Category Archives: Online Fraud

Internet Health Scams


International cooperation between Australian and American agencies has shut down an internet medical eBook scam.

On 20 August 2009 The Australian Competition and Consumer Commission (ACCC) obtained court orders against two individuals for medical quackery. The United States acted against involved individuals there.

They made over $US 1 million selling more than 60,000 eBooks to consumers internationally that promoted claimed cures for a wide range of health conditions including acne, asthma, multiple sclerosis, fibromyalgia, menopause and prostate cancer.

The websites also contained testimonials from happy users of the eBooks. The testimonials were from the same people across numerous different websites.

The testimonials were plainly contrived and the defendants engaged in false, misleading and deceptive conduct stated Justice Graham, in an ex tempore judgment. He described them as “purveyors of quack medical advice and of quack medicine.”

The testimonials were from the same people across numerous different websites.

The treatments would not have any therapeutic benefits and had no medical efficacy according to expert witnesses.

. “This is a warning to all internet scammers. It is becoming more and more common for agencies such as the ACCC to work with international agencies to bring about the demise of international scams like this” said ACCC chairman Graeme Samuel.

But How Do You Know If Something Is Genuine?

Many ‘cures’ rely on the placebo effect. This is not to deny the power of the mind.

Some other cures may obtain benefits because of the relaxation response, researched by Herbert Benson. This res[pponse is often triggered in prayer and meditation and its benefits include:

  • Decreased metabolism
  • Slower heart rate, muscle relaxation
  • Slower breathing
  • Decreased blood pressure
  • Increase in nitric oxide levels

Few doubt the power of the mind. Ever since Maxwell Maltz wrote Psych-cybernetics, visualization has revolutionized success coaching.

Perhaps you have recited ‘Every day, in every way, I’m getting better and better.’ This was used by French Physician Emile Coue (1857-1926) who documented thousands of healings combining western medicine with affirmations.

Then there is the Placebo Effect.

However, scammers (like some MLM marketers) use a familiar manta:

  1. If you are unwell you need it
  2. If you are getting worse you need more
  3. If you are getting better well it must be because of the miracle cure
  4. If you die, then its your fault for not trying the miracle cure earlier.

OK perhaps I am guilty of hyperbole, but how can I know what is genuine?

Evaluating Health Information on the Internet

Websites have helped spread vital health information. They can be a great way to encourage people to consider if they need to check a health practitioner for further information..

Who runs the Web site?

How clearly is the owner of the website identified?Does the owner have a vested interest in a health product?

Does the site clearly identify the source of its information?

For example, if an article comes from a different writer, or claims made are references made? Is referenced material identified, either in footnotes, a bibliography or by hyperlink?

Who funds the website?

The source of funding can affect what and how content is presented. A site may be cautious about referring to information from potential competitors, or disparaging of their own products.

What is the purpose of the Web site?

Is the site advertorial or research oriented? This relates to who funds the site. A good website will have an “About This Site,” page that defines the  purpose of the site so that you can evaluate its reliability.

What is the original source of the information on the Web site?

Many health and medical Web sites post information collected from other Web sites or sources. If the person or organization in charge of the site did not write the material, the original source should be clearly identified. Are facts sourced and documented? When there is a lot of research it is preferable to have a bibliography or footnotes because hyperlinks may potentially become dead links.

In addition to identifying the original source of the material, the site should identify the evidence on which the material is based. Medical facts and figures should have references (such as citations of articles in medical journals). Also, opinions or advice should be clearly set apart from information that is “evidence-based” (that is, based on research results).

The differences between opinions and researched facts must be clear.

How is information reviewed before it is posted on the Web site?

Many claims are made by statistical association. But association is not the same as cause. Correlation does not mean causation. Causation needs a deeper analysis. I find t particularly disturbing when pharmaceutical companies misrepresent their claims in cases of life threatening illness. You can check out how one steroid constructed body builder was used to promote a body building product fobbing off that people should be smarter than who choose to believe that he hasn’t used other products.

Serious Health websites present the credentials of the author of articles. Are the facts peer reviewed. There is a mass of statistical information all dependent on variables that may throw results. Are tests repeatable or are they a one off fluke?

How large was the sample base?

