<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	xmlns:georss="http://www.georss.org/georss" xmlns:geo="http://www.w3.org/2003/01/geo/wgs84_pos#" xmlns:media="http://search.yahoo.com/mrss/"
	>

<channel>
	<title>Rippoff Report</title>
	<atom:link href="https://rippoffreport.wordpress.com/feed/" rel="self" type="application/rss+xml" />
	<link>https://rippoffreport.wordpress.com</link>
	<description>&#34;A people that values its privileges above its principles soon loses both.&#34; Dwight Eisenhower</description>
	<lastBuildDate>Wed, 10 Mar 2010 04:41:10 +0000</lastBuildDate>
	<language>en</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>http://wordpress.com/</generator>
<site xmlns="com-wordpress:feed-additions:1">8378694</site><cloud domain='rippoffreport.wordpress.com' port='80' path='/?rsscloud=notify' registerProcedure='' protocol='http-post' />
<image>
		<url>https://s0.wp.com/i/buttonw-com.png</url>
		<title>Rippoff Report</title>
		<link>https://rippoffreport.wordpress.com</link>
	</image>
	<atom:link rel="search" type="application/opensearchdescription+xml" href="https://rippoffreport.wordpress.com/osd.xml" title="Rippoff Report" />
	<atom:link rel='hub' href='https://rippoffreport.wordpress.com/?pushpress=hub'/>
	<item>
		<title>Three Lies of Making Money from Your blog</title>
		<link>https://rippoffreport.wordpress.com/2010/03/10/three-lies-of-making-money-from-your-blog/</link>
					<comments>https://rippoffreport.wordpress.com/2010/03/10/three-lies-of-making-money-from-your-blog/#comments</comments>
		
		<dc:creator><![CDATA[opus125]]></dc:creator>
		<pubDate>Wed, 10 Mar 2010 04:40:44 +0000</pubDate>
				<category><![CDATA[Uncategorized]]></category>
		<guid isPermaLink="false">http://rippoffreport.wordpress.com/?p=435</guid>

