices. 153:
Email solicitations to purchase goods or services may be instances of attempted fraud. The fraudulent offer typically features a popular item or service, at a drastically reduced price.
345:
in email, simply opening an email can potentially alert the sender that the address to which the email is sent is a valid address. This can also happen when the mail is 'reported' as
1809: 2560: 240:
Investment schemes: Emails touting investments that promise high rates of return with little or no risk. One version seeks investors to help form an offshore bank. The
742: 300:
spam: Fraudulent emails claiming the recipient had been issued a traffic ticket. The spam, which spoofed a nyc.gov email address, claimed to be from the
201:
is a class of email fraud where employees with privileged access (such as to company finances) are deceived into making invalid payments or installing
1802: 1286: 378:
Not opening unexpected attachments, even if they appear to be from someone the user trusts. Many email fraudsters attach viruses or malware to emails.
2573: 349:, in some cases: if the email is forwarded for inspection, and opened, the sender will be notified in the same way as if the addressee opened it. 269:
Online business directory: Typically offering a free subscription to a non-existent directory with hefty fees for maintenance in the fine print.
252:
reports that, at the beginning of September 2006, over 33% of phishing scam emails being reported to McAfee were using Fifth Third Bank's brand.
1263: 1795: 2449: 1626: 1294: 735: 285: 129:
where an attacker sends a fraudulent (e.g., spoofed, fake, or otherwise deceptive) message designed to trick a person into revealing
1226: 1022: 2578: 2514: 2439: 1332: 1276: 314:
states that an anonymous person posted a secret about the recipient and that he needs to pay a fee in order to see the message.
157:
rather than a reduction in price. Of course, the item is never delivered, as it was not a legitimate offer in the first place.
2621: 2018: 1405: 284:. They can use pictures of real people from other websites. Typically they are aimed at foreign men looking for brides from 2459: 2254: 1868: 1089: 728: 126: 2143: 1958: 518: 2008: 1281: 1202: 1002: 452: 83:) into making an anticipated payment into the fraudster's account rather than the correct one. The method is known as 280:, they do not actually translate emails nor connect to real brides, but fabricate emails and create fake profiles on 2606: 2504: 2494: 2464: 2219: 2103: 1258: 1216: 872: 2555: 2534: 2479: 1973: 1119: 837: 198: 2529: 2334: 2123: 1104: 982: 877: 2611: 2499: 2354: 2183: 1192: 1144: 807: 307: 111:
spoofing, and as most frauds are clearly criminal acts, criminals typically try to avoid easy traceability.
660: 2429: 2193: 2158: 2133: 2013: 1978: 1913: 1766: 1570: 1467: 409: 2585: 2396: 1993: 1983: 1738: 1714: 1233: 967: 301: 130: 141:
message is in itself, it will always lead the victim to an imitation web page and false log-in prompt.
2469: 2289: 2279: 2148: 1375: 1253: 1165: 1114: 1059: 927: 900: 882: 847: 780: 751: 381:
Ignoring offers from unknown sources. The contents of an email are not a formal or binding agreement.
2550: 2224: 2198: 2163: 2088: 2023: 1948: 1709: 1477: 1325: 1037: 812: 770: 394: 471: 2524: 2419: 2359: 1938: 1933: 1753: 1472: 1221: 1149: 1054: 538: 499: 45:
as the vehicle. Almost as soon as email became widely used, it began to be used as a means to de
2616: 2565: 2274: 2173: 2038: 1561: 1435: 1269: 1027: 962: 912: 859: 817: 765: 600: 582: 491: 245: 385:
Many frauds go unreported to authorities, due to feelings of shame, guilt, or embarrassment.
