Scams like these

If you didn't already know it , your phone can cost you in ways you never dreamed of !


1. LONG - TERM PARKING

Some people left their car in the long-term parking at the airport while away on holidays
and someone broke into the car.
Using the information on the car's registration in the glove compartment, they drove the
car to the people's home in the suburbs and robbed it.
So I guess if we are going to leave the car in long-term parking, we should NOT leave
the Registration documents and Road Service Company Membership in it, nor your
remote garage door opener.
This gives us something to think about with all our new electronic technology.



2. GPS UNITS:

Someone had their car broken into while they were at a football game.
Their car was parked on the grassed area which was adjacent to the football stadium and
specially allotted to football fans.

Things stolen from the car included a garage door remote control, some money and a
GPS which had been prominently mounted on the dashboard.
When the victims got home, they found that their house had been ransacked and just about
everything worth anything had been stolen.
The thieves had used the GPS to guide them to the house.
They then used the garage remote control to open the garage door and gain entry to the house.
The thieves knew the owners were at the football game, they knew what time the game was
scheduled to finish and so they knew how much time they had to clean out the house.
It would appear that they had brought a truck to empty the house of its contents.
Something to consider if you have a GPS - don't put your home address in it.
Put a nearby address (like a local shopping Mall or Petrol station) so you can still find your
way home if you need to, but no one else would know where you live if your GPS were stolen.



3. MOBILE PHONES:

I never thought of this!
This lady has now changed her habit of how she lists her names on her cell phone after her
handbag was stolen.
Her handbag, which contained her mobile phone, credit cards, wallet, etc., was stolen.
Twenty minutes later when she called her hubby, from a pay phone telling him what had
happened, hubby says: "I received your text asking about our Bank Card PIN and I've replied
a little while ago."
When they rushed down to the bank, the bank staff told them all the money was already
withdrawn.
The thief had actually used the stolen mobile phone to text 'hubby' in the contact list and
got hold of the pin number.
Within 20 minutes he had withdrawn all the money from their bank account.



Moral lesson:
A. Do not disclose the relationship between you and the people in your contact list.
Avoid using names like Home, Honey, Hubby, Sweetheart, Dad, Mom, etc.
B. And very importantly, when sensitive information is being asked through texts,
CONFIRM by calling back.
C. Also, when you're being texted by friends or family to meet them somewhere,
be sure to call back to confirm that the message came from them.
If you don't reach them, be very careful about going places to meet 'family and friends
who text you. It might NOT be them.



4. PURSE IN THE SHOPPING TROLLEY SCAM:
A lady went grocery-shopping at a local Shopping Centre and left her purse sitting in the
children's seat of the trolley while she reached something off a shelf.

Wait till you read the WHOLE story!

Her wallet was stolen, and she reported it to the store personnel.

After returning home, she received a phone call from the Shopping Centre's Security to
say that they had her wallet and that although there was no money in it, it did still hold her
personal papers.
She immediately went to pick up her wallet, only to be told by the Shopping Centre's Security
that they had not called her.
By the time she returned home again, her house had been broken into and burglarised.
The thieves knew that by calling and saying they were the Shopping Centre's Security,
they could lure her out of her house long enough for them to burglarise it.












No virus found in this message.
Checked by AVG - www.avg.com
Version: 2016.0.7294 / Virus Database: 4489/11380 - Release Date: 01/11/16












FREE Animations for your email - by IncrediMail
Click Here!





Image removed by sende
 
Well this seems to be the reason why they continue, you only need to get a few people to believe you.

http://www.abc.net.au/news/2016-01-19/ato-phone-scam-warning-in-canberra-with-victims-losing-$100k/7097404
 
Yes, my wife received this call. Called ATO straight away, on their listed number, to report as scam. She also did a phone number lookup as suggested by ATO to confirm scam.
 
Keep getting calls from 02 4349 1985 regarding "issues" on my computer. First time told them they a scam, hung up straight away.
Second time told them if called yesterday regarding their scam, they hanged up again.
Third time answered the phone with "Australian Federal Police, what's your enquire?", scammer didn't listen and I repeated "Australian Federal Police, what's your enquire?", there was a pause and click.
Fourth time they just hanged up straight away.
If they ring up for a fifth time, If I have I am going to let them give me the full sell... If I have the time.