					<description><![CDATA[Yaro Starak is one of the world’s best blog instructors. He doesn’t show you just how to write a blog – he helps you live off it.
Besides that I can walk to his house (OK I would probably take the bus, it’s just a little more than round the corner, but its close), his advice has helped me get , running and profitable.
Recently Yaro reminded us three lies - big lies – that that hold you back from blogging success.Writing in his blog, Yaro says the wording may be different, but under most barriers holding back internet success are three false beliefs. <a href="https://rippoffreport.wordpress.com/2010/03/10/three-lies-of-making-money-from-your-blog/">Continue reading <span class="meta-nav">&#8594;</span></a>]]></description>
										<content:encoded><![CDATA[<div class="MsoNormal">
<div class="separator" style="clear:both;text-align:center;"><a href="https://rippoffreport.wordpress.com/wp-content/uploads/2010/03/yaro-starak.jpg"><img data-attachment-id="436" data-permalink="https://rippoffreport.wordpress.com/2010/03/10/three-lies-of-making-money-from-your-blog/yaro-starak/" data-orig-file="https://rippoffreport.wordpress.com/wp-content/uploads/2010/03/yaro-starak.jpg" data-orig-size="572,382" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;}" data-image-title="yaro-starak" data-image-description="" data-image-caption="" data-medium-file="https://rippoffreport.wordpress.com/wp-content/uploads/2010/03/yaro-starak.jpg?w=300" data-large-file="https://rippoffreport.wordpress.com/wp-content/uploads/2010/03/yaro-starak.jpg?w=500" class="aligncenter size-full wp-image-436" title="yaro-starak" src="https://rippoffreport.wordpress.com/wp-content/uploads/2010/03/yaro-starak.jpg?w=500&#038;h=333" alt="" width="500" height="333" srcset="https://rippoffreport.wordpress.com/wp-content/uploads/2010/03/yaro-starak.jpg?w=500&amp;h=334 500w, https://rippoffreport.wordpress.com/wp-content/uploads/2010/03/yaro-starak.jpg?w=150&amp;h=100 150w, https://rippoffreport.wordpress.com/wp-content/uploads/2010/03/yaro-starak.jpg?w=300&amp;h=200 300w, https://rippoffreport.wordpress.com/wp-content/uploads/2010/03/yaro-starak.jpg 572w" sizes="(max-width: 500px) 100vw, 500px" /></a></div>
<p><a href="http://www.entrepreneurs-journey.com/go.php?offer=opus125&amp;pid=3">Yaro Starak</a> is one of the world’s best blog instructors. He doesn’t show you just how to write a blog – he helps you live off it.</p>
</div>
<div class="MsoNormal">Besides that I can walk to his house (OK I would probably take the bus, it’s just a little more than round the corner, but its close), his advice has helped me get , running and profitable.</div>
<div class="MsoNormal">Recently Yaro reminded us three lies &#8211; big lies – that that hold you back from blogging success.Writing in his <a href="http://www.entrepreneurs-journey.com/go.php?offer=opus125&amp;pid=3">blog</a>, Yaro says the wording may be different, but under most barriers holding back internet success are three false beliefs.</div>
<div class="MsoNormal"><strong><span style="font-family:&amp;"><br />
</span></strong></div>
<div class="MsoNormal"><strong><span style="font-family:&amp;">Lie 1. You can only make money blogging how to make money</span></strong></div>
<div class="MsoNormal"><a href="http://www.entrepreneurs-journey.com/1834/3-limiting-beliefs/"><span style="font-family:&amp;">Yaro</span></a><span style="font-family:&amp;"> says that this is a short sighted view that stems from the natural process a new entrant into the world of Internet marketing goes through.</span></div>
<div class="MsoNormal"><span style="font-family:&amp;">While Yaoro admits he makes money this way, and his example may perpetuate the myth, he said “if you really want to make big money enter the dating, weight loss, health, investing or real estate niches.”</span></div>
<div class="MsoNormal"><span style="font-family:&amp;">“The truth is that the make money online niche, while good, is far from the best.”</span></div>
<div class="MsoNormal"><span style="font-family:&amp;">“ First they look for methods to make money online and find a ton of resources, some which are good and some which are not” he said.</span></div>
<div class="MsoNormal"><span style="font-family:&amp;">It sometimes seems that most only make money by selling products that teach how to make money and this including Starak.</span></div>
<div class="MsoNormal"><span style="font-family:&amp;">However, he admits there are so many possible niches to make money in, but why you don’t hear about them.</span></div>
<div class="MsoNormal">“Those making money in other niches are <strong>not teaching</strong> how to make money, so there’s no incentive for them to talk about how they do it” he said.</div>
<div class="MsoNormal">Of course, Yaro, whose program, <a href="http://www.entrepreneurs-journey.com/go.php?offer=opus125@optusnet.com.au&amp;pid=4">Blogging Mastermind</a>, is focused on that niche.  If your focus is on <strong>one niche only</strong> then obviouslythat is what you are exposed to and  write about.</div>
<div class="MsoNormal">Yaro’s own program, <a href="http://www.entrepreneurs-journey.com/go.php?offer=opus125@optusnet.com.au&amp;pid=4">Blogging Mastermind</a>, is full of examples and interviews of people who have succeeded with health products and Tennis training – all helped by Yaro of course. He is the consummate marketer after all.</div>
<div class="MsoNormal"><strong><span style="font-family:&amp;">Lie 2. You need to be a technology nerd to succeed</span></strong></div>
<div class="MsoNormal"><span style="font-family:&amp;">“Here’s the truth – <strong>technology is a bitch</strong>. It’s the biggest pain in the butt for most Internet marketers and we all struggle with it from time to time,” said Yaro, “but that shouldn’t stop you from leveraging it to make millions.”</span></div>
<div class="MsoNormal"><span style="font-family:&amp;">“why on earth would you spend so much time learning something you’re not good at and don’t enjoy?” he said “Technology is not your problem, choosing to handle it <strong>yourself</strong> is.”</span></div>
<div class="MsoNormal"><span style="font-family:&amp;">Hiring a technologically savvy person to design a website for you is relatively cheap and easy. While some object to hiring oversees labour, it can be done ethically in a way that really helps a person say from the Philippines.</span></div>
<div class="MsoNormal"><strong><span style="font-family:&amp;">3. But there are better experts than me</span></strong></div>
<div class="MsoNormal"><span style="font-family:&amp;">Yaro admits that when he was making making <strong>$5,000 a month</strong> from blogging be still did not believe he was good enough to teacch it to others, </span></div>
<div class="MsoNormal"><span style="font-family:&amp;">“Because cause Darren Rowse were around” he said “who needed me if </span><a href="http://www.problogger.net/"><span style="font-family:&amp;">Problogger.net</span></a><span style="font-family:&amp;"> had all the answers for free already?</span></div>
<div class="MsoNormal"><span style="font-family:&amp;">He identifies two issues-</span></div>
<ol type="1">
<li class="MsoNormal"><span style="font-family:&amp;">Your      lack of <strong>direction</strong></span></li>
<li class="MsoNormal"><span style="font-family:&amp;">Your      lack of <strong>confidence</strong></span></li>
</ol>
<div class="MsoNormal"><span style="font-family:&amp;">To be an expert <strong>pick a topic, study it and practice it and then teach it, </strong>.he said.</span></div>
<div class="MsoNormal"><span style="font-family:&amp;">As long as you stay one step ahead of your students you can use services like </span><a href="http://www.guru.com/"><span style="font-family:&amp;">Guru.com</span></a><span style="font-family:&amp;"> you can find experts  who would gladly create eBooks or write courses for you in any niche. – and you will spend only a few hundred dollars.</span></div>
<div class="MsoNormal"><span style="font-family:&amp;">“What you need to do is get <strong>focused</strong>, pick something and do it long enough to get a positive result (even just making one sale is good) and then build up from there” he said.</span></div>
<div class="MsoNormal"><span style="font-family:&amp;">Most people put in poor focus and get poor results..</span></div>
<div class="MsoNormal">
<p><span style="font-family:&amp;">“Expertise is simply a <strong>perception</strong> created when one person helps another” said Yaro, who admitted that he realized he had something to offer when someone emailed and thanked him for his advice.</span></p>
</div>
<div class="MsoNormal">
<p><span style="font-family:&amp;">It’s simply good to find someone who can give you down to earth no-nonsense, down to earth advice – without all the guru hype and ego that goes along with the online marketing. </span></p>
</div>
<div class="MsoNormal"><span style="font-family:&amp;">To learn how you can live your dream as an online blogger, check out Yaro Starak’s <a href="http://www.entrepreneurs-journey.com/go.php?offer=opus125&amp;pid=4">Blogging Mastermind</a>.</span></div>
<div class="MsoNormal"><span style="font-family:&amp;">Or you can check out Yaro’s <a href="http://www.entrepreneurs-journey.com/go.php?offer=opus125&amp;pid=3">Free Report</a>.</span></p>
<p><span style="font-family:&amp;">It is very easy to think you are on track- it&#8217;s great when someone so down to earth can put you back on the path. </span></p>
<p><span style="font-family:&amp;"> </span></p>
</div>
<div class="MsoNormal"><span style="font-family:&amp;"><br />
</span></div>
]]></content:encoded>
					
