Consumer Fraud Reporting

Reporting on the Latest Frauds, Scams, Fake Lotteries, Spams and Hoaxes

index.php emailpageform.php governments.php

 

Recommended:
books


Recommended
AV product:

Consumer Fraud Reporting

Reporting on the Latest Frauds, Scams, Fake Lotteries, Spams and Hoaxes

index.php emailpageform.php governments.php

 

Recommended:
books


Recommended
AV product:

Consumer Fraud Reporting

Reporting on the Latest Frauds, Scams, Fake Lotteries, Spams and Hoaxes

index.php emailpageform.php governments.php

 

Recommended:
books


Recommended
AV product:

Consumer Fraud Reporting

Reporting on the Latest Frauds, Scams, Fake Lotteries, Spams and Hoaxes

index.php emailpageform.php governments.php Bookmark and Share
 

Recommended:
books


Recommended
AV product:

Consumer Fraud Reporting

Reporting on the Latest Frauds, Scams, Fake Lotteries, Spams and Hoaxes

index.php emailpageform.php governments.php Bookmark and Share
 

Recommended:
books


Recommended
AV product:

Consumer Fraud Reporting

Reporting on the Latest Frauds, Scams, Fake Lotteries, Spams and Hoaxes

index.php emailpageform.php governments.php Bookmark and Share
 

Recommended:
books


Recommended
AV product:

Consumer Fraud Reporting

Reporting on the Latest Frauds, Scams, Fake Lotteries, Spams and Hoaxes

index.php emailpageform.php governments.php Bookmark and Share
 

Recommended:
books


Recommended
AV product:

Consumer Fraud Reporting

Reporting on the Latest Frauds, Scams, Fake Lotteries, Spams and Hoaxes

index.php emailpageform.php governments.php Bookmark and Share
 

Recommended:
books


Recommended
AV product:

Consumer Fraud Reporting

Reporting on the Latest Frauds, Scams, Fake Lotteries, Spams and Hoaxes

index.php emailpageform.php governments.php Bookmark and Share
 

Recommended:
books


Recommended
AV product:

Consumer Fraud Reporting

Reporting on the Latest Frauds, Scams, Fake Lotteries, Spams and Hoaxes

index.php emailpageform.php governments.php Bookmark and Share
 

Recommended:
books


Recommended
AV product:

Consumer Fraud Reporting

Reporting on the Latest Frauds, Scams, Fake Lotteries, Spams and Hoaxes

index.php emailpageform.php governments.php Bookmark and Share
 

Recommended:
books


Recommended
AV product:

Consumer Fraud Reporting

Reporting on the Latest Frauds, Scams, Fake Lotteries, Spams and Hoaxes

index.php emailpageform.php governments.php Bookmark and Share
 

Recommended:
books


Recommended
AV product:

Consumer Fraud Reporting

Reporting on the Latest Frauds, Scams, Fake Lotteries, Spams and Hoaxes

index.php emailpageform.php governments.php Bookmark and Share
 

Recommended:
books


Recommended
AV product:

Consumer Fraud Reporting

Reporting on the Latest Frauds, Scams, Fake Lotteries, Spams and Hoaxes

index.php emailpageform.php governments.php Bookmark and Share
 

Recommended:
books


Recommended
AV product:

Virus Fraude / Hoaxes

anexo: Invitación, URGENTISIMOOOOOOOOOOOO !!! POR FAVOR, HAZ CIRCULAR ESTE AVISO A TUS AMISTADES, FAMILIA, CONTACTOS !!! ,
Es el peor virus anunciado por CNN. Un nuevo virus ha sido descubierto recientemente que ha sido clasificado por Microsoft como el virus mas destructivo que haya existido .

Timadores, a menudo hijos adolescentes, creo que es divertido pánico a la gente y llevar la internet a un rastreo con la cadena de cartas y de la chatarra. Un ejemplo común es la falsa alerta de virus, "anexo: Invitación", con el tema "URGENTISIMOOOOOOOOOOOO !!! POR FAVOR, HAZ CIRCULAR ESTE AVISO A TUS AMISTADES, FAMILIA, CONTACTOS !!! ".

Normalmente, el mensaje es enviado a una enorme lista de distribución. Se le insta a enviar a "a todos sus conocidos". El mensaje de correo advierte de que un nuevo virus ha sido detectado con el nombre, "anexo: Invitación". Y, a menudo, incluye algo así como "Es el peor virus anunciado por CNN. Un nuevo virus ha sido descubierto recientemente que ha sido clasificado por Microsoft como el virus mas destructivo que haya existido .".