2424: 2386: 2314: 2249: 2178: 2168: 2128: 2058: 1998: 1898: 1883: 1878: 1873: 1600: 1595: 1551: 1546: 1529: 1385: 1366: 1361: 1238: 1178: 942: 932: 827: 590: 572: 530: 483: 400: 241: 207: 182: 61: 2484: 2454: 2381: 2364: 2229: 2033: 1893: 1631: 1575: 1565: 1513: 1503: 1440: 1420: 1129: 1109: 832: 822: 277: 215: 2406: 2391: 2208: 2113: 2093: 2028: 1776: 1704: 1662: 1636: 1590: 1457: 1425: 1410: 1400: 1318: 1299: 1197: 1047: 997: 972: 937: 917: 797: 785: 595: 560: 424: 418: 297: 291: 133:
to the attacker or to deploy malicious software on the victim's infrastructure such as
105: 88: 76: 2600: 2519: 2489: 2319: 2118: 2083: 2068: 1923: 1903: 1835: 1694: 1667: 1646: 1580: 1508: 1445: 1356: 1209: 1170: 1139: 1134: 987: 977: 947: 542: 210:: Among the variations on this type of scam, are the Nigerian Letter also called the 186: 72: 2509: 2474: 2411: 2349: 2344: 2329: 2299: 2244: 2188: 2098: 2048: 1943: 1908: 1726: 1556: 1534: 1482: 1462: 1395: 1243: 1099: 802: 503: 255: 221: 577: 559:
Jones, Helen S.; Towse, John N.; Race, Nicholas; Harrison, Timothy (2019-01-16).
487: 369:
Noticing the several spelling errors in the body of the "official looking" email.
2434: 2376: 2294: 2264: 2239: 2153: 2078: 2073: 2063: 2053: 1963: 1888: 1850: 1748: 1684: 1677: 1672: 1610: 1430: 1183: 1017: 957: 792: 363: 281: 178: 639: 27:
Deception through email, made for personal gain or to damage another individual
2371: 2324: 2269: 2259: 2234: 2108: 2043: 1968: 1928: 1918: 1787: 1731: 1641: 1585: 1541: 1487: 1390: 1371: 1248: 1064: 1012: 895: 775: 311: 202: 134: 702: 681: 618: 586: 495: 1953: 1415: 1124: 1079: 1074: 922: 890: 519:"How persuasive is a phishing email? A phishing game for phishing awareness" 430: 317: 262: 211: 50: 38: 604: 17: 2339: 2309: 2138: 2003: 1988: 1450: 1084: 1042: 905: 346: 161: 120: 84: 561:"Email fraud: The search for psychological predictors of susceptibility" 1845: 1743: 1689: 1094: 1069: 1032: 720: 534: 342: 244:
brand, name, and logo have been frequently exploited in this scam. The
214:
fraud, Nigerian scam, Nigerian bank scam, or Nigerian money offer. The
412: â€“ Scam that promises high rates of return for a small investment 2444: 2304: 1007: 952: 867: 249: 234: 517:
Fatima, Rubia; Yasin, Affan; Liu, Lin; Wang, Jianmin (2019-10-11).
1840: 1605: 1342: 65: 46: 42: 1310: 1830: 1721: 1699: 54: 1791: 1314: 724: 41:
for either personal gain or to damage another individual using
227: 276:
Marriage agency scam: Pretending to be translation agency or
846: 372:
Ignoring unsolicited emails of all types and deleting them.
79:: the recipient is misled by falsified origin information ( 273:
but it can have de (German free email tag) along with it.
703:"Internet Crime Complaint Center's (IC3) – Scam Alerts" 414:
Pages displaying short descriptions of redirect targets
405:
Pages displaying short descriptions of redirect targets