					<wfw:commentRss>https://rippoffreport.wordpress.com/2010/03/10/three-lies-of-making-money-from-your-blog/feed/</wfw:commentRss>
			<slash:comments>1</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">435</post-id>
		<media:content url="https://0.gravatar.com/avatar/6c6ca89f06edb15d171dc19488bad8a1a16402938f2fde5a8043f01c5122b4d1?s=96&#38;d=identicon&#38;r=G" medium="image">
			<media:title type="html">opus125</media:title>
		</media:content>

		<media:content url="https://rippoffreport.wordpress.com/wp-content/uploads/2010/03/yaro-starak.jpg" medium="image">
			<media:title type="html">yaro-starak</media:title>
		</media:content>
	</item>
		<item>
		<title>The Difference Between Identity Theft and Identity Fraud</title>
		<link>https://rippoffreport.wordpress.com/2009/12/31/the-difference-between-identity-theft-and-identity-fraud/</link>
					<comments>https://rippoffreport.wordpress.com/2009/12/31/the-difference-between-identity-theft-and-identity-fraud/#comments</comments>
		
		<dc:creator><![CDATA[opus125]]></dc:creator>
		<pubDate>Thu, 31 Dec 2009 03:21:35 +0000</pubDate>
				<category><![CDATA[Credit Card Fraud]]></category>
		<category><![CDATA[Internet Security]]></category>
		<guid isPermaLink="false">http://rippoffreport.wordpress.com/?p=428</guid>

					<description><![CDATA[A recent post on iovation.com pointed out the differences between identity theft and identity fraud.

    Xenia Antunes/Flckr

"Identity theft is when someone’s personal identity information has been stolen; identity fraud is when that stolen information is used to commit financial fraud or some other kind of crime" wrote Max Anhoury.

"Identity fraud has been growing dramatically, by 22% each of the past two years" wrote Josh Smith of Wallet Pop.