Over how long a period? How are the conclusions drawn from the research? Is there a qualified editorial board that weeds out fact from fallacy? Even information from reliable sources may require special training in order to evaluate it properly and to determine whether the information applies to your disease or condition.

How current is the information on the Web site?

Often alternative medicine sites quote old, discredited information. (For the record, I am a supporter of some alternative therapies.) It is also di9fficult to compare health data between cultures and time periods when life expectancies are different.

Is the websites updated as new information becomes available?

What information about users does the Web site collect, and why?

Is the site wanting your email so it can advertise products or simply to keep you informed of new research?

How does the Web site choose links to other sites?

For example, a site may quote some impressive statistics and research. But if you follow the associated link you find the research may come from an inferior source that may be slanting the material to its own ends.

Be cautious about buying medical products via the Internet.

It is often hard, or expensive, to get a refund and verify quality. Safety, quality and efficacy may be lacking.

Beware of hyped up claims:

  • Beware phrases like  “scientific breakthrough”, “miraculous cure”, “exclusive product”, “secret formula”, “ancient ingredient”, “without risk”, “anti-ageing”, “improve sexual performance”, and “all natural”;
  • Case histories from “cured” customers claiming amazing results.
  • A list of symptoms and diseases it is claimed the product cures – for example, claims that one product can cure or treat HIV/AIDS, cancer, arthritis, Alzheimer’s disease, wrinkles, weight problems, memory loss, and so on;
  • Advertisements pumping the latest trendy ingredient in the news;
  • Claims that the product is available from only one source, for a limited time;
  • Testimonials from “famous” medical experts;
  • Claims of “no risk” or lack of any risk information – no product or treatment is completely risk-free!
  • Claims that a product is “scientifically proven” and “absolutely safe”.

Does the site advertising a health product give the following information:

  • product name
  • active ingredient(s)
  • name of other ingredients known to cause problems to some people
  • what to use the product for
  • when not to use the product (for example, in pregnancy, allergies, interactions with other medicines or foods)
  • how to use the product
  • possible undesired effects
  • how to store the product
  • manufacturer’s name and contact information
  • last update of the information
  • Products with the same name may contain different ingredients in different countries.

Hopefully Graeme Samuel is right, and international cooperation will make it harder for scammers to use the net to sell bogus health information.


Cybercrime Hits Smaller Business


Heartland Payment Systems, Radisson Hotels and Network Solutions have made news because of data breaches. In 2008 285 million records were compromised according to the 2009 Data Breach Investigations Report by the Verizon Business Investigative Response Team.

However, the Federal Deposit Insurance corporation (FDIC) reports that online crime is attacking small and medium sized businesses and fraudulently draining funds from their bank accounts.

In a recent podcast with Doug Johnson Senior Policy Analyst for the American Bankers Association noted that although it is hard “get a fix on the exact number” “law enforcement and institutions have really seen the exploit migrate from large businesses to small businesses”.

Smaller businesses may not be aware of this type of fraud or know how to protect themselves.

Johnson recommends authentication at the business customer level and educating customers about how to protect themselves.

“It starts very cagily by the fraudsters, mostly from Eastern Europe, doing some social intelligence associated with the business” said Johnson “ so they might know who the CFO is, or they might know who someone in HR is or what have you, or in IT.”

“Then they will send an email, which might be a Microsoft update for instance, or some other thing, which that particular individual would be aware of. The CFO might get something that purportedly is coming from the Better Business Bureau, for instance, things of that nature.”

In other words, an email that looks legitimate or expected may be a bait.


Recently, the Rippoff Report pointed out that Two-thirds used the sender’s name to gauge whether a mail was spam, 45% looked at the subject line and 22% use “visual indicators.” About 3% relied on the time a message was sent to judge if it was legitimate.

As technology improves judging an email on visual clues can be problematic.  Businesses obviously need to avoid clicking links in these emails.

“I think that it is not unusual for business customers to in their busy day not even think about the emails that they are clicking on” he said.

Chris Novak, managing principal at Verizon Business Investigative Response Team describes online security as a “kind of cat and mouse game “ requiring vigilance over a continually evolving threat.

Mr Novak has investigated criminal and civil data breaches for over a decade.

“I think the biggest thing is the evolution of malware. We are seeing that the malware is getting more advanced, and the hackers — particularly the organized crime groups – they actually have development teams” he said.