2543: 2405: 2207: 1859: 1823: 1655: 1619: 1522: 1496: 1349: 1158: 858: 758: 80: 359:Keeping one's email address as secret as possible. 177:This type of scam has existed at least since the 433: â€“ Hidden images to track viewing of emails 682:"Internet Crime Complaint Center's Scam Alerts" 1803: 1326: 736: 421: â€“ Fraud or deception using the Internet 8: 403: â€“ Attempt to defraud a person or group 397: â€“ Federal crimes in the United States 2561:Criminal enterprises, gangs and syndicates 1810: 1796: 1788: 1333: 1319: 1311: 743: 729: 721: 427: â€“ To check if an email has been read 1287:Security information and event management 594: 576: 470:Jansson, K.; von Solms, R. (2011-11-09). 160:Such an offer may even be no more than a 443: 476:Behaviour & Information Technology 218:emblem is sometimes used in this scam. 1264:Host-based intrusion detection system 7: 2460:High-yield investment program (HYIP) 554: 552: 356:Not responding to suspicious emails. 2450:Foundation for New Era Philanthropy 1295:Runtime application self-protection 60:Email fraud can take the form of a 57:were used by previous generations. 71:Another form of email fraud is an 25: 1227:Security-focused operating system 619:"New E-Scams & Warnings. FBI" 472:"Phishing for phishing awareness" 1772: 1771: 1023:Insecure direct object reference 2515:Saradha Group financial scandal 1277:Information security management 352:Email fraud may be avoided by: 1: 1869:1992 Indian stock market scam 341:Due to the widespread use of 2144:Strip search phone call scam 1959:Extraterrestrial real estate 578:10.1371/journal.pone.0209684 523:Journal of Computer Security 488:10.1080/0144929X.2011.632650 2019:Intellectual property scams 2009:Indian coal allocation scam 1818:Scams and confidence tricks 1282:Information risk management 1203:Multi-factor authentication 759:Related security categories 705:. ic3.gov. October 17, 2011 286:the former Soviet countries 2638: 2505:Pyramid schemes in Albania 2465:Investors Overseas Service 2397:Website reputation ratings 1259:Intrusion detection system 1217:Computer security software 873:Advanced persistent threat 118: 103: 2535:Welsh Thrasher faith scam 2480:Madoff investment scandal 1974:Foreclosure rescue scheme 1762: 844: 838:Digital rights management 199:Business email compromise 2530:Stanford Financial Group 2335:Russian Business Network 2124:Slavery reparations scam 983:Denial-of-service attack 878:Arbitrary code execution 453:"What is Spear Phishing" 2500:Petters Group Worldwide 1193:Computer access control 1145:Rogue security software 808:Electromagnetic warfare 2194:White van speaker scam 2159:Technical support scam 2134:SSA impersonation scam 2089:Redemption/A4V schemes 2014:IRS impersonation scam 1979:Foreign exchange fraud 1239:Obfuscation (software) 968:Browser Helper Objects 852: 410:Get-rich-quick schemes 375:Not clicking on links. 125:Phishing is a type of 2622:Types of cyberattacks 1994:Get-rich-quick scheme 1984:Fortune telling fraud 1406:Intellectual property 1234:Data-centric security 1115:Remote access trojans 850: 684:. IC3.gov. 2012-10-23 302:New York State Police 131:sensitive information 2470:Kapa investment scam 2290:Internet vigilantism 2280:Email authentication 2255:Cryptocurrency scams 2149:Swampland in Florida 1166:Application security 1060:Privilege escalation 928:Cross-site scripting 781:Cybersex trafficking 752:Information security 663:. McAfee. 2006-09-01 661:"Top 10 Phish Scams" 337:Avoiding email fraud 2574:Film and television 2295:Lenny anti-scam bot 2199:Work-at-home scheme 2164:Telemarketing fraud 2024:Kansas City Shuffle 1949:Embarrassing cheque 813:Information warfare 771:Automotive security 640:"Hitman Bribe Scam" 395:Mail and wire fraud 75:technique known as 2525:Scott W. Rothstein 2420:Aman Futures Group 1939:Coin rolling scams 1934:Coin-matching game 1754:White-collar crime 1620:Government-related 1222:Antivirus software 1090:Social engineering 1055:Polymorphic engine 1008:Fraudulent dialers 913:Hardware backdoors 853: 535:10.3233/JCS-181253 127:social engineering 2607:Confidence tricks 2594: 2593: 2556:Confidence tricks 2275:Domain name scams 2174:Thai zig zag scam 2039:Miracle cars scam 1862:confidence tricks 1860:Notable scams and 1785: 1784: 1523:Financial-related 1308: 1307: 1270:Anomaly detection 1175:Secure by default 1028:Keystroke loggers 963:Drive-by download 851:vectorial version 818:Internet security 766:Computer security 246:computer security 169:Requests for help 37:) is intentional 16:(Redirected from 2629: 2425:Bernard Cornfeld 2387:Stock Generation 2315:Referer spoofing 2179:Three-card monte 2169:Thai tailor scam 2129:Spanish Prisoner 2059:Overpayment scam 1999:Green goods scam 1899:Black money scam 1884:Art student scam 1879:Advance-fee scam 1874:2G spectrum case 1812: 1805: 1798: 1789: 1775: 1774: 1350:Business-related 1335: 1328: 1321: 1312: 1179:Secure by design 1110:Hardware Trojans 943:History sniffing 933:Cross-site leaks 828:Network security 745: 738: 731: 722: 715: 714: 712: 710: 699: 693: 692: 690: 689: 678: 672: 671: 669: 668: 657: 651: 650: 648: 647: 636: 630: 629: 627: 626: 615: 609: 608: 598: 580: 556: 547: 546: 514: 508: 507: 467: 461: 460: 451:Myers, Brandon. 448: 415: 406: 401:Confidence trick 242:Fifth Third Bank 208:Advance-fee scam 183:Spanish Prisoner 181:, known as the " 82: 62:confidence trick 49:people, just as 21: 2637: 2636: 2632: 2631: 2630: 2628: 2627: 2626: 2597: 2596: 2595: 2590: 2539: 2485:Make Money Fast 2455:Franchise fraud 2410: 2401: 2382:Spoofing attack 2365:Scammer Payback 2213:countermeasures 2212: 2203: 1894:Bait-and-switch 1861: 1855: 1819: 1816: 1786: 1781: 1758: 1715:honest services 1651: 1615: 1518: 1492: 1345: 1339: 1309: 1304: 1154: 854: 842: 833:Copy protection 823:Mobile security 754: 749: 719: 718: 708: 706: 701: 700: 696: 687: 685: 680: 679: 675: 666: 664: 659: 658: 654: 645: 643: 638: 637: 633: 624: 622: 617: 616: 612: 571:(1): e0209684. 558: 557: 550: 516: 515: 511: 469: 468: 464: 450: 449: 445: 440: 413: 404: 391: 339: 310:: This type of 278:marriage agency 216:Nigerian Senate 195: 171: 151: 123: 117: 108: 102: 97: 28: 23: 22: 15: 12: 11: 5: 2635: 2633: 2625: 2624: 2619: 2614: 2612:Internet fraud 2609: 2599: 2598: 2592: 2591: 2589: 2588: 2583: 2582: 2581: 2576: 2568: 2563: 2558: 2553: 2547: 2545: 2541: 2540: 2538: 2537: 2532: 2527: 2522: 2517: 2512: 2507: 2502: 2497: 2492: 2487: 2482: 2477: 2472: 2467: 2462: 2457: 2452: 2447: 2442: 2437: 2432: 2427: 2422: 2416: 2414: 2403: 2402: 2400: 2399: 2394: 2392:Voice phishing 2389: 2384: 2379: 2374: 2369: 2368: 2367: 2362: 2357: 2352: 2342: 2337: 2332: 2327: 2322: 2317: 2312: 2307: 2302: 2297: 2292: 2287: 2282: 2277: 2272: 2267: 2262: 2257: 2252: 2247: 2242: 2237: 2232: 2227: 2225:Pig Butchering 2222: 2216: 2214: 2209:Internet scams 2205: 2204: 2202: 2201: 2196: 2191: 2186: 2181: 2176: 2171: 2166: 2161: 2156: 2151: 2146: 2141: 2136: 2131: 2126: 2121: 2116: 2114:Sick baby hoax 2111: 2106: 2101: 2096: 2094:Reloading scam 2091: 2086: 2081: 2076: 2071: 2066: 2061: 2056: 2051: 2046: 2041: 2036: 2031: 2029:Locksmith scam 2026: 2021: 2016: 2011: 2006: 2001: 1996: 1991: 1986: 1981: 1976: 1971: 1966: 1961: 1956: 1951: 1946: 1941: 1936: 1931: 1926: 1921: 1916: 1911: 1906: 1901: 1896: 1891: 1886: 1881: 1876: 1871: 1865: 1863: 1857: 1856: 1854: 1853: 1848: 1843: 1838: 1833: 1827: 1825: 1821: 1820: 1817: 1815: 1814: 1807: 1800: 1792: 1783: 1782: 1780: 1779: 1769: 1763: 1760: 1759: 1757: 1756: 1751: 1746: 1741: 1736: 1735: 1734: 1729: 1719: 1718: 1717: 1707: 1702: 1697: 1692: 1687: 1682: 1681: 1680: 1673:Counterfeiting 1670: 1665: 1659: 1657: 1653: 1652: 1650: 1649: 1644: 1639: 1634: 1629: 1623: 1621: 1617: 1616: 1614: 1613: 1608: 1603: 1598: 1593: 1588: 1583: 1578: 1573: 1568: 1559: 1554: 1549: 1544: 1539: 1538: 1537: 1526: 1524: 1520: 1519: 1517: 1516: 1511: 1506: 1500: 1498: 1497:Family-related 1494: 1493: 1491: 1490: 1485: 1480: 1475: 1470: 1465: 1460: 1455: 1454: 1453: 1448: 1443: 1433: 1428: 1423: 1418: 1413: 1408: 1403: 1398: 1393: 1388: 1383: 1378: 1376:Pharmaceutical 1369: 1364: 1359: 1353: 1351: 1347: 1346: 1340: 1338: 1337: 1330: 1323: 1315: 1306: 1305: 1303: 1302: 1300:Site isolation 1297: 1292: 1291: 1290: 1284: 1274: 1273: 1272: 1267: 1256: 1251: 1246: 1241: 1236: 1231: 1230: 1229: 1224: 1214: 1213: 1212: 1207: 1206: 1205: 1198:Authentication 1190: 1189: 1188: 1187: 1186: 1176: 1173: 1162: 1160: 1156: 1155: 1153: 1152: 1147: 1142: 1137: 1132: 1127: 1122: 1117: 1112: 1107: 1102: 1097: 1092: 1087: 1082: 1077: 1072: 1067: 1062: 1057: 1052: 1051: 1050: 1040: 1035: 1030: 1025: 1020: 1015: 1010: 1005: 1000: 998:Email spoofing 995: 990: 985: 980: 975: 970: 965: 960: 955: 950: 945: 940: 938:DOM clobbering 935: 930: 925: 920: 918:Code injection 915: 910: 909: 908: 903: 898: 893: 885: 880: 875: 870: 864: 862: 856: 855: 845: 843: 841: 840: 835: 830: 825: 820: 815: 810: 805: 800: 798:Cyberterrorism 795: 790: 789: 788: 786:Computer fraud 783: 773: 768: 762: 760: 756: 755: 750: 748: 747: 740: 733: 725: 717: 716: 694: 673: 652: 631: 610: 548: 529:(6): 581–612. 509: 482:(6): 584–593. 462: 442: 441: 439: 436: 435: 434: 428: 425:Email tracking 422: 419:Internet fraud 416: 407: 398: 390: 387: 383: 382: 379: 376: 373: 370: 367: 360: 357: 338: 335: 334: 333: 329: 325: 321: 315: 305: 298:Traffic ticket 295: 292:Secret shopper 289: 274: 270: 267: 259: 253: 238: 232: 225: 219: 205: 194: 191: 170: 167: 150: 147: 119:Main article: 116: 113: 106:Email spoofing 104:Main article: 101: 98: 96: 93: 89:spear phishing 77:email spoofing 26: 24: 14: 13: 10: 9: 6: 4: 3: 2: 2634: 2623: 2620: 2618: 2615: 2613: 2610: 2608: 2605: 2604: 2602: 2587: 2586:Ponzi schemes 2584: 2580: 2577: 2575: 2572: 2571: 2570:In the media 2569: 2567: 2564: 2562: 2559: 2557: 2554: 2552: 2549: 2548: 2546: 2542: 2536: 2533: 2531: 2528: 2526: 2523: 2521: 2520:Secret Sister 2518: 2516: 2513: 2511: 2508: 2506: 2503: 2501: 2498: 2496: 2493: 2491: 2490:Matrix scheme 2488: 2486: 2483: 2481: 2478: 2476: 2473: 2471: 2468: 2466: 2463: 2461: 2458: 2456: 2453: 2451: 2448: 2446: 2443: 2441: 2438: 2436: 2433: 2431: 2428: 2426: 2423: 2421: 2418: 2417: 2415: 2413: 2412:Ponzi schemes 2408: 2404: 2398: 2395: 2393: 2390: 2388: 2385: 2383: 2380: 2378: 2375: 2373: 2370: 2366: 2363: 2361: 2358: 2356: 2353: 2351: 2348: 2347: 2346: 2343: 2341: 2338: 2336: 2333: 2331: 2328: 2326: 2323: 2321: 2320:Ripoff Report 2318: 2316: 2313: 2311: 2308: 2306: 2303: 2301: 2298: 2296: 2293: 2291: 2288: 2286: 2283: 2281: 2278: 2276: 2273: 2271: 2268: 2266: 2263: 2261: 2258: 2256: 2253: 2251: 2248: 2246: 2243: 2241: 2238: 2236: 2233: 2231: 2228: 2226: 2223: 2221: 2218: 2217: 2215: 2210: 2206: 2200: 2197: 2195: 2192: 2190: 2187: 2185: 2182: 2180: 2177: 2175: 2172: 2170: 2167: 2165: 2162: 2160: 2157: 2155: 2152: 2150: 2147: 2145: 2142: 2140: 2137: 2135: 2132: 2130: 2127: 2125: 2122: 2120: 2119:SIM swap scam 2117: 2115: 2112: 2110: 2107: 2105: 2102: 2100: 2097: 2095: 2092: 2090: 2087: 2085: 2084:Pump and dump 2082: 2080: 2077: 2075: 2072: 2070: 2069:Pig in a poke 2067: 2065: 2062: 2060: 2057: 2055: 2052: 2050: 2047: 2045: 2042: 2040: 2037: 2035: 2032: 2030: 2027: 2025: 2022: 2020: 2017: 2015: 2012: 2010: 2007: 2005: 2002: 2000: 1997: 1995: 1992: 1990: 1987: 1985: 1982: 1980: 1977: 1975: 1972: 1970: 1967: 1965: 1962: 1960: 1957: 1955: 1952: 1950: 1947: 1945: 1942: 1940: 1937: 1935: 1932: 1930: 1927: 1925: 1924:Charity fraud 1922: 1920: 1917: 1915: 1912: 1910: 1907: 1905: 1904:Blessing scam 1902: 1900: 1897: 1895: 1892: 1890: 1887: 1885: 1882: 1880: 1877: 1875: 1872: 1870: 1867: 1866: 1864: 1858: 1852: 1849: 1847: 1844: 1842: 1839: 1837: 1836:Error account 1834: 1832: 1829: 1828: 1826: 1822: 1813: 1808: 1806: 1801: 1799: 1794: 1793: 1790: 1778: 1770: 1768: 1765: 1764: 1761: 1755: 1752: 1750: 1747: 1745: 1742: 1740: 1737: 1733: 1730: 1728: 1725: 1724: 1723: 1720: 1716: 1713: 1712: 1711: 1710:Mail and wire 1708: 1706: 1705:Impersonation 1703: 1701: 1698: 1696: 1695:Fraud factory 1693: 1691: 1688: 1686: 1683: 1679: 1676: 1675: 1674: 1671: 1669: 1666: 1664: 1661: 1660: 1658: 1654: 1648: 1645: 1643: 1640: 1638: 1635: 1633: 1630: 1628: 1625: 1624: 1622: 1618: 1612: 1609: 1607: 1606:Shill bidding 1604: 1602: 1599: 1597: 1594: 1592: 1589: 1587: 1584: 1582: 1579: 1577: 1574: 1572: 1569: 1567: 1563: 1560: 1558: 1555: 1553: 1550: 1548: 1545: 1543: 1540: 1536: 1533: 1532: 1531: 1528: 1527: 1525: 1521: 1515: 1512: 1510: 1507: 1505: 1502: 1501: 1499: 1495: 1489: 1486: 1484: 1481: 1479: 1478:Telemarketing 1476: 1474: 1471: 1469: 1466: 1464: 1461: 1459: 1456: 1452: 1449: 1447: 1446:Ghost network 1444: 1442: 1439: 1438: 1437: 1434: 1432: 1429: 1427: 1424: 1422: 1419: 1417: 1414: 1412: 1409: 1407: 1404: 1402: 1401:Impersonation 1399: 1397: 1394: 1392: 1389: 1387: 1384: 1382: 1379: 1377: 1373: 1370: 1368: 1365: 1363: 1360: 1358: 1355: 1354: 1352: 1348: 1344: 1336: 1331: 1329: 1324: 1322: 1317: 1316: 1313: 1301: 1298: 1296: 1293: 1288: 1285: 1283: 1280: 1279: 1278: 1275: 1271: 1268: 1265: 1262: 1261: 1260: 1257: 1255: 1252: 1250: 1247: 1245: 1242: 1240: 1237: 1235: 1232: 1228: 1225: 1223: 1220: 1219: 1218: 1215: 1211: 1210:Authorization 1208: 1204: 1201: 1200: 1199: 1196: 1195: 1194: 1191: 1185: 1182: 1181: 1180: 1177: 1174: 1172: 1171:Secure coding 1169: 1168: 1167: 1164: 1163: 1161: 1157: 1151: 1148: 1146: 1143: 1141: 1140:SQL injection 1138: 1136: 1133: 1131: 1128: 1126: 1123: 1121: 1120:Vulnerability 1118: 1116: 1113: 1111: 1108: 1106: 1105:Trojan horses 1103: 1101: 1100:Software bugs 1098: 1096: 1093: 1091: 1088: 1086: 1083: 1081: 1078: 1076: 1073: 1071: 1068: 1066: 1063: 1061: 1058: 1056: 1053: 1049: 1046: 1045: 1044: 1041: 1039: 1036: 1034: 1031: 1029: 1026: 1024: 1021: 1019: 1016: 1014: 1011: 1009: 1006: 1004: 1001: 999: 996: 994: 991: 989: 988:Eavesdropping 986: 984: 981: 979: 978:Data scraping 976: 974: 971: 969: 966: 964: 961: 959: 956: 954: 951: 949: 948:Cryptojacking 946: 944: 941: 939: 936: 934: 931: 929: 926: 924: 921: 919: 916: 914: 911: 907: 904: 902: 899: 897: 894: 892: 889: 888: 886: 884: 881: 879: 876: 874: 871: 869: 866: 865: 863: 861: 857: 849: 839: 836: 834: 831: 829: 826: 824: 821: 819: 816: 814: 811: 809: 806: 804: 801: 799: 796: 794: 791: 787: 784: 782: 779: 778: 777: 774: 772: 769: 767: 764: 763: 761: 757: 753: 746: 741: 739: 734: 732: 727: 726: 723: 704: 698: 695: 683: 677: 674: 662: 656: 653: 641: 635: 632: 620: 614: 611: 606: 602: 597: 592: 588: 584: 579: 574: 570: 566: 562: 555: 553: 549: 544: 540: 536: 532: 528: 524: 520: 513: 510: 505: 501: 497: 493: 489: 485: 481: 477: 473: 466: 463: 458: 454: 447: 444: 437: 432: 429: 426: 423: 420: 417: 411: 408: 402: 399: 396: 393: 392: 388: 386: 380: 377: 374: 371: 368: 365: 361: 358: 355: 354: 353: 350: 348: 344: 336: 330: 326: 322: 319: 316: 313: 309: 308:Word of Mouth 306: 303: 299: 296: 293: 290: 287: 283: 279: 275: 271: 268: 264: 260: 257: 254: 251: 247: 243: 239: 236: 233: 229: 226: 223: 220: 217: 213: 209: 206: 204: 200: 197: 196: 192: 190: 188: 184: 180: 175: 168: 166: 163: 158: 154: 148: 146: 142: 138: 136: 132: 128: 122: 114: 112: 107: 99: 94: 92: 90: 86: 78: 74: 73:impersonation 69: 67: 66:bunco schemes 63: 58: 56: 52: 48: 44: 40: 36: 32: 19: 2510:Reed Slatkin 2475:Kubus scheme 2355:Jim Browning 2350:419eater.com 2345:Scam baiting 2330:Romance scam 2300:Lottery scam 2284: 2245:Clickjacking 2189:Wash trading 2184:Trojan horse 2099:Return fraud 2049:Mock auction 1944:Drop swindle 1909:Bogus escrow 1535:lottery scam 1468:Tech support 1458:Racketeering 1380: 1244:Data masking 992: 803:Cyberwarfare 707:. Retrieved 697: 686:. Retrieved 676: 665:. Retrieved 655: 644:. Retrieved 642:. snopes.com 634: 623:. Retrieved 613: 568: 564: 526: 522: 512: 479: 475: 465: 456: 446: 384: 351: 340: 282:dating sites 256:Romance scam 222:Lottery scam 176: 172: 159: 155: 152: 149:Bogus offers 143: 139: 124: 109: 70: 59: 34: 30: 29: 2551:Con artists 2435:Dona Branca 2377:Spoofed URL 2285:Email fraud 2265:CyberThrill 2240:Click fraud 2154:Tarmac scam 2079:Pork barrel 2074:Pigeon drop 2064:Patent safe 2054:Moving scam 1964:Fiddle game 1914:Boiler room 1889:Badger game 1851:Sucker list 1824:Terminology 1685:Faked death 1678:Superdollar 1656:Other types 1596:Overpayment 1562:Credit card 1530:Advance-fee 1436:Health care 1184:Misuse case 1018:Infostealer 993:Email fraud 958:Data breach 793:Cybergeddon 