"Based on the incidents reported to Travelers, the number one cause of identity fraud is old-fashioned burglary in which a wallet, purse, other personal identification, or computer are stolen. Theft of personal property was responsible for 78% of the cases of identity fraud with online issues or data breaches only accounting for 14%." <a href="https://rippoffreport.wordpress.com/2009/12/31/the-difference-between-identity-theft-and-identity-fraud/">Continue reading <span class="meta-nav">&#8594;</span></a>]]></description>
										<content:encoded><![CDATA[<p>A recent post on<a href="http://blog.iovation.com/2009/12/08/identity-theft-and-identity-fraud/"> iovation.com</a> pointed out the differences between identity theft and identity fraud.</p>
<div style="width: 302px" class="wp-caption alignright"><a href="http://farm1.static.flickr.com/37/107691212_e4b1c82529_m.jpg"><img title="Xenia Antunes/Flckr" src="https://i0.wp.com/farm1.static.flickr.com/37/107691212_e4b1c82529_m.jpg" alt="" width="292" height="219" /></a><p class="wp-caption-text">Xenia Antunes/Flckr</p></div>
<p>&#8220;<strong>Identity theft</strong> is when someone’s personal identity information has been stolen; <strong>identity fraud</strong> is when that stolen information is used to commit financial fraud or some other kind of crime&#8221; wrote <a href="http://blog.iovation.com/author/manhoury">Max Anhoury</a>.</p>
<p>&#8220;Identity fraud has been growing dramatically, by 22% each of the past two years&#8221; wrote Josh Smith of <a href="http://www.walletpop.com/blog/2009/12/07/online-theft-not-the-main-cause-of-identity-fraud/">Wallet Pop</a>.</p>
<p>&#8220;Based on the incidents reported to Travelers, the number one cause of identity fraud is old-fashioned burglary in which a wallet, purse, other personal identification, or computer are stolen.<strong> Theft of personal property was responsible for 78% of the cases of identity fraud</strong> with online issues or data breaches only accounting for 14%.&#8221;</p>
<p>These figures indicate that &#8220;peoples’ fears may have been, at least in part, misplaced. Individuals would benefit from an increased awareness and vigilance in all aspects of their life, not just online&#8221; states Anhoury.</p>
<p>&#8220;Identity theft is when a criminal steals your personal information. Identity Fraud is when a criminal uses that ill-gotten personal information in order to commit a crime or fraud all in the name of the identity theft victim.&#8221; said Joe Reynolds, Identity Fraud Product Manager at Travelers In an email he stated, &#8220;Although consumers should be concerned about identity theft, they should be even more concerned about the potential for identity fraud as the direct impact on consumers is much greater once their name is used in the course of committing a crime.&#8221;</p>
<p>Nevertheless, Anhoury wans that online businesses &#8220;need to be on high alert&#8221; and gives the following reasons why online sites &#8220;will likely remain the No. 1 target of identity fraud&#8221;</p>
<p><strong>It’s safer to commit online identity fraud:</strong> Taking advantage of the Internet’s anonymity keeps criminals at a safe distance from their victims and the businesses they are trying to steal from. In other words, why would a fraudster risk getting caught red-handed when he could commit fraud in the comfort of his own home?</p>
<p><strong>It’s more efficient:</strong> As you would imagine, today’s Internet-savvy criminals work extremely fast. Within minutes, one stolen identity can be used to apply for multiple credit cards or a stolen card can be used to charge thousands of dollars worth of goods at multiple online sites. By the time the theft is reported, the damage can be wide-reaching.</p>
<p><strong>It’s easier to work in fraud rings:</strong> For ages, criminals have used whatever tools were at their disposal to organize and run their operations. Today, criminals around the globe are leveraging the Internet to work together, share information, and trade, sell and purchase stolen personal and financial information like never before.</p>
<p><strong>It’s not limited by geography:</strong> Criminals that obtain stolen credit or personal information are no longer limited by their geography. With the Internet all but eliminating distance, crime can now occur anywhere, at anytime, making online businesses everywhere equally vulnerable.</p>
<p>So how can you avoid being caught?</p>
<p>Here are <span style="color:#3366ff;"><a href="http://www.walletpop.com/blog/2009/12/07/online-theft-not-the-main-cause-of-identity-fraud/"><strong>The Travelers Insurance&#8217;s Top 10 tips to prevent identity fraud</strong></a></span></p>
<h3><span style="color:#3366ff;"><strong>When Shopping Traditionally</strong><strong>. </strong></span></h3>
<p><strong>1.Review your wallet or purse contents before you go shopping.</strong><br />
<strong>2. Create a list of all your credit card and bank account information and store in a secure place. </strong><br />
<strong>3. Protect your Passwords and PINS. </strong><strong><br />
<strong>4. Review your credit report now – and after the New Year.</strong></strong><br />
<strong>5. Never provide confidential information over the phone to an unsolicited caller claiming that they represent a financial institution or creditor. </strong><br />
<strong>6. Never put outgoing checks or bill payments in your home mailbox, as they are easy to steal.</strong><br />
<strong> </strong></p>
<h3><span style="color:#3366ff;"><strong>Online Shopping</strong></span></h3>
<p><strong>7. Log off completely when finished with online transactions. </strong><br />
<strong>8. Increase up your own computer&#8217;s security. </strong><br />
<strong>9. Avoid e-mailing personal and financial information.</strong><br />
<strong>10. Delete, without replying to, any suspicious e-mail requests.</strong></p>
]]></content:encoded>
					
