6.What for the fraudsters need our personal details or identification cards?
The fraudsters ask your personal details to facilitate them to falsify
certain documents in order to influence the victim that she/he will
receive the millions of dollars involved in the scam. Where a victim
has to meet the fraudsters this information will be sent to the
accomplice who will meet the victim.
7.Will my personal information be used for any other purposes?
If the fraudsters have personal information of victims they
can use it for other purposes such as opening false accounts,
etc, although this happens rarely. Fraudsters generally
use the details to falsify documents to convince victims
and make them believe that they will receive the money.
8.Will fraudsters come after my family or me?
This is unheard of. But there may be chance of doing so;
generally they are too busy looking for new victims to go
chasing unwilling victims who show no attention in paying
their 'fees'.
9.Will the fraudsters stop mailing?
Probably it won’t stop. Once a fraudster has your
e-mail address, the information will be shared with other
fraudsters. You will keep receiving this type of mail. At
the same time your mail remains published on the Internet
it is available to more and more.
10.How 419 letters are distributed other than by email?
Nigerian
419 letters are occasionally posted and faxed to victims even
though this form of contact is infrequently used these days.
11.Is there a possibility I will recover any money from the fraudsters?
Highly implausible or the chance is very
small. Less than a day after parting with your money, these
fraudsters have already shared it with their accomplices.
The chance of recuperating any losses is almost 0%.
12.How can phishing attacks be avoided?
. try to stay off spam lists. Don't place your e-mail address on public sites. Create an e-mail address that is less likely to get included in spam lists. For instance, instead of bobjohon@xyz.com, use bob.johon.az@xyz.com.
. if an e-mail looks sensible contact the company directly if you receive an e-mail asking you to verify information. Type the address of the company into the address bar directly rather than click on a link. Or call them, but don't use any phone number presented in the e-mail.
. Change passwords regularly. Don't use the same password on multiple sites.
. frequently log into online accounts to monitor the activity and check statements.
. Use antivirus, antispam, and firewall software and keep your operating system and applications up-to-date.
13.What is The 'Nigerian' Purchase Scam?
You get an email from someone wanting to buy something from you/your website; he wants to pay by check and typically wants you to ship the products to his address in Lagos, Nigeria.
The alternative on this scam often involve:
.A payment via check is made, but some days later is returned by the bank on which it's drawn because it was fake. The scammer counts on your willingness to ship the product after your bank has (temporarily) cleared the check, and before the check has cleared its way through the whole international banking system.
. An "accidental" overpayment by the consumer, who asks you to deposit the check and then refund the amount of the "overpayment" when you ship the goods. You're out both the cost of the goods, and whatever "overpayment" you refund, when you find that the original check is made of rubber.
14.What is International Sweepstakes Lottery Scam?
A difference on the Nigerian 419 scam, the "You've won the lottery!" scam is an advance fee fraud where the victim is asked to put up a cash advance It will be responsible for largely by Nigerian scammers claiming to be located in Amsterdam, London, Hong Kong, Cape Town, etc.
You receive an email normally marked "CONGRATULATIONS!" or "confidential" which tells you you've won a lottery ,but that due to a "mix-up of lottery numbers" you need to keep this fact "secret" for now.
The scammer also wants your bank details or requests you to pay a sum of money for "processing" or "security" or "insurance." Any victim who pays the fee will never see their money again, yet the scammers may continue to ask for more and more money for various fees.
15.How can I reduce spam?
The University's email directory on the web takes steps to reduce the risk of addresses being cropped. The addresses are not displayed unless you go to a exact page and press a exact button.
You should take similar steps. If at all possible, you should not have an email address visible on a web page. This means that the helpful 'Mailto: links are likely to consequence in an increase in spam. Do not reply to spam messages.
16.What is GroupWise Junk Mail handling?
It provides functionality to help manage junk emails. With the introduction of new spam measures, where spam is now automatically sent to the Junk Mail folder, this functionality is no longer required.
17.What is SpamBayes?
The SpamBayes project is working on developing a statistical anti-spam filter, originally based on the work of Paul Graham. The major difference between this and other, similar projects is the stress on testing newer approaches to scoring messages. While most anti-spam projects are still working with the unique graham algorithm, we found that a number of alternate methods give way a more useful response.
