Monday, February 28, 2011

Why Do I Have Wet Period?

CYBER FRAUD, STOLEN 500,000 PESOS OF A PRIVATE ACCOUNT AND HOW TO AVOID THIS TYPE OF CRIME

PUBLISHER: ANDRES PENACHINO

While "phishing" (a cyber scam) is a new form of theft worldwide, it is somewhat rare or unusual in our country. An example of this type of crime Rosario surprised today when businessman heading a cooling emptied her bank account .

apparently man allegedly hacked the password of home banking and transferred the money to other accounts in ten movements 50 000 weights via Internet. Some of those receiving the sum, withdrew the cash over the counter.

After making the complaint, four people were arrested of town for the event. Justice investigates how the money was distributed and how it came to various accounts in various banks.

Local media warned that is the first time in Rosario use this method to specify a scam . Speaking to the media Rosario, the judge hearing the case, Gustavo Pérez Urrechu said surprisingly "in two days I have emptied the account and the money has been derived other local and national banks. "

"All I can say is that I file a complaint for fraud, emptied the account of a businessman and money was referred to different accounts of different people. There were raids and were arrested, "confirmed the judge, told Radio 2 Rosario.El judge said some of those receiving the money could have been accepted in good faith. "They may be hackers or people who copied the key," he said.

FOLLOW THESE STEPS TO AVOID BEING A VICTIM OF THIS FRAUD:

NEVER:

Respond to emails, phone orders, sweepstakes or contests places not recognized .

answer e-mail warnings that do not show the sender's name and say "undisclosed recipient" in the

section addresses, also those leave your name blank and just say, "Dear" or "Dear" with no

named after, nor the messages that have many errors in grammar and / or confusing or strange English.

Email personal and confidential information including credit card numbers, accounts

bank, passwords, Social Security numbers, etc. Most Internet emails are NOT

insurance.

• Trust emails that look legitimate despite containing logos, photographs, copyright

or names of legitimate businesses.

Respond to emails, or messages or pop-ops requesting personal or financial information.

Click on any links in emails unknown which can connect to websites

suspects.

Update your personal information to e-mail orders.

• Cut and paste links unknown messages in your browser. These links give the appearance of being legitimate, but

are designed to obtain information.

Answer alleged recordings of business or government agencies that will leave a phone message asking that

call to update your information. "Phishing" also occurs by telephone. Using telephone technology cybernetics,

scammers ask for personal information and steal.

0 comments:

Post a Comment