					<wfw:commentRss>https://rippoffreport.wordpress.com/2009/12/31/the-difference-between-identity-theft-and-identity-fraud/feed/</wfw:commentRss>
			<slash:comments>1</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">428</post-id>
		<media:content url="https://0.gravatar.com/avatar/6c6ca89f06edb15d171dc19488bad8a1a16402938f2fde5a8043f01c5122b4d1?s=96&#38;d=identicon&#38;r=G" medium="image">
			<media:title type="html">opus125</media:title>
		</media:content>

		<media:content url="http://farm1.static.flickr.com/37/107691212_e4b1c82529_m.jpg" medium="image">
			<media:title type="html">Xenia Antunes/Flckr</media:title>
		</media:content>
	</item>
		<item>
		<title>Whatever you do, forget hype!</title>
		<link>https://rippoffreport.wordpress.com/2009/11/19/whatever-you-do-forget-hype/</link>
					<comments>https://rippoffreport.wordpress.com/2009/11/19/whatever-you-do-forget-hype/#respond</comments>
		
		<dc:creator><![CDATA[opus125]]></dc:creator>
		<pubDate>Thu, 19 Nov 2009 03:56:31 +0000</pubDate>
				<category><![CDATA[Uncategorized]]></category>
		<guid isPermaLink="false">http://rippoffreport.wordpress.com/2009/11/19/whatever-you-do-forget-hype/</guid>

