TechnoNews

  • Subscribe to our RSS feed.
  • Twitter
  • StumbleUpon
  • Reddit
  • Facebook
  • Digg

Thursday, March 7, 2013

Internet Scams

Posted on 3:09 AM by Unknown
The Nigerian Letter Scam, also known as known as "419" Fraud is one of the most popular scams in the world. It has cheated hundreds of thousands of people and still draw in many victims. />
fraud was originally sent by a form of a letter and later developed as emails. Sent the claim to a relative of a senior Nigerian government officials who need help in transferring millions of dollars of Nigeria, and is a large part of the money the recipient is not. Asking then sends the recipient to provide some personal information, such as a blank stationery, bank name and account number, etc.., And claim that this information as necessary for the recipient is their cut. Sent even asks the recipient to pay a constant fee to pay bribes to get the money of the country. After some time, the receiver has again received several e-mails asking for more money for some ridiculous costs apparently "needed" to cause the transition. Some of the costs of the sender, expressive, taxes, bribes to government officials and attorneys' fees, all described in great detail and the receiver believes that the payment of the amount required to make. In fact, millions of dollars do not exist and the victim is left with nothing but drained bank account. Even worse, in some cases, the victim is asked to travel all the way to Nigeria to close the deal. The victim was then imprisoned. The Nigerian government is not friendly to the victims of the scheme, since the victim actually contrives to remove the money from Nigeria in a manner contrary to Nigerian law. />
Below is an example of the Nigerian letter scam. (Some content or specifications may vary from others.) />
Lagos, Nigeria.
Attention: The President / CEO />
Dear Sir, />
CONFIDENTIAL BUSINESS proposals />
HAVE consulted my colleagues and based on information gathered from the Nigerian Chambers of Commerce and Industry me. privileges for your support throughout $ 47,500,000.00 (forty $ 7.5 million), your request to transfer into account the above sum resulted from an OVER ACCOUNT AGREEMENT, commissioned and performed for five years (5) ago paid by a foreign The contractor is acting HOWEVER intentional and since then the funds in a suspense account in the Central Bank of Nigeria Apex Bank.
/> We are now ready to transfer the fund overseas and that is where you come to play. IT is important to inform you that the official WE Operate prohibits a foreign account, so we need YOUR help. Sum is divided as follows:. 70% FOR U.S., 25% for you and 5% for local and international events TRANSFER cost />
transfer risk to both sides. I am an accountant THE Nigerian National Petroleum Corporation (NNPC). Provided that the request is acceptable, we will require the following documents: />
(A) YOUR BANKER name, telephone, account and fax numbers.
/> (b) your private telephone and fax numbers? For confidentiality and easy communication.
/> (C) YOUR letterhead, stamped and signed. />
Alternatively we can offer you saying that the TEXT OF WHAT TO TYPE YOUR stationery, including a breakdown, consisting of what we need setting. Take U.S. business has achieved thirty (30) days.
/> Please respond urgently.
Sincerely />
/> The best way to prevent this type of fraud, ignore the letter. To respond in any way. You can delete them, or you can forward the letter to the authorities if you wish. If you know someone who got to know the characters, counseling him to do the same.
Email ThisBlogThis!Share to XShare to Facebook
Posted in Internet | No comments
Newer Post Older Post Home

0 comments:

Post a Comment

Subscribe to: Post Comments (Atom)

Popular Posts

  • Space with windows
    Whatever may retail space, one of the most important parts of your design, window space. The right place dressed from the very beginning, an...
  • Germany tops the European list of Cybercrime for maximum active bot
    Germany all the other European countries in cybercrime. In 2010 alone, Symantec discovered 286 million new global threats for businesses and...
  • Wireless Networking Equipment, A useful Guide
    Do you want to set up a wireless network? Imagine what kind of equipment is required for your wireless network? It is a very useful guide fo...
  • IT Disaster Recovery Quick Start Guide
    If you've ever spent a few days in the hope of recovering nerves vital data, you know that if your technology is not available, your bus...
  • Development delayed
    Every child follows a particular path of growth and development called milestone in the development. Developmental delay occurs when childre...
  • Remove PrivacyRight - Easy PrivacyRight from your computer
    What PrivacyRight? /> PrivacyRight rogue anti-spyware program. This means PrivacyRight a false application that pretends itself as a anti...
  • Science and Technology Interface
    The most important consideration should be the integration of science and technology. We have established the boundaries between science an...
  • Voltage controlled oscillator Fine-tuning of the Communication Systems division
    The technological world, communication Contact the geographical boundaries easier and faster help is not as easy as it sounds. Understand...
  • Nintendo developing
    If you look at the whole picture, you notice the gaming industry is a factor only for a short time, since the '70s. It took about a deca...
  • Features of E-Mail Encryption: Why do you use email encryption software
    In case depends on email for business, make sure that e-mail archiving software installed in your community. This plan can shield all the in...

Categories

  • Computing
  • Hardware
  • Internet
  • IT Management
  • Mobile Tech
  • Security
  • Servers
  • Software
  • Technology

Blog Archive

  • ▼  2013 (181)
    • ►  June (15)
    • ►  May (31)
    • ►  April (33)
    • ▼  March (32)
      • Open Source ERP for SMEs Now Popular
      • Some fascinating details about open source technology
      • Choosing the Right Data Center Infrastructure for ...
      • SECURITY redesign
      • How collaborative law can help
      • Wardrobe maintenance
      • Computer Network Security Planning and Disaster Re...
      • Learn all about the operating system of the computer
      • Wireless Networking Equipment, A useful Guide
      • Waterfront Development
      • Smart Security
      • CompTIA CTP + Certification: Your Career in conver...
      • Benefits of Using Collaboration Software Group
      • Doctor Malware Removal - How to Overcome Malware D...
      • Smart Grid ecosystem - Here Come the Tech Giants
      • Online Tech Support
      • Memory cards for mobile phones: Movable Mobile Memory
      • All Technology News Technology News and Technology...
      • The Story Behind Discount Pet Meds
      • Big Data Analytics Set Enterprise Data Management ...
      • Tech Tips Http :/ / techtips52.co.cc
      • Take the interference Property? Make S Locksmith C...
      • Wacom Bamboo Pen Tablet
      • Leadership Development Program Improve Leadership ...
      • Garmin Oregon 450 Handheld GPS Navigator
      • Internet Scams
      • Understanding the Virtual Server
      • Useful computer repair personal info?
      • New goal for chipmaker
      • Avaya Telephone Systems? Improve your communication
      • iPad app
      • Architectural hardware and door hardware provider ...
    • ►  February (29)
    • ►  January (41)
  • ►  2012 (45)
    • ►  December (45)
Powered by Blogger.

About Me

Unknown
View my complete profile