“Some of the malware is purposely built just for one specific victim environment, and the hackers have the capability to do that.”

Novak expresses concern that people think there are just a few types of malware that viral protection can handle.

“Malware is evolving rapidly with added capabilities that may frighten some people he said.

“The key piece if really making sure that you stay up on the latest and greatest threat information to know what you need to do protect yourself.”

Fortunately the recent big name security breaches demonstrated that event monitoring and log analysis revealed what was happening in 82% of cases. To be effective this requires a combination of people, processes and technology.

Novak expressed concern that people have developed an over reliance on technology.

“The problem with a lot of that is, like most technology, it is pre-configured to understand certain things and detect certain threats, but for the most part it is based on what’s been programmed into and how it has been configured.”

“In a lot of cases, you need a backup to technology of those appliances with people resources that can look at it and kind of do sanity check on it and say ‘You know what, this doesn’t look right. Someone logged into their bank account 7000 times today, and that is probably a problem.’ Sometimes the technology picks up things like that, and sometimes it doesn’t.”

Data can be moved in and out of an environment so quickly, which is why monitoring is so important.

“The biggest breaches that we’ve ever investigated took place in 24-to-48 hours. That’s all the hacker needed, depending on how organized they were.”

The Increasing Cost of Information Security


“In today’s complex and distributed financial services environment, an organization,from both a compliance and operational risk perspective, needs a 360-degree view of enterprise fraud investigations and loss.” wrote Michael Rasmussen of the strategy & research advisor Corporate Integrity, LLC.

Its easy for a small business owner to put this off. Security policies are full of jargon and in the mind of the business owner the more fancy it sounds, the more expensive he fears it will be.

Security software and services spending will outpace other IT spending areas in 2010, according to a survey by Gartner, Inc. Security software budgets are expected to grow by approximately 4 per cent in 2010, outpacing all other areas of infrastructure software. Security services budgets are projected to grow 2.74 per cent in 2010.

In April and May of 2009, Gartner surveyed more than 1,000 IT professionals with budget responsibility worldwide to determine their budget-planning expectations for 2010.

“In the current highly uncertain economic environment, with overall IT budgets shrinking, even the modest spending increases indicated by the survey show that security spending accounts for a higher percentage of the IT budget,” said Adam Hils, principal research analyst at Gartner.

Security-related software spending  in  2010 is likely in security information and event management (SIEM), e-mail security, URL filtering, and user provisioning.

The increased projected expense is partly driven by a growing movement towards managed security services, cloud-based e-mail/web security solutions, third-party compliance-related consulting and vulnerability audits and scans states Gartner.


The extent of the problem is perhaps suggested by the advertising boast of

“120,000 phishing sites shut down.

200 million online identities protected.

Growing investment in R&D.”

Prevention is cheaper than cure and an understanding of what is required for fraud to occur can help businesses develop protective strategies.

In the 1950’s criminologist and sociologist Dr. Donald Cressey the motivation to commit fraud was mostly financial and required three factors: pressure or motivation, rationalization and opportunity.

However, the world has changed. Early hackers often wanted to prove they could do it, and even enjoy the notoriety of the achievement.

Now, revenge may be a non financial motive.

Whatever the reason, fraud requires the criminal have some form of access, some knowledge or a skillet and an Intent, or purpose or desired outcome to commit fraud.

Even if you have password access and administrator rights at work, You are probably an unlikely security risk if I can barely log on without help. On the other end of the scale, some security breaches require access to technologies available to a minute fraction of the population. While scripts of code can make other breaches possible to those with little knowledge.

“If you can reduce a user’s access/authority or increase the controls (which requires the attacker have more knowledge), then you reduce the risk” wrote Ron Woerner. “You must also ascertain what is required for the exploit.”

Ron Woerner suggests applying the following Internet Security protocols:

* Separation of duties

* Background checks, including a financial records check

* Job rotation/cross-training

* Protecting and limiting access to administrator accounts

* Role-based access control (RBAC)

It is not possible to predict all possible security threats.

“Businesses should recognise that new threats or vulnerabilities may require security spending that exceeds the amounts allocated” said principal research analyst at Gartner, Ruggero Contu “and should consider setting aside up to 15 per cent of the IT security budget to address the potential risks.”

Making Facebook Safe


Communication through Facebook is all about personal connections and communities of friends. It involves a high level of trust.

When you receive a message on your Wall from one of your Facebook friends, it’s very different to receiving an anonymous e-mail or spam message. It is precisely this trusted environment – and the 250 million users – that makes Facebook such a tempting target for criminals.

Phishing and financial scams are based on creating a false sense of trust with the target of the attack, enabling the criminals to gain access to valuable information or direct financial gain.

“Weak passwords provide a common way for criminals to hack into social networking sites” said Security Advisor at IT security provider F-Secure Sean Sullivan.

The aims of scammers is to harvest contact lists, phone numbers and other information which they can sell to spammers or use in targeted attacks to make money states Mr. Sullivan.

If an over trusting Facebook user has the same password for their email account  the criminals can easily reset all the user’s online passwords, get information about banking details and find answers to security challenge questions.

Sometimes the answers to personal security questions, for example middle names, house addresses and pets’ names, can even be found directly on Facebook.

As L. Sweeney of Carnegie Mellon University has demonstrated, 87% of the USA  can be identified by their 5-digit ZIP code, gender and , date of birth.

A Facebook user name consists of an e-mail address and so it is essential that passwords different to Facebook  be used for logging into personal e-mail accounts and social network sites advises Mr. Sullivan. .

Any requests for financial help from “friends” on Facebook should be treated cautiously and contact made with the person to verify the need.

“There is also a positive security aspect to the social networking sites” states Sean Sullivan.

Unlike classic long running e-mail scams like chain letters networks like Facebook quickly publicize security allowing rapid self-corrective action against security vulnerabilities says Mr. Sullivan.

How Can You Make social Networking safer?

  • ALWAYS have separate and secure passwords for your e-mail and social networking sites.
  • If you become aware of a Facebook security problem, post about it on your Wall so the community can take preventive action.
  • Pick your friends wisely and have a security guru among your friends!
  • If you are on Facebook, Fan the “F-Secure” page to get the latest security news

Card fraud plagues UK businesses

 British credit card fraud

Card Not Present Fraud (CNP) in the UK has risen 13% from £290.5m in 2007 to £328.40m in 2008 according to APACS accounting for 54% of all card fraud losses the British trade body that represents payment institutions.

From 2001 to 2008, Card Not Present Fraud losses have risen by a massive 243 per cent.

However, this does not fully reveal the extent of the problem.  

“Given that businesses are losing millions of pounds each year and this cost inevitably is being passed on to consumers whose pockets are being hit from every angle” states Paul Simms, fraud expert and Managing Director of fraud prevention specialists, The 3rd Man.

The 3rd Man questions the APACS figures, as it is not clear whether they include fraudulent transactions on non-UK issued cards.

Figures for attempted fraud are much higher. The 3rd man alleges that CNP fraud is not a high enough priority among institutions.

 “It is also important to note that more businesses are now actually protecting themselves better than ever, working together in partnership through shared data schemes,” says Paul Simms.

“Retailer initiatives are preventing hundreds of million pounds of attempted frauds” he said.

“The rate of prevention is far in excess of the announced figures and consumers should be reassured that the Internet is a safe place to shop and continues to make significant progress.”

According to The 3rd Man business who fail to take precautions are being worst hit.

The 3rd Man has pioneered a CNP Fraud screening system that informs banks of an attempted fraud the system detects.

‘This information significantly assists banks in early detection” claims The 3rd Man.

“Criminals are targeting the customers more than the technology. It is not about hacking into computers as much as it is about tricking users into revealing their card or account details” said Jemma Smith, of APACS. Most Credit CardFraud can be avoided by following a few simple steps.

(Un)Real Data Entry

You just lost $10.00


Or $39.95 if you signed up as a full time Data Entry Clerk.

Real Data Entry claims to be the “the first real, legitimate Data Entry work at home opportunity to hit the web” that provides you “legitimate Data Entry work everyday.”

“”We will provide you with legitimate Data Entry work everyday.

You will be able to spend more time with your family.”

“Part-time Data Entry clerks will make around $300 per month, while Full-time Data Entry clerks will make around $900 per month” states Real Data Entry.

Clearly they are marketing to struggling families – those most in need.

Tragically, from personal experience, I can write of this cruel exploitative hoax.

I had bypassed this company at first however I joined when a very trusted friend mentioned it to me.

She had heard of it from a friend who claimed to have work for them  for about a year.

Well, I thought, if there still there after a year maybe it’s not so bad after all.

Trust your friends, but not your friends friend

If it was not for the apparent good news story I would not have joined.

There are all the scam warning signs.

A job almost too good to be true:

“You will be able to choose when you want to complete your data entry assignments. There are no deadlines. You will never be fired or laid off” states Real Data Entry” claims RDE.

“ and that you will never have to advertise, place advertisements, or spend money to join a site to review it, or for that matter own a website.”

So what does Real Data Entry claim to deliver?

RDE sends you sends you daily website links which you review, recommend additional information, suggest what information be removed and point out spelling and grammar errors. You can join part time and receive 1 job daily or full time and receive 3 -5 a day. In practice it is 3 a day.

I began to have disquietening thoughts after I looked around.

There was the story of a person who was paid – there was a few glitches in receipt of the cheque which they received. Then there was a post from the company on this blog admitting they had paid this lady to tell her story.

A statement that there was payment followed and no further  blog posts followed.

Similar complaints were found on work from Home forums but none were recent.

How to tell if a service is a scam?

1.      Is Real Data Entry contactable?

Legitimate sites allow you to contact their staff easily. It’s in the company’s interest to appear above board. A scam has something to hide and does not want to reveal too much of its operation. If the contact information is not readily available then it may be a scam. If you are not put off at this stage then you need to research the company further.

My experience with Real Data entry was mixed. I received some generalized answers to queries and no reply to others. The ones not replied to were unimportant and from the website contact form. As I had been experiencing a few browser issues, I initially assumed the problem was at my end.

2. Research the Experience of Others

What has been the experience of other/ A few wingers does not a scam make – after all some people simply don’t follow instructions and then criticize others for their own failures.

However, how many legitimate success stories does Real Data entry have? I found none who will defend the company.

I did find one story that mirrored my own experience.

When Will You Get Paid?

Real Data Entry’s sell is very simple.

They criticize scams so as to earn your trust and you can join for a free seven day trial. You receive 1 job a day paying $10 each.

“We have spent the past 3 years to come up with a program that anyone who wants to work from home can enjoy. We know firsthand about all of the scams out there, so we wanted to be one of the first opportunities to come out that is legitimate, and offers a REAL Data Entry position” claims RDE.

The jobs redirect you to a website to review in a second php form page.

Of course all these offers redirect through RDE’s affiliate links which they hope to earn from.

At the end of the week you find that to get paid you are told you need to have earned  $1000.

I took the position seriously, often evaluating the offers from other source outside of RDE’s scope.  If any food comes from RDE it is that I have analyzed a huge number of offers that you will hear about on The Rippoff Report.

One of RDE’s critics alleged that they were told their work was not good enough and told to do assignments again.

However, there is no training or explanations of what may constitute poor workmanship. No one is told what style the material should be in. for example you are asked to not spelling or grammatical errors. The php form inserts / before some punctuation marks (which you discover if you need to press enter again if you miss one of the tick boxes out). So should I write ‘herd’ should be spelled ‘heard’ or ignore the marks and possibly confuse the sentence?

Getting Un-Paid with RDE

After a month I applied for payment and received the following automated web message:

“We have received your request for payout. We now have to verify each assignment to make sure that you have followed all of our terms on each assignment. Please allow us 2-4 weeks to verify all of your assignments before we are able to process any payment. We will notify you as soon as your payment has been processed. DO NOT REQUEST PAYOUT AGAIN! If you do it will delay your payout request longer.”

In the meantime I worked on the next months jobs.  After four weeks I contacted the company expressing the wish for a prompt reply.

Suddenly the jobs stopped coming and although I can still access my ‘account’ the work has instantly dried up. This mirrors the story of some other complainants.

Are There Legitimate Data Entry Sites Out There?

Yes, there are. A number of companies offer freelance work for telecommuters, medical and legal transcriptionists and telecommuters. In today’s mobile workforce there are many who use secure networks to offer information technology services.

Trying to do background companies can be a real pain. You should be careful about paying money upfront for programs.

Many companies offer a free job listing service. However many of the links then go to pay for services from companies not hosted on the site which probably earning affiliate income. Or you may find you email folder full of MLM ‘opportunities’ because the company handed over your email.   The  work@home website was accused of owning and operating many of the opportunities that it recommends it’s members pay to join.

Many companies are simply pilfering links from established companies and redirecting them through their own domain. Many complain that within minutes of paying their sign up fee they discover that many of the sites they are directed too neither work or exist. Even if they work there is no – or little – ongoing support.

In the world of transcription, many services require a fee to enable companies to obtain details to bid for a contract. However, this does not guarantee you will be accepted by the hiring company.

Even the most legitimate companies can present frustrations to people outside the USA. For example, offers an excellent data base of jobs where you must prove your qualifications or undertake a test by a potential employer. However, the service proved useless for a dear friend who does medical transcription in India.

A good source of information can be found at

The same is true of e-books and training course that promise insider secrets. It’s a good idea to wade through unbiased reviews. Sadly a keyword search for PRODUCT NAME SCAM often results in the affiliate link to the product or a review made to sell the product.

Often the missing part of the puzzle requires being shown and guided through a process before it gel’s in the mind. A procedures may in itself is simple but as individuals we all interpret instructions differently. A simple step may be all that is the difference between success and failure yet if I have only an ebooks guidance, I may not be totally sure I fullu understand the implications of what is required. This is why successful training systems offer feedback to test your progress.

Please, when you hear of a good service please let us know!


The following extensive list of scams to stay away from sourced from

10×25 E-gold –
250% Plus –
300Day$ –…daydollars.html
5% * 30 –
80% each day for 3 Days –

Ace Gold –
Adarbitrage –
Advanced Gold Programs –
Alfa Invetsment –
Ally Gold –
Amiscue –
Anchor Investment –…nvestments.html
Atlantic Invest –
Atom Gold Investment –
Aurora Holdings –

Beta Gold –
Bill Killer
BigOnDating Real Investment –
Bisnis Online –
Brideby –
Business HYIP –
Business Invest –

Cash Creation –
Cash Flow –
Cash Investment –
Cash Paradise –
Century Investment Group –
Cheap Investment –
Christmas Day Gold –
CIDA Fund –
Classic Gold Game –
Club 300 –
Club Prosperity –
Crystal Gold –
CT Gold –

Daily FX Trading –
Data Entry Made Easy-
DexiGold –
Digital Pixel –
Digit-Gold –
Direct Money Connection –
Dollar Baster –
Double e-gold –
Double Gold –×3
Double in 5 Days –
Dream HYIP – http://www.dreamhyi

Eazygold –
E-Bank – –
E-Forex-Gold –
E-Global International –
E-Gold 400 –…d400/index.html
E-goldInvestClub –
E-Gold Luck –
E-Gold Mall –
E-Gold Master –
E-gold Savings –
E-Gold Solution –
EIDC 10% Daily –
Energy Investment –
Equitas Fund –
E-Share –
Equitas Fund –
Euro Profit Club –
EWallet –
Express Earnings –

Fair Gold Investment –
Fantasia –
F-Gold –
Financial Work –
Fit Investment –
Five Gold –
Fredman’s Invest –
Forex Golden –
Forex Pool –
Forex Zero –
Fredman Invest –
Future HYIP –
Future Invest –
Future Invest 2003 –
Fx Investment –

G3Traders –
GeaGold –
Get Profit –
Global Profit Club – http://globalprofitclub.freewebsitehosting…profitclub.h tml
Glow Gold –
God Father Gold –
Gold4Life –
Gold Asia –
Gold Autumn –
Gold Carbone – ?
Gold Cool –
Gold Doctor –
Gold Doors –
Gold Equilibrium –
Gold Forus –
Gold Generation –
Gold Giant –
Gold HYIP –
Gold Income –
Gold Invest –
Gold Leader –
Gold Profit –
Gold Purpose –
Gold Race –
Gold Service Investments –
Gold Spare – ?
Gold System –
Gold Vest –
Gold Wire Investment –
Golden Buck –
Golden Deposit –
Golden Forex –
Goldenhyiper –
Golden River 2004 –
Golden Street –
Golden Stairway To Heaven –
Golden Sunday 2002 –
Golden Way –
Golden Week! –
Goldin-Vest –
Gold Mine #9 –
GoldShooting –
Gold Storage –