					<description><![CDATA[It's hard, I know, especially when you start out.
Afterall, you would think the web gurus are hype driven. Every few lines is a link to the sale.
Like the infomercials running through the night, they layer you with benefits, freebies and perceived (but usually no real) value.
On the one hand you want to be respected for your integrity. On the other, there is the reality that good sales copy actually does sell. <a href="https://rippoffreport.wordpress.com/2009/11/19/whatever-you-do-forget-hype/">Continue reading <span class="meta-nav">&#8594;</span></a>]]></description>
										<content:encoded><![CDATA[<p><a href="https://rippoffreport.wordpress.com/wp-content/uploads/2009/11/white-lies.jpg"><img data-attachment-id="424" data-permalink="https://rippoffreport.wordpress.com/2009/11/19/whatever-you-do-forget-hype/white-lies/" data-orig-file="https://rippoffreport.wordpress.com/wp-content/uploads/2009/11/white-lies.jpg" data-orig-size="400,520" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;}" data-image-title="white lies" data-image-description="" data-image-caption="" data-medium-file="https://rippoffreport.wordpress.com/wp-content/uploads/2009/11/white-lies.jpg?w=231" data-large-file="https://rippoffreport.wordpress.com/wp-content/uploads/2009/11/white-lies.jpg?w=400" class="aligncenter size-full wp-image-424" title="white lies" src="https://rippoffreport.wordpress.com/wp-content/uploads/2009/11/white-lies.jpg?w=500" alt=""   srcset="https://rippoffreport.wordpress.com/wp-content/uploads/2009/11/white-lies.jpg 400w, https://rippoffreport.wordpress.com/wp-content/uploads/2009/11/white-lies.jpg?w=115&amp;h=150 115w, https://rippoffreport.wordpress.com/wp-content/uploads/2009/11/white-lies.jpg?w=231&amp;h=300 231w" sizes="(max-width: 400px) 100vw, 400px" /></a></p>
<p><span style="font-family:Times New Roman;font-size:10pt;">It&#8217;s hard, I know, especially when you start out.<br />
</span></p>
<p><span style="font-family:Times New Roman;font-size:10pt;">Afterall, you would think the web gurus are hype driven. Every few lines is a link to the sale.<br />
</span></p>
<p><span style="font-family:Times New Roman;font-size:10pt;">Like the infomercials running through the night, they layer you with benefits, freebies and perceived (but usually no real) value.<br />
</span></p>
<p><span style="font-family:Times New Roman;font-size:10pt;">On the one hand you want to be respected for your integrity. On the other, there is the reality that good sales copy actually does sell.<br />
</span></p>
<p><span style="font-family:Times New Roman;font-size:10pt;">There is a challenging balance. Your add can either sound like a report which reads well but sells nothing, or you can sell a lot of things but feel like you are ripping people off.<br />
</span></p>
<p><span style="font-family:Times New Roman;font-size:10pt;">Of course, what I call hype may be considered normal copy for another.<br />
</span></p>
<p><span style="font-family:Times New Roman;font-size:10pt;">You have to match your integrity with your potential customers.<br />
</span></p>
<p><span style="font-family:Times New Roman;font-size:10pt;">Good sales matches the benefits of your product, hopefully expressed by the keywords and main points of your copy, with the needs of your customer.<br />
</span></p>
<p><span style="font-family:Times New Roman;font-size:10pt;">Now I admit, I have tried selling stuff, and felt small. I have written product reviews and found that to compete I had to develop an angle and soon slipped into the narrow fault finding angle I despised when doing media studies.</span></p>
<p><span style="font-family:Times New Roman;font-size:10pt;">My review of <a href="https://rippoffreport.wordpress.com/2009/07/31/a-sure-bet/">Betting Arbritrage Scams</a> was criticised for focusing on scams and ignoring what one reader believed to be legitimate arbitrage opportunities. (If he, or anyone would like to tell us whatthey are, please let us know).<br />
</span></p>
<p><span style="font-family:Times New Roman;font-size:10pt;">Then I found balance, I developed a fan base of people who respected my opinion because I kept integrity.<br />
</span></p>
<p><span style="font-family:Times New Roman;font-size:10pt;">You want to keep integrity with your market which means you need to know them and to be in contact with them.<br />
</span></p>
<p><span style="font-family:Times New Roman;font-size:10pt;">Remember, having a small band of loyal fans (recently defined as a customer who spends 1% of her income on your service in a year) who come back to you will earn you more money that a small percentage w3ho look once, maybe buy, but never return.<br />
</span></p>
<p><span style="font-family:Times New Roman;font-size:10pt;">Only a small percentage of your readership will buy, so you need to keep as many coming back as possible.<br />
</span></p>
<p><span style="font-family:Times New Roman;font-size:10pt;">Top much sell and you will lose them. It&#8217;s that simple. On the other hand, banner ads don&#8217;t convert well.<br />
</span></p>
<p><span style="font-family:Times New Roman;font-size:10pt;">You need to promote &#8211; but honestly, with integrity and truthfully. People do want to know what you recommend but few will match your interest in it.<br />
</span></p>
<p><span style="font-family:Times New Roman;font-size:10pt;">Bloggers generally undersell, marketers ovwer kill, and a large number of people are trying to see what they can get for nothing.<br />
</span></p>
<p><span style="font-family:Times New Roman;font-size:10pt;">Freebies.<br />
</span></p>
<p><span style="font-family:Times New Roman;font-size:10pt;">Give free stuff and people will. Keep finding things you can give people for free  and many will return for it.<br />
</span></p>
<p><span style="font-family:Times New Roman;font-size:10pt;">However, you need good content if you want people to take you seriously.<br />
</span></p>
<p><span style="font-family:Times New Roman;font-size:10pt;">Well, you must have something to offer that will make you money.<br />
</span></p>
<ol>
<li><span style="font-family:Times New Roman;font-size:10pt;">You need to convince people your offer is worth buying<br />
</span></li>
<li><span style="font-family:Times New Roman;font-size:10pt;">You need to grow and expand relationships with people.<br />
</span></li>
</ol>
<p><span style="font-family:Times New Roman;font-size:10pt;">So on the one hand you need the relationship skills of a good blogger and the selling capabilities of a marketer blended with integrity.<br />
</span></p>
<p><span style="font-family:Times New Roman;font-size:10pt;">It comes back to knowledge gained in my days as a public speaker.<br />
</span></p>
<p><span style="font-family:Times New Roman;font-size:10pt;">You need to know your topic better than your audience, and you need to know your audience, monitor them, and respond and change as you go along.<br />
</span></p>
<p><span style="font-family:Times New Roman;font-size:10pt;">There was a competition to see between marketers to see which could get their site ranked better on google.<br />
</span></p>
<p><span style="font-family:Times New Roman;font-size:10pt;">It became apparent that all the blackhat tricks in the book could not make up for content.<br />
</span></p>
<p><span style="font-family:Times New Roman;font-size:10pt;">People want content, which is why Google ranks content over gloss.<br />
</span></p>
<p><span style="font-family:Times New Roman;font-size:10pt;">So does your site or blog give value? Or is it just a hard sell of gloss commercials?<br />
</span></p>
<p><span style="font-family:Times New Roman;font-size:10pt;">As web competition hot&#8217;s up people are increasingly skeptical of hype.<br />
</span></p>
<p><span style="font-family:Times New Roman;font-size:10pt;">You need to add value, which means your site must enhance someone else&#8217;s life.<br />
</span></p>
<p><span style="font-family:Times New Roman;font-size:10pt;">The story of aunt Mary&#8217;s BBQ may be cute – and great for a family blog – or does the story have a morale that can improve your readers lives?<br />
</span></p>
<p><span style="font-family:Times New Roman;font-size:10pt;"> This is particularly true in our knowledge hungry world.<br />
</span></p>
<p><span style="font-family:Times New Roman;font-size:10pt;">&#8220;Give value, build trust, make the sale, but as marketers are figuring out, this can be at times a fairly labor intensive task&#8221; wrote marker Yaro Starak of Brisbane Australia, whose excellent <a href="http://www.entrepreneurs-journey.com/go.php?offer=opus125&amp;pid=3">free report</a> is full of information.<br />
</span></p>
<p><span style="font-family:Times New Roman;font-size:10pt;">&#8220;Ask any blogger who is attempting to build authority in a niche – it&#8217;s not an overnight success story scenario. We&#8217;re talking long term commitment, with daily effort required, but the rewards make it worthwhile.&#8221;<br />
</span></p>
]]></content:encoded>
					
					<wfw:commentRss>https://rippoffreport.wordpress.com/2009/11/19/whatever-you-do-forget-hype/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">422</post-id>
		<media:content url="https://0.gravatar.com/avatar/6c6ca89f06edb15d171dc19488bad8a1a16402938f2fde5a8043f01c5122b4d1?s=96&#38;d=identicon&#38;r=G" medium="image">
			<media:title type="html">opus125</media:title>
		</media:content>

		<media:content url="https://rippoffreport.wordpress.com/wp-content/uploads/2009/11/white-lies.jpg" medium="image">
			<media:title type="html">white lies</media:title>
		</media:content>
	</item>
		<item>
		<title>Will Social Media Rule the World?</title>
		<link>https://rippoffreport.wordpress.com/2009/10/23/will-social-media-rule-the-world/</link>
					<comments>https://rippoffreport.wordpress.com/2009/10/23/will-social-media-rule-the-world/#respond</comments>
		
		<dc:creator><![CDATA[opus125]]></dc:creator>
		<pubDate>Fri, 23 Oct 2009 03:40:15 +0000</pubDate>
				<category><![CDATA[Internet Security]]></category>
		<category><![CDATA[microsoft anf twitter. google and twitter]]></category>
		<category><![CDATA[search engines social networking]]></category>
		<category><![CDATA[Social networking]]></category>
		<guid isPermaLink="false">http://rippoffreport.wordpress.com/?p=408</guid>