Last time I had one of these calls, I asked how they knew I had a "virus". Guy says the computer had notified them. I asked him when was the last time they were notified by my computer, since I hadn't used it in about 3 months. We did a bit of a dance around whether the computer was notifying me or the "computer company". Until he realised I wanted to know the date and time that the computer notified them. Then he hung up.

Not fluent in English, eg leaves out "the" in "the rest of nuances." and " I work on this position for three years," no past tense and should have used "in" not On!
just noticed "
principal requirements " rather than principle. and that is quick read and response.

Principal is correct. As in the most important requirements, not the fundamental truth forming the basis for a system of belief of behaviour.

Still I do wonder if the job is to process a series of daily $0.01 payments...

If you didn't already know it , your phone can cost you in ways you never dreamed of !
3. MOBILE PHONES:

I never thought of this!
This lady has now changed her habit of how she lists her names on her cell phone after her
handbag was stolen.
Her handbag, which contained her mobile phone, credit cards, wallet, etc., was stolen.
Twenty minutes later when she called her hubby, from a pay phone telling him what had
happened, hubby says: "I received your text asking about our Bank Card PIN and I've replied
a little while ago."
When they rushed down to the bank, the bank staff told them all the money was already
withdrawn.
The thief had actually used the stolen mobile phone to text 'hubby' in the contact list and
got hold of the pin number.
Within 20 minutes he had withdrawn all the money from their bank account.



Moral lesson:
A. Do not disclose the relationship between you and the people in your contact list.
Avoid using names like Home, Honey, Hubby, Sweetheart, Dad, Mom, etc.
B. And very importantly, when sensitive information is being asked through texts,
CONFIRM by calling back.
C. Also, when you're being texted by friends or family to meet them somewhere,
be sure to call back to confirm that the message came from them.
If you don't reach them, be very careful about going places to meet 'family and friends
who text you. It might NOT be them.



Or just use a PIN on your phone
 
Well this seems to be the reason why they continue, you only need to get a few people to believe you.
I still don't understand how people part with $100,000 or even tens of thousands of dollars.

"I'll get back to you. Give me some time to gather the funds."
 
Well anything on the internet really. Poor fact checking by professional 'journalists' often see themselves come unstuck when a certain internet 'chan' wants to have a lark.
I still don't understand how ANYONE can trust anything on Facebook. so many dodgy things there. It can't be just a generational thing surely
 
any one seen this, I am not sure what it is, so I have been deleting it .

Hi Mr GPH


We have been fortunate enough to have a number of great holiday competitions made available to us to pass on recently.

But this competition has a unique advantage.

You can win a Gift Card for Jetstar worth $2,000 which means you can plan your own holiday.

Maybe take a trip to Hawaii?

What about a holiday in Fiji?

You could even go somewhere closer like a domestic location or New Zealand.

With a prize value of $2,000 it would be great for a short holiday to an exotic location or an indulgent few nights at a 5 star hotel.

Everyone can take advantage of this one.


Click Here Now to Enter and make sure you are in the running.


Good luck and have fun.

Chris

P.S. Remember to Click Here to enter the prize draw for the Jetstar Gift Card.
Suite 119
133 Alexander St
Crows Nest NSW 2065
AUSTRALIA
 
Last edited by a moderator:
Thought some her would like to read what an ASX100 company (one of our suppliers) sent us in their weekly email.

Must read: How Jennifer Aniston and [company name] made Friends. Find out how a chance celebrity meeting on a plane gave one adviser the ultimate client opportunity of a lifetime. Click on the following link to find out more: (link deleted)


When clicking on link (which did send me to their home page for signing in first); it reads:

[h=1]Cyber security[/h]Newsletter teaser - January 2016; How we made friends with Jennifer Anniston.........
Ooops...... out of curiosity, you have clicked on this link - phishing emails use the same triggers to catch you out! Take a look at the information we have collated in order to provide you with guidance when navigating the world of cyber security.
It seems like every time you read the news, another organisation has suffered a data breach. One of the most effective ways for attackers to gain unauthorised acccess to a business network is through phishing emails, in fact 91% of all breaches start with them, according to industry experts.
Cyber-crime has evolved substantially over the past ten years, whereby not all new malware (malicious software) can be dedected by anti-virus security products. This highlights the importance of operating and maintaining effective cyber security processes in your business.
Cyber security attacks have become a global pandemic. Although we have seen continued advances in technology controls to combat hackers, cyber-crime continues to evolve into a highly industrialised way for miscreants to commit fraud with relatively low risk. Over the past few years, we have witnessed arise in the use of social media sites such as LinkedIn and Facebook by cyber attackers to gather personal information on potential targets.
This information is then used to tailor personalised phishing emails to the intended target.
Once a victim has fallen for a phishing email and clicked on a link that installs malware (software which is specifically designed to disrupt or damage a computer system) on their machine, hackers can then gain further access into the victims network and connections. This method is highly developed and is offered as a service on black markets for anyone willing to pay for it. Often the malware is not blocked because the victim’s computer isn’t adequately protected which highlights the importance of keeping all computers and systems updated.
Click on the drop down listings below to learn more.