HB Investment –
Hedge Syn –
Hidden Traders –
Hi Gold –
Honesty Egold Ins –
Home profits data entry
Honest Game 2003 –
HourGold –
HYIP Finance –
HYIP-Invest –
HyipforYou –

I2u2Me –
Imperial Gold –
Imperial IClub –
Income Builder –
Industry-Gold –
Inter Bank Investment –
Inter Gold –
Invest 99 –
Invest Metal –
Invest Planet –
Iprior –

King Midas Gold –

Lasting Gold –…lastinggold.htm
Leading Fund – ?
Love Gold –

MaestroGold –
MaMa Gold –
Matrix Gold –
Max Bux –
Max to Gold –
MaxxGold4all –
Mega Service –
Mix Gold –
MoGold –
Money-Online –
Monster Profit –
Multi Bonus –

Neoig –
NetGold –
New Year Gold –
Nitro Power –
Nuta Club –

OffShore Venture –
Omega Investment –
Omni Double –
One Day Gold –
OTR Investments –

Paying Club –
Pay U Gold –
Pioneer Trading –
Planet Egold –
Premium Gold –
Primagold –
Prime Star –
Private Gold –
Process At Home –
Profit Egold –

Quick Bucks Profit –
Quick Shuttle –

Rama Gold –
Rate4Gold –
Ratingold –
Real Data Entry  –

Real Earnings –
Real –
Risa Investments –
Rotex Investments –
Royal Invest –
Royal Lexus –

Safe HYIP –
Save Share –
Season Investment –
S-G-I –
Silver Forest –…lverforest.html
Smart Investments –
Spacegold –
SportsArbitrageInvestor –
Sports Trader –
Stable Profit 2004 –
Steady Fund –
Striders Arrow Fund –
Super Affiliate Website
Super Earn –
Super Gold –
Super Platinum –
Surprise Gold –
Surreal HYIP –

Teco Invest –
Terma Gold –
THD Investment –
The Fun –
The Goldenbatch 8 –
The Gold Explorer –
The Quest Investment –
Three Days Profit –
Time4ataco –
Trade For Gold –
Tremble of Gold –
Trust Investing –
Trust Uniion –
Try and Get – (spammer)
Twenty Gold –
Twinturboboost .com

Up Gold –
ULife Fund –

Vertical Gold –
VHyip –
Virtual Shares –
Vision Investment Group –
V-Mart –

Web Money Investor –
Web Trade Club –
Web Trade Investment – htp:// ?
Weekly 25 –
Weekly GWP –
Weekly E-Gold –
World of Gold –
World Wide Invest –

XAP 200 –

Zadollars –
Zerogold1015 –
Z-Fund –

Protect Yourself From Credit Card Fraud


“And though there are no definitive global figures on losses from credit card fraud – most financial institutions are tight-lipped on the subject – an FBI report from 2005 indicated that credit cards represented the majority of the total $315 billion U.S. financial fraud loss for that year, while a recent European study found that more than 22 million adults fell victim to credit card scams in 2006. Figures from the Banque de France, the country’s central bank, showed a credit card fraud loss of €236 million, or $319 million, for 2005” reports the New York Times.

In the USA “Credit/debit card fraud made up 9.0% of referred complaints” referred to the Internet Fraud Complaint Centre in 2008.

In 2003 there was no reported online banking fraud in Britain. There was £33.5 million, or $66.4 million.

Card Fraud was £428 million in 2006, states the New York Times.

A study by the Australian Bureau of Statistics has revealed that in 2007 half a million people fell victim to some form of fraud, costing the country nearly AU$1 billion.

Credit Card Fraud affected 280,000 Australians in 2006-2007.

“Overall, 32 per cent of businesses had been the victim of online credit card fraud, with 51 per cent of traders experiencing more than one incident over the two years” Australian Institute of Criminology, in March 2005.

“The increase in Internet fraud could be expected when you look at how many more businesses are accepting online transactions,” said Jemma Smith, a spokeswoman APACS (recently renamed UK Payments Administration Ltd) pacs, the British trade body that represents payment institutions.

“The problem is that the criminals are targeting the customers more than the technology. It is not about hacking into computers as much as it is about tricking users into revealing their card or account details” said Ms. Smith.

“That is why opening an unsolicited e-mail is like opening the front door of your home to a stranger” she said.