Sí, los virus son una verdadera preocupación. Pero la gran mayoría de los mensajes de advertencia acerca de los virus, de hecho, son falsas alarmas. El estafador su objetivo es crear más correo basura que molestan a su familia y amigos, te hacen parecer más estúpido y obstruir la internet. En algunos casos, la advertencia contiene un virus, gusano, spyware, u otro malware, y remitiendo a sus amigos, usted está ayudando a infectar sus ordenadores!

La verdadera solución es sencilla: instalar un buen antivirus paquete, como Kapersky Norton o McAfee, y para mantenerla actualizada.

Y si usted recibe un mensaje como el siguiente, o de cualquier mensaje de correo electrónico que alerta sobre una amenaza de Internet, antes de remitirlo a sus amigos y familiares, hacer una simple búsqueda en Google por el nombre de los denominados virus, o la primera Frase del correo electrónico.

99% de las veces se dará cuenta de que es una estafa! La investigación de lo primero y no lo reenvíe a sus amigos, familiares y compañeros de trabajo, le ayudará a evitar busca tonto!

A continuación se muestra un ejemplo de una falsa alarma de alerta de virus:


Ejemplo de correo electrónico de la falsa alarma de alerta de virus, anexo: Invitación:

URGENTISIMOOOOOOOOOOOO !!!
 
 
POR FAVOR, HAZ CIRCULAR ESTE AVISO A TUS AMISTADES, FAMILIA, CONTACTOS !!!  
En los próximos días, debes estar atent@: No abras ningún mensaje con un archivo anexo llamado:  Invitación ,  
Independientemente de quien te lo envíe. Es un virus que abre   una antorcha olímpica que quema todo el disco duro C de la computadora. Este virus vendrá de una persona conocida que te  
Tenia en su lista de direcciones. Es por eso que debes enviar este mensaje a todos tus contactos. 
 
Es preferible recibir 25 veces este correo que recibir el virus y abrirlo. Si recibes el mensaje llamado: Invitación, aunque sea enviado por un amigo, no lo abras y apaga tu maquina inmediatamente. Es el peor virus anunciado por CNN.  Un nuevo virus ha sido descubierto recientemente que ha sido clasificado por Microsoft como el virus mas destructivo que haya existido . Este virus fue descubierto ayer por la tarde por Mc Afee. Y no hay arreglo aun para esta clase de virus. Este virus destruye simplemente el Sector Zero del Disco Duro, donde la información vital de su función es guardada.
 
 
ENVIA ESTE E-MAIL A QUIENES CONOZCAS. COPIA ESTE CORREO A UNO NUEVO Y MANDALO A TODOS TUS AMIGOS.
 
RECUERDA: 
SI LO ENVIAS A ELLOS, NOS BENEFICIAS A TODOS

 


Copyright CFR 2005, 2006, 2007, 2008, 2009, 2010  - Definition of scam, fraud, etc.Legal disclaimer / corrections / complaints  -  Privacy Policy
Names used by scammers in the examples on this page and others often belong to real people and businesses who often have no knowledge of nor connection to the scammer's use of their name and information.  Sample scam emails and other documents are copies of the scam to help potential victims recognize and avoid it.  You should presume that any names used and presented here in a scam are either fictitious or used without their legitimate owner's permission.
Email us at:

 

 


Copyright CFR 2005, 2006, 2007, 2008, 2009, 2010  - Definition of scam, fraud, etc.Legal disclaimer / corrections / complaints  -  Privacy Policy
Names used by scammers in the examples on this page and others often belong to real people and businesses who often have no knowledge of nor connection to the scammer's use of their name and information.  Sample scam emails and other documents are copies of the scam to help potential victims recognize and avoid it.  You should presume that any names used and presented here in a scam are either fictitious or used without their legitimate owner's permission.
Email us at:

 

 


Copyright CFR 2005, 2006, 2007, 2008, 2009, 2010  - Definition of scam, fraud, etc.Legal disclaimer / corrections / complaints  -  Privacy Policy
Names used by scammers in the examples on this page and others often belong to real people and businesses who often have no knowledge of nor connection to the scammer's use of their name and information.  Sample scam emails and other documents are copies of the scam to help potential victims recognize and avoid it.  You should presume that any names used and presented here in a scam are either fictitious or used without their legitimate owner's permission.
Email us at:

 

 


Copyright CFR 2005, 2006, 2007, 2008, 2009, 2010  - Definition of scam, fraud, etc.Legal disclaimer / corrections / complaints  -  Privacy Policy
Names used by scammers in the examples on this page and others often belong to real people and businesses who often have no knowledge of nor connection to the scammer's use of their name and information.  Sample scam emails and other documents are copies of the scam to help potential victims recognize and avoid it.  You should presume that any names used and presented here in a scam are either fictitious or used without their legitimate owner's permission.
Email us at:

 

 