[h=2]People, Process, Technology[/h]
[h=2]People[/h]
  • Educate employees and promote awareness in order to prevent cyber attacks.
  • Actively encourage employees to adopt good IT security practices.
  • Increase awareness via testing, i.e. simulated phishing exercise.
  • Ensure appropriate escalation processes are in place in order to stop the spread of a cyber threat.
  • Ensure employees exercise caution when providing information to social networking sites. Ensure sensitive information is not provided to these sites.

[h=2]Process[/h]
  • Develop response plans to ensure a speedy resolution/control cyber attacks as quickly as possible.
  • Monitor licensee newsletters and national news to ensure that the latest security threats are communicated to employees promptly.
  • Review business practices around authentication and authorisation for customer transactions to identify gaps.
  • Review insurance coverage to ensure your business is covered sufficiently in the risk of a cyber attack.
  • Review external supplier security standards to ensure they meet with minimum cyber security standards.

[h=2]Technology[/h]
  • Examine and monitor existing IT security analytics and ensure that your technology and anti virus systems can provide this functionality.
  • Develop options and a future roadmap for technology based solutions to strengthen data security in your business.
  • Investigate the current IT security systems in your business to ensure they are adequate and minimise the risk of a cyber attack on your business.
  • Monitor and maintain your businesses social media presence, such as; facebook, Twitter, LinkedIn. Be vigilant and change passwords regularly.
  • Ensure all anti-virus software is kept up to date, and all IT equipment has the latest version of software and anti-virus software.




[h=2]Protecting your business from cyber-crime[/h]
Cyber risk can affect anyone, anywhere at any time. Threats of cyber risk can no longer be tackled by traditional IT security technologies alone. The response to the threat of a cyber security attack must therefore involve our people and business processes. Undetectable malicious software can be purchased through crime forums, with a guarantee from the seller that the malware is currently not detectable by popular antivirus security products. The product can then be further customised to allow the miscreant to use it for remote access in to the victim’s network, or to glean information, such as user credentials from keystroke logging (the ability to record every keystroke a user makes on their keyboard).

Cyber-risk-diagram.png

Many large organisations in Australia fight off up to 50,000 cyber-attacks every day. The best prepared businesses now recognise that this is not a technology issue, but a problem that needs to be jointly tackled through people, processes and technology. By being aware of the techniques by which attackers bypass technology controls and focus on targeting individuals, we can be more prepared.

Today’s attackers are not opportunists:

  • They have significant funding, are patient and sophisticated.
  • They target vulnerable people and processes, as well as technology.
  • They are constantly inventing new tools and techniques to enable them to get the information they want.
  • They are getting better at identifying gaps and unknown vulnerabilities in an organisations security.
Advanced threats now target people, so accordingly people have become our first line of defence. Cyber-attacks are a business and people problem, not just a technology problem.
User education and awareness are therefore critical to protecting ourselves, our customers, our colleagues and our business.


[h=2]Useful sites for additional support[/h]
There are a number of useful sites that provide some pragmatic best practice advice to protect your business against cyber crime;







 
I still don't understand how ANYONE can trust anything on Facebook. so many dodgy things there. It can't be just a generational thing surely

Look for the blue tick.

Having said that my 11 year old yesterday told us about how she applied to gain verified status on instagram :shock: because she wanted a nice looking blue tick next to her account. Fortunately, or perhaps unfortunately*, she cancelled the application when they told her the account would be deleted if they found out the application was not correct. Since she's not a celebrity she decided there was probably a fair chance that they would decide she wasn't a celebrity needing to be verified, therefore deleting her account.



* it might be better if she wasn't on the interweb experimenting with this stuff.
 
Read our AFF credit card guides and start earning more points now.