The SpamBayes team tinkered with new algorithms, tweaking existing algorithms, and, most significantly, did huge test runs, slamming tens of thousands of messages against each other, in an attempt to enumerate whether or not a change to the system was helpful.
18.Is this a money laundering scheme?
No, there is no real money involved. This is purely a scam. 100% guaranteed.
The gift, the donation, the inheritance, the hidden funds in metal containers, the millions deposited with (fake) security companies -- they are all rubbers. The only real money involved in this scam is the one that is currently sitting in your bank account.
International money laundering, of course, does happen. However, I can assure you, that those complicated in laundering money will not be doing it by approaching a total unfamiliar person through Yahoo Mail.
19.What is the danger of answering these letters?
Attracting the concentration of criminals is harmful, even if they are in Nigeria or SA or Russia. worldwide crime is on the increase. Answering the gang and giving them details of your address and so on will single you out as a "soft target" to scams.
Even if you change your mind afterwards your address will be "sold" to other mobs.
However, until you have sent details of your bank account or sent money there is slight they can do. If you are in Nigeria and are threatened, contact your local embassy or consulate and ask for help.
If you do contact Nigeria Police, contact their Headquarters --avoid calling local branches.
20.The scam E-mail arrived from Hong King, India or from a country outside Africa how is that possible?
Up until recently, the mobs have used free web-based E-mail accounts such as Hotmail and Yahoo. These services are now straight away recognized as free web-based E-mail accounts.
The mobs are now switching to lesser-known free E-mail services. There are several large sound US companies who offer free E-mail accounts. Anyone can open an account.
21.How can I help fight the gangs?
Tell your friends about these scams. Western Governments should also place more force on African Governments to act against these gangs.
Do write to your Government and insist that they offer an efficient service to help avoid these types of criminal activities, and also to offer support for victims.
22.Isn't spam secured by national Free Speech laws?
No. Free speech assurance you the right to say what you want, within reason; it does not promise you a platform to make yourself heard in.
23.Isn't blocking spam restriction?
No. restriction is blocking information based on its content. Spam-blocking just keeps the content in its proper place. My local public library has a statement board where people can post for-sale ads and business cards; they would be rightfully upset at someone who inserted an advertising flyer inside every book on the shelves, which is the alike of posting a notice to every Usenet group.
24.Trade is on Usenet and the Internet to stay. Aren't anti-spammers just anti-commerce in disguise?
No. Protecting users from spam makes the Internet more favorable to trade, not less. Employers are more likely to let their employees read Usenet at work if the newsgroups remain modern and functional. Using e-mail for commerce is much easier if mailboxes aren't clogged with irrelevant material. People are much likelier to take Net business seriously if they don't think of the Net as a cesspool of scams, questionable products, and pyramid schemes.
25.Isn't spam just the same as business paper advertising (third class or 'junk mail)?
No. Third-class mailers pay a fee to allocate their materials. Spam is the alike of third-class mail that arrives postage-due. Real people pay real money, in the form of disk space charges, connect time, or even long-distance net connections, to transmit and receive junk e-mail and newsgroup postings.
26.What is phishing?
Phishing is a crack, usually via e-mail, to trick people into enlightening sensitive information like usernames, passwords, and credit card data by pretending to be a bank or some other legal entity. The e-mails typically include a link to a Web site that appears to be legitimate and which prompts users to give information. Sometimes, the phishing e-mail will contain a form in an attachment to fill out.
27.What are other recent examples of phishing attacks?
. A modern e-mail scam asks PayPal customers to present additional information or risk getting their account deleted because of changes in the service agreement. Recipients are urged to click on a hyperlink that says "Get Verified!"
. E-mails that look like they come from the FDIC include a topic line that says "check your Bank Deposit Insurance Coverage" or "FDIC has officially named your bank a failed bank." The e-mails contain a link to a fake FDIC site where visitors are prompted to open forms to fill out. Clicking on the form links downloads the Zeus virus, which is planned to steal bank passwords and other information.