Internet credit card fraud has risen faster than overall credit card fraud.

Using a secure internet site may be more secure than giving your card to a waiter at your favourite restaurant.  Credit card frauds from cell phones occur at a higher rate than on the internet.

Types of Credit Card Fraud

Credit Card Fraud falls into a number of broad categories:

  • Lost/Stolen Card – An existing card is lost or stolen and used without the card holders consent or authority.
  • Card Never Received – During delivery from the financial institution the card has been intercepted (stolen) and used before it was received by the customer.
  • Fraudulent Application – A card has been applied for under a fictitious or fraudulent identity perhaps using stolen identity or false information.
  • Counterfeit/Skimming – An altered or illegally reproduced card using a replicated or altered magnetic strip or false card front. Skimming describes the process in which a device is used to copy the magnetic stripe encoding off of a card.
  • Card Not Present (CNP) – the use of account information including pseudo account information without the physical card being involved, via the phone, mail, Internet etc. without the authority of the cardholder. This category also includes fraud where a card should normally be present (eg: in a retail transaction ) but a merchant has chosen to accept the transaction based on a card number only and it turns out to be a fraudulent transaction.

In Britain CNP fraud increased by 16 percent in 2006 to £212.6 million – about half of all card fraud, states the New York Times.

  • Other fraudulent techniques include using imprints of cards at merchants, the illegal use of card details, such as by a fraudulent change of address request for the reissue of a card falsely claimed lost or stolen.

How To Protect Yourself from Credit Card Fraud

First and foremost, be cautious, and use common sense.

Treat you cards as though they were cash. You don’t leave easy access to your cash, so don’t leave the PIN numbers or account details lying around for easy access of criminals.


The FBI recommends you keep a list of your card details in a secure location so if one is stolen you can immediately report it to the correct Institution. However, advises “Never write down secret identification codes and do not choose easy-to-guess passwords”

The Federal Bureau of investigation (FBI) gives the following advice on using credit cards on the internet;

  • Don’t give out your credit card number(s) online unless the site is a secure and reputable site. Sometimes a tiny icon of a padlock appears to symbolize a higher level of security to transmit data. This icon is not a guarantee of a secure site, but might provide you some assurance.
  • Don’t trust a site just because it claims to be secure.
  • Before using the site, check out the security/encryption software it uses.
  • Make sure you are purchasing merchandise from a reputable source.
  • Do your homework on the individual or company to ensure that they are legitimate.
  • Try to obtain a physical address rather than merely a post office box and a phone number, call the seller to see if the number is correct and working.
  • Send them an e-mail to see if they have an active e-mail address and be wary of sellers who use free e-mail services where a credit card wasn’t required to open the account.
  • Consider not purchasing from sellers who won’t provide you with this type of information.
  • Check with the Better Business Bureau from the seller’s area.
  • Check out other web sites regarding this person/company.
  • Don’t judge a person/company by their web site.
  • Be cautious when responding to special offers (especially through unsolicited e-mail).
  • Be cautious when dealing with individuals/companies from outside your own country.
  • The safest way to purchase items via the Internet is by credit card because you can often dispute the charges if something is wrong.
  • Make sure the transaction is secure when you electronically send your credit card numbers.

The following additional advice may help protect against offline Credit Card Fraud:

Sign the signature panel on your credit cards immediately.

Keep a close eye on your credit card when you use it, if you have to hand it over – to a waiter for example- make sure you get it back quickly. If possible, keep the card visible at all times.

Never lend a credit card to anyone.

When changing address notify your issuing institution IN ADVANCE.

Never give your card details over the phone to an unsolicited call unless you know the company well. A legitimate company will not call to request credit card details.

Never respond to email requests for your credit details or account password information.

Destroy any credit card applications received in the mail.

Never leave PIN number records near your card or near a record of the card number, or leave card receipts lying around as this could reveal your account numbers.

Shield your credit card number when in public so as to prevent Shoulder surfing, that is  when a fraudster stands near a cardholder at an ATM machine to copy a pin, or to prevent someone capturing your card details with a cell phone or camera.

Treat your credit card like a cheque book. Reconcile your receipts and charges.

Destroy any unnecessary receipt or copy duplicates of card numbers, for example carbon duplicates.

Never write your card number out in a public place or give the number over the phone in a public place.