AFF Supporters can remove this and all advertisements

Help please AFF'ers. My 34 y.o.daughter has a Victoria Police bankcard. 2 weeks ago they contacted her saying there had been fraudulent activity and had cancelled her card, subsequently reissuing a new one. The amount was about $150 and was for an American company charging for a domain name. The amount has been reversed - but in American dollars leaving her with a shortfall of roughly $20 (I'm rounding amounts off here). Ever since she's also been pestered with dodgy calls daily on her mobile, mostly sounding Indian and trying to flog all manner of things. When she mentions the word fraud they quickly hang up.
Shouldn't the bank simply reverse the transaction - for the whole amount? How would her phone number suddenly be available - do you think it's possible that the bank's data has been accessed? It seems to us that that is the link to her details? And should this be reported elsewhere, to a govt agency? I've told her to contact the bank's cyber fraud section on Monday to tell them what's happened, but any further suggestions please. And is there any way to prevent the mobile calls? She's an estate agent so always has to answer her phone! Thanks
 
Carmen Duncan emailed me on Tuesday night saying exactly what she wanted that night.How did she know mrsdrron had gone to Sydney?

The next night I was awoken at 0100 by an SMS informing me I had won 2 million GBP in the Euro lottery-just send my bank account details.Maybe Carmen already knew of my win?
:lol:;):cool::shock:
 
Help please AFF'ers. My 34 y.o.daughter has a Victoria Police bankcard. 2 weeks ago they contacted her saying there had been fraudulent activity and had cancelled her card, subsequently reissuing a new one. The amount was about $150 and was for an American company charging for a domain name. The amount has been reversed - but in American dollars leaving her with a shortfall of roughly $20 (I'm rounding amounts off here). Ever since she's also been pestered with dodgy calls daily on her mobile, mostly sounding Indian and trying to flog all manner of things. When she mentions the word fraud they quickly hang up.
Shouldn't the bank simply reverse the transaction - for the whole amount? How would her phone number suddenly be available - do you think it's possible that the bank's data has been accessed? It seems to us that that is the link to her details? And should this be reported elsewhere, to a govt agency? I've told her to contact the bank's cyber fraud section on Monday to tell them what's happened, but any further suggestions please. And is there any way to prevent the mobile calls? She's an estate agent so always has to answer her phone! Thanks

Has she contacted the bank about this, as in she rings them? I've had "the bank" call me about fraudulent activity on my account and then start asking for a whole heap of secret information. When the bank called her did she give out account details, customer reference numbers, that sort of thing? Possibly unlikely if there has been a reversal. But are you sure that reversal was because of the bank or perhaps the fraudster, who did the call, sent a credit back to the card. Now ready to smash the card later.

I did have an experience of a small transaction (a few $) that was reversed on the same statement. Then the next month $3000 of fake purchases. Slightly different in that I didn't have a phone call like your daughter.
 
Last edited:
Help please AFF'ers. My 34 y.o.daughter has a Victoria Police bankcard. 2 weeks ago they contacted her saying there had been fraudulent activity and had cancelled her card, subsequently reissuing a new one. The amount was about $150 and was for an American company charging for a domain name. The amount has been reversed - but in American dollars leaving her with a shortfall of roughly $20 (I'm rounding amounts off here). Ever since she's also been pestered with dodgy calls daily on her mobile, mostly sounding Indian and trying to flog all manner of things. When she mentions the word fraud they quickly hang up.
Shouldn't the bank simply reverse the transaction - for the whole amount? How would her phone number suddenly be available - do you think it's possible that the bank's data has been accessed? It seems to us that that is the link to her details? And should this be reported elsewhere, to a govt agency? I've told her to contact the bank's cyber fraud section on Monday to tell them what's happened, but any further suggestions please. And is there any way to prevent the mobile calls? She's an estate agent so always has to answer her phone! Thanks

IIRC a call centre in the Philippines, had problems with workers selling customer details to scammers.
 
Just received our mail from England and there was no cheque for $33,500,000 USD in our mailbox. Only expired discount offers from Hotel Chocolat. Bugger I missed everything.
 

Become an AFF member!

Join Australian Frequent Flyer (AFF) for free and unlock insider tips, exclusive deals, and global meetups with 65,000+ frequent flyers.

AFF members can also access our Frequent Flyer Training courses, and upgrade to Fast-track your way to expert traveller status and unlock even more exclusive discounts!

AFF forum abbreviations

Wondering about Y, J or any of the other abbreviations used on our forum?

Check out our guide to common AFF acronyms & abbreviations.

Staff online

  • NM
    Enthusiast
Back
Top