Copyright CFR 2005, 2006, 2007, 2008, 2009, 2010  - Definition of scam, fraud, etc.Legal disclaimer / corrections / complaints  -  Privacy Policy
Names used by scammers in the examples on this page and others often belong to real people and businesses who often have no knowledge of nor connection to the scammer's use of their name and information.  Sample scam emails and other documents are copies of the scam to help potential victims recognize and avoid it.  You should presume that any names used and presented here in a scam are either fictitious or used without their legitimate owner's permission.
Email us at:

 

 


Copyright CFR 2005-2013  - Definition of scam, fraud, etc.Legal disclaimer / corrections / complaints  -  Privacy Policy
Names used by scammers in the examples on this page and others often belong to real people and businesses who often have no knowledge of nor connection to the scammer's use of their name and information.  Sample scam emails and other documents are copies of the scam to help potential victims recognize and avoid it.  You should presume that any names used and presented here in a scam are either fictitious or used without their legitimate owner's permission.
Email us at:

 

 


Copyright CFR 2005-2013  - Definition of scam, fraud, etc.Legal disclaimer / corrections / complaints  -  Privacy Policy
Names used by scammers in the examples on this page and others often belong to real people and businesses who often have no knowledge of nor connection to the scammer's use of their name and information.  Sample scam emails and other documents are copies of the scam to help potential victims recognize and avoid it.  You should presume that any names used and presented here in a scam are either fictitious or used without their legitimate owner's permission.
Email us at:

 

 


Copyright CFR 2005-2013  - Definition of scam, fraud, etc.Legal disclaimer / corrections / complaints  -  Privacy Policy
Names used by scammers in the examples on this page and others often belong to real people and businesses who often have no knowledge of nor connection to the scammer's use of their name and information.  Sample scam emails and other documents are copies of the scam to help potential victims recognize and avoid it.  You should presume that any names used and presented here in a scam are either fictitious or used without their legitimate owner's permission.
Email us at:

 

 


Copyright CFR 2005-2013  - Definition of scam, fraud, etc.Legal disclaimer / corrections / complaints  -  Privacy Policy
Names used by scammers in the examples on this page and others often belong to real people and businesses who often have no knowledge of nor connection to the scammer's use of their name and information.  Sample scam emails and other documents are copies of the scam to help potential victims recognize and avoid it.  You should presume that any names used and presented here in a scam are either fictitious or used without their legitimate owner's permission.
Email us at:

 

 


Copyright CFR 2005-2013  - Definition of scam, fraud, etc.Legal disclaimer / corrections / complaints  -  Privacy Policy
Names used by scammers in the examples on this page and others often belong to real people and businesses who often have no knowledge of nor connection to the scammer's use of their name and information.  Sample scam emails and other documents are copies of the scam to help potential victims recognize and avoid it.  You should presume that any names used and presented here in a scam are either fictitious or used without their legitimate owner's permission.
Email us at:

 

 


Copyright CFR 2005-2013  - Definition of scam, fraud, etc.Legal disclaimer / corrections / complaints  -  Privacy Policy
Names used by scammers in the examples on this page and others often belong to real people and businesses who often have no knowledge of nor connection to the scammer's use of their name and information.  Sample scam emails and other documents are copies of the scam to help potential victims recognize and avoid it.  You should presume that any names used and presented here in a scam are either fictitious or used without their legitimate owner's permission.
Email us at:

 

 


Copyright CFR 2005-2013  - Definition of scam, fraud, etc.Legal disclaimer / corrections / complaints  -  Privacy Policy
Names used by scammers in the examples on this page and others often belong to real people and businesses who often have no knowledge of nor connection to the scammer's use of their name and information.  Sample scam emails and other documents are copies of the scam to help potential victims recognize and avoid it.  You should presume that any names used and presented here in a scam are either fictitious or used without their legitimate owner's permission.
Email us at:

 

 


Copyright CFR 2005-2013  - Definition of scam, fraud, etc.Legal disclaimer / corrections / complaints  -  Privacy Policy
Names used by scammers in the examples on this page and others often belong to real people and businesses who often have no knowledge of nor connection to the scammer's use of their name and information.  Sample scam emails and other documents are copies of the scam to help potential victims recognize and avoid it.  You should presume that any names used and presented here in a scam are either fictitious or used without their legitimate owner's permission.
Email us at:

 

 


Copyright CFR 2005-2013  - Definition of scam, fraud, etc.Legal disclaimer / corrections / complaints  -  Privacy Policy
Names used by scammers in the examples on this page and others often belong to real people and businesses who often have no knowledge of nor connection to the scammer's use of their name and information.  Sample scam emails and other documents are copies of the scam to help potential victims recognize and avoid it.  You should presume that any names used and presented here in a scam are either fictitious or used without their legitimate owner's permission.
Email us at: