FTC Names Its Dirty Dozen: 12 Most Likely Email Scams

Written by Richard A. Chapo

The Federal Trade Commission is responsible for issuing and enforcing rules for consumer issues onrepparttar Internet. As part of this process,repparttar 146606 FTC has published a list ofrepparttar 146607 12 scams you are most likely to receive as email.

The Dirty Dozen Scams

The "dirty dozen" are:

1. Business opportunities

These business opportunities make it sound easy to start a business that will bring lots of income without much work or cash outlay. The solicitations trumpet unbelievable earnings claims $1,000 a day or more without doing any work. Many business opportunity solicitations claim to offer a way to make money in an Internet-related business. Short on details but long on promises, these messages usually offer a telephone number to call for more information. In many cases, you'll be told to leave your name and telephone number so that a salesperson can call you back withrepparttar 146608 sales pitch.

The scam: Many of these are illegal pyramid schemes masquerading as legitimate opportunities to earn money.

2. Bulk email

Bulk email solicitations offer to sell you lists of email addresses, byrepparttar 146609 millions, to which you can send your own bulk solicitations. Some offer software that automatesrepparttar 146610 sending of email messages to thousands or millions of recipients. Others offerrepparttar 146611 service of sending bulk email solicitations on your behalf. Some of these offers say, or imply, that you can make a lot of money using this marketing method.

The problem: Sending bulk email violatesrepparttar 146612 terms of service of most Internet service providers. If you use one ofrepparttar 146613 automated email programs, your ISP may shut you down. In addition, inserting a false return address into your solicitations, as some ofrepparttar 146614 automated programs allow you to do, may land you in legal hot water withrepparttar 146615 owner ofrepparttar 146616 address's domain name. There are also very strict rules, known asrepparttar 146617 CAN-SPAM Act, regulating bulk email marketing. 3. Chain letters

You're asked to send a small amount of money ($5 to $20) to each of four or five names on a list, replace one ofrepparttar 146618 names onrepparttar 146619 list with your own, and then forwardrepparttar 146620 revised message via bulk email. The letter may claim thatrepparttar 146621 scheme is legal, that it's been reviewed or approved byrepparttar 146622 government; or it may refer to sections of U.S. law that legitimizerepparttar 146623 scheme.

The scam: Chain letters are almost always illegal and nearly all ofrepparttar 146624 people who participate lose their money. The fact that a "product" such as a report on how to make money fast may be changing hands inrepparttar 146625 transaction does not changerepparttar 146626 legality of these schemes.

4. Work-at-home schemes

Envelope-stuffing solicitations promise steady income for minimal labor-for example, you'll earn $2 each time you fold a brochure and seal it in an envelope. Craft assembly work schemes often require an investment of hundreds of dollars in equipment or supplies, and many hours of your time producing goods for a company that has promised to buy them.

The scam: You'll pay a small fee to get started inrepparttar 146627 envelope-stuffing business. Then, you'll learn thatrepparttar 146628 email sender never had real employment to offer. Instead, you'll get instructions on how to sendrepparttar 146629 same envelope-stuffing ad on your own. If you earn any money, it will be from others who fall forrepparttar 146630 scheme you're perpetuating.

5. Health and diet scams

Pills that let you lose weight without exercising or changing your diet, herbal formulas that liquefy your fat cells so that they are absorbed by your body, and cures for impotence and hair loss are amongrepparttar 146631 scams flooding email boxes.

The scam: These gimmicks don't work. The fact is that successful weight loss requires a reduction in calories and an increase in physical activity. Beware of case histories from "cured" consumers claiming amazing results and testimonials from "famous" medical experts you've never heard of.

6. Effortless income

The trendiest get-rich-quick schemes offer unlimited profits exchanging money on world currency markets; newsletters describing a variety of easy-money opportunities;repparttar 146632 perfect sales letter; andrepparttar 146633 secret to making $4,000 in one day.

Hackers And Hoaxes

Written by Trina L.C. Schiller

Everyone who has an ISP, understands, or at least knows about how hackers use viruses, Trojans and other web nasties, to infect and mess up your computer. No headline news there. (Unfortunately, we still don't understand why they do it, or at least I don't.) But hackers don't have to write malicious code or hijack your browser to do some serious damage to your system. Oh no... A well written email with no attachments, can dorepparttar trick. They only have to start a rumor.

Hackers can easily manipulate you into trashing your own computer. All they have to do is begin a hoax.

What do I mean by that? Let me explain.

Have you ever gotten emails from people you know that say something like: Scan your hard drive for such and such a file! If you find it delete it immediately! Pass this on. Warn everyone you know!

These emails are originally generated by a hacker and spread throughoutrepparttar 146504 Internet to get you to delete files you need, thus creating havoc for your system. They are hoaxes.

Hoaxes work incredibly well for getting average people to cause their own computers to malfunction.repparttar 146505 hacker doesn't have to spend any time creating malicious code and a method of distribution, all they have to do is play onrepparttar 146506 human tendency for hysteria; send out a warning that something evil is spreading, and if you find it on your computer, get rid of it!

Recently I was tracking a thread on a forum, whererepparttar 146507 moderator warned everyone about a file that he found on his system that was a keylogger. (A keylogger is a malicious program designed to track your every move through monitoring your keystrokes.) He warned everyone to search for a file, ans2000.ini and, "deleterepparttar 146508 booger."

I scan my system every day, with several different virus/ spyware programs, and I never picked up this file with any of them, so I decided to do a Windows Explorer search for it. Sure enough, I found it on my hard drive. Oh My God!

Before hittingrepparttar 146509 delete key though, I looked it up onrepparttar 146510 web. I Googledrepparttar 146511 specific file and found quite a bit of information on it. The file ans2000.ini is used inrepparttar 146512 keylogger program known as ProBot SE. However, it is also used in many other legitimate programs as well. Ok, so now what do I do?

Cont'd on page 2 ==>
ImproveHomeLife.com © 2005
Terms of Use