709:October 26, 364:spam filter 179:Renaissance 31:Email fraud 18:Email scams 2601:Categories 2579:Literature 2440:Earl Jones 2372:ShadowCrew 2325:Rock Phish 2270:DarkMarket 2260:Cybercrime 2235:Catfishing 2109:Shell game 2044:Mismarking 1969:Fine print 1929:Clip joint 1919:Bride scam 1739:Scientific 1601:Securities 1586:Mismarking 1552:Chargeback 1547:Bankruptcy 1386:Employment 1367:Disability 1249:Encryption 1125:Web shells 1065:Ransomware 1013:Hacktivism 776:Cybercrime 688:2013-12-22 667:2006-09-01 646:2012-02-18 625:2012-02-18 457:PC Support 438:References 312:email spam 203:ransomware 135:ransomware 53:and paper 35:email scam 2566:Impostors 2220:Avalanche 2034:Long firm 1954:Exit scam 1632:Electoral 1576:Insurance 1514:Paternity 1504:Fertility 1441:fertility 1421:Long firm 1341:Types of 1080:Shellcode 1075:Scareware 923:Crimeware 883:Backdoors 621:. Fbi.gov 587:1932-6203 543:204538981 496:0144-929X 431:Spy pixel 318:Job Scams 263:extortion 51:telephony 39:deception 2617:Spamming 2340:SaferNet 2310:Phishing 2250:Cramming 2139:SSC Scam 2004:Hustling 1989:Gem scam 1777:Category 1663:Affinity 1637:Medicare 1591:Mortgage 1509:Marriage 1473:Slamming 1451:quackery 1426:Odometer 1411:Internet 1362:Cramming 1254:Firewall 1159:Defenses 1085:Spamming 1070:Rootkits 1043:Phishing 1003:Exploits 605:30650114 565:PLOS ONE 389:See also 362:Using a 343:web bugs 328:malware. 248:company 231:dollars. 162:phishing 121:Phishing 115:Phishing 100:Spoofing 85:phishing 2430:Caritas 2407:Pyramid 2360:Kitboga 2230:Carding 2104:Salting 1846:Shyster 1744:Spyware 1727:Romance 1690:Forgery 1668:Charity 1647:Welfare 1627:Benefit 1581:Lottery 1566:carding 1357:Billing 1095:Spyware 1038:Payload 1033:Malware 973:Viruses 953:Botnets 860:Threats 596:6334892 504:5472217 324:abroad. 304:(NYSP). 261:Dating 2445:Ezubao 2305:PayPai 1557:Cheque 1483:Weight 1463:Return 1396:Fixing 1289:(SIEM) 1266:(HIDS) 1150:Zombie 887:Bombs 868:Adware 603:  593:  585:  541:  502:  494:  250:McAfee 235:Hitman 2544:Lists 1841:Shill 1749:Vomit 1732:Bride 1571:Forex 1431:Phone 1381:Email 1343:fraud 1135:Worms 1130:Wiper 1048:Voice 896:Logic 539:S2CID 500:S2CID 332:scam. 266:made. 193:Other 95:Forms 81:From: 47:fraud 43:email 1831:Scam 1767:list 1722:Scam 1700:Hoax 1642:Visa 1564:and 1542:Bank 1488:Wine 1391:Food 1372:Drug 901:Time 891:Fork 711:2011 601:PMID 583:ISSN 492:ISSN 347:spam 187:mark 55:mail 33:(or 2495:MMM 2409:and 2211:and 1611:Tax 1416:Job 906:Zip 591:PMC 573:doi 531:doi 484:doi 228:FBI 212:419 87:or 2603:: 1374:/ 599:. 589:. 581:. 569:14 567:. 563:. 551:^ 537:. 527:27 525:. 521:. 498:. 490:. 480:32 478:. 474:. 455:. 1811:e 1804:t 1797:v 1334:e 1327:t 1320:v 744:e 737:t 730:v 713:. 691:. 670:. 649:. 628:. 607:. 575:: 545:. 533:: 506:. 486:: 459:. 366:. 20:)

Index

Email scams
deception
email
fraud
telephony
mail
confidence trick
bunco schemes
impersonation
email spoofing
phishing
spear phishing
Email spoofing
Phishing
social engineering
sensitive information
ransomware
phishing
Renaissance
Spanish Prisoner
mark
Business email compromise
ransomware
Advance-fee scam
419
Nigerian Senate
Lottery scam
FBI
Hitman
Fifth Third Bank

Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.

↑