Skip to main content

Beware of Online Scammers on Valentine's Day

QUE.COM Beautiful WomenOnline Dating is more popular than ever and has lost much of the stigma it once held. A study by Pew Research found that a majority of Americans now say online dating is a good way to meet people. As online dating websites and apps become more popular than ever, it provides a golden opportunity for scammers and spammers to take advantage of unsuspecting men and women and make fast money through a variety of scams.

According to the National Cyber Security Alliance (NCSA) and McAfee (a beach-girl-in-bikiniNational Cyber Security Alliance board member), in a typical scam, the online scammer will create a fake online dating profilecomplete with attractive photos. Scammers then reach out one-on-one via email, chat, text or phone call trying to establish a relationship and thereby gain trust. Once trust is established, they may ask for money for a plane ticket to visit or to help them with a tragic incident. For instance, the scammer may say that they have a life threatening illness, or they need money to pay rent.
As Valentine’s Day quickly approaches, the Stop.Think.Connect. Campaign encourages you to take the following steps to protect yourself from online scams.
  • Recognize an online dating scam artist. Look for signs that your suitor may be only interested in your money – if they press you to leave the dating website you met through and to communicate using personal e-mail or instant messaging, profess instant feelings of love, or ask for money for a variety of suspicious reasons.
  • Protect yourself and your personal information. Limit the amount of personal information you post online and use privacy settings to avoid sharing information widely. Be careful of where and when you choose to meet someone you’ve met online. Pick public places, let others know where you are going beforehand, and be cautious of what personal information you provide about yourself early on in a date.
  • Be wary of "too good to be true" deals. Free flower bouquet offers, all-expense paid trips, free gift cards – if a deal sounds too good to be true, it probably is. Slow down and think twice before clicking on such deals, especially around holidays.
Visit DHS.gov/StopThinkConnect for more tips to avoid online scams.
Remember, True Love doesn't cost you a penny. If you know what I mean.
Source: www.king.net

Comments

Popular posts from this blog

Alternative Social Networks

If you are planning to create your  social network  e.g. similar to Facebook. Here's a short list of alternative software's: Open Source and Free​ http://buddypress.org/  - Wordpress (Open Source and Free) http://elgg.org/  - (Open Source and Free) Commercial Social Networks software http://www.socialengine.com/  ($299 Stand Alone, $29/mo Cloud) http://www.jomsocial.com/  (run with Joomla, need to know CMS) http://www.boonex.com/  (very expensive, $399 for Standard) http://www.anahitapolis.com/ http://www.oxwall.org/ http://sharetronix.com/ http://www.moosocial.com/ http://www.jcow.net/ http://phpdolphin.com http://www.grou.ps  (from free to Commercial, I left my networks and they are selling it  http://www.phpfox.com/  (I used this before, it's hard to maintain. I moved to NING but left too after it was sold to another company) http://www.ning.com  (I don't recommend using this service, it's hard to export your data when it's time to move) S

Learning Vulnerability Scanning by KING.NET

Learning Vulnerability Scanning is fun and easy. So I hope you enjoy reading this short how to guide on how to use vulnerability scanning to secure your servers and networks. NMAP is the swiss tool that you need to learn if you're serious in Cyber Security profession. The NMAP tool can be use with NSE scripting (Nmap Scripting Engine) to automate your tasks. For example using NSE Script using a  single vulnerability (cold fusion)  to scan our test lab machine. root@kali:~# nmap -v -p 80  --script http-vuln-cve2010-2861  10.11.1.220 Starting Nmap 6.47 ( http://nmap.org ) at 2016-07-22 17:34 EDT NSE: Loaded 1 scripts for scanning. NSE: Script Pre-scanning. Initiating ARP Ping Scan at 17:34 Scanning 10.11.1.220 [1 port] Completed ARP Ping Scan at 17:34, 0.04s elapsed (1 total hosts) Initiating Parallel DNS resolution of 1 host. at 17:34 Completed Parallel DNS resolution of 1 host. at 17:35, 13.01s elapsed Initiating SYN Stealth Scan at 17:35 Scanning 10.11.1.220 [1 port] Comp