					<description><![CDATA[Social networking information from your friends, like their Flickr photos or their status updates blended into the bottom of search results much like news or images.
The information will be derived from your Google Profile and will increase proportionately to how well connected you are.
Image searches will be improved and made more relevant using social networking data. <a href="https://rippoffreport.wordpress.com/2009/10/23/will-social-media-rule-the-world/">Continue reading <span class="meta-nav">&#8594;</span></a>]]></description>
										<content:encoded><![CDATA[<p><a href="https://rippoffreport.wordpress.com/wp-content/uploads/2009/10/social_networking_sites.jpg"><img data-attachment-id="414" data-permalink="https://rippoffreport.wordpress.com/2009/10/23/will-social-media-rule-the-world/social_networking_sites/" data-orig-file="https://rippoffreport.wordpress.com/wp-content/uploads/2009/10/social_networking_sites.jpg" data-orig-size="400,300" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;}" data-image-title="social_networking_sites" data-image-description="&lt;p&gt;Social networking sites and search engines&lt;/p&gt;
" data-image-caption="" data-medium-file="https://rippoffreport.wordpress.com/wp-content/uploads/2009/10/social_networking_sites.jpg?w=300" data-large-file="https://rippoffreport.wordpress.com/wp-content/uploads/2009/10/social_networking_sites.jpg?w=400" class="aligncenter size-full wp-image-414" title="social_networking_sites" src="https://rippoffreport.wordpress.com/wp-content/uploads/2009/10/social_networking_sites.jpg?w=500" alt="social_networking_sites"   srcset="https://rippoffreport.wordpress.com/wp-content/uploads/2009/10/social_networking_sites.jpg 400w, https://rippoffreport.wordpress.com/wp-content/uploads/2009/10/social_networking_sites.jpg?w=150&amp;h=113 150w, https://rippoffreport.wordpress.com/wp-content/uploads/2009/10/social_networking_sites.jpg?w=300&amp;h=225 300w" sizes="(max-width: 400px) 100vw, 400px" /></a></p>
<p>How powerful has social media become?</p>
<p>&#8220;Social networking sites are to be trialed for issuing urgent messages about natural disasters in the Cairns region in far north Queensland&#8221; reports <a href="http://au.news.yahoo.com/a/-/world/6378420/facebook-twitter-to-issue-disaster-warnings/">Yahoo Australia</a>, demonstrating social media&#8217;s potential for good.</p>
<p>Now, Google and Microsoft are linked with Twitter and Microsoft has a deal with Facebook which updates into Bing.</p>
<p>These  deals will  make social media marketing more important to search engine marketing.<br />
Google&#8217;s Google’s Vice-President of Search Marissa Mayer announced the agreement with Twitter to include their updates in our search results.</p>
<p>“We believe that our search results and user experience will greatly benefit from the inclusion of this up-to-the-minute data, and we look forward to having a product that showcases how tweets can make search better in the coming months” she said.</p>
<p>“That way, the next time you search for something that can be aided by a real-time observation, say, snow conditions at your favorite ski resort, you&#8217;ll find tweets from other users who are there and sharing the latest and greatest information.”</p>
<p>Because Social media is viral and real-time search is nothing more than putting things in chronological order. Your effectiveness will be enhanced by writing about what people are talking about right now.</p>
<p>WebProNews anticipates that “if status updates and tweets become directly integrated into search results in Universal Search-type fashion, it will be not only be about promotion and outside links, it will be about direct exposure right in the results”</p>
<p>It is is “not unlike <a href="http://redir.ientry.com/02-1065-2008152-20180269-0-12">the importance of online video</a> right now” noting that videos are often displayed prominently on the first page of Google results).</p>
<p>Mayer is <a href="http://mashable.com/2009/10/21/breaking-google-launches-social-search/">reported</a> to have suggested that Google Labs feature called Social Search will include:</p>
<p>Social networking information from your friends, like their Flickr<a href="http://www.blippr.com/apps/336659-Flickr" target="_blank"> </a>photos or their status updates blended into the bottom of search results much like news or images.</p>
<p>The information will be derived from your Google Profile and will increase proportionately to how well connected you are.</p>
<p>Image searches will be improved and made more relevant using social networking data.</p>
<p>Twitter has also made its mark.</p>
<p>“The power of those tweets as a form of data that can be surfaced in search is enormous. Innovative services like Twitter give us access to public opinion and thoughts in a way that has not before been possible” states Paul Yiu  of <a href="http://www.bing.com/community/blogs/search/archive/2009/10/21/bing-is-bringing-twitter-search-to-you.aspx">Bing</a>.</p>
<p>Bing has made available a <a href="http://redir.ientry.com/02-4159-2008152-20180269-0-12">beta tool</a> for you to experiment tweet searches. Some of it’s functions are presently limited to the USA only however.</p>
<p>&#8220;You can now search for what people are saying all over the web about breaking news topics, your favorite celebrity, hometown sports team, and anything else you use Twitter to stay on top of today.&#8221;</p>
<p>Then there is the important need to look below the fluff and find the real trending topics. Especially if you want to write about real issues.</p>
<p>According to <a href="http://www.clickz.com/3622879">Mike Grehan</a> of <a href="http://www.incisivemedia.com/">Incisive Media</a> IBM wrote an algorithm that looks at Twitter, Facebook, and MySpace and filters out all the noise to find the real conversation. The BBC uses this technology to rate music with what is called the Sound Index.</p>
<p>“Google is failing in its mission to make the world&#8217;s information universally accessible” claims Grehan. It basically can’t keep up. Google has tracked a trillion  links, but that is only a small fraction of the web.</p>
<p>He anticipates that there will be changes and they will be Keyword-Driven. However, Grehan points out that as the social element goes beyond the immediacy of search and considers the effect of longterm relationships opn our decisions.</p>
<p>“I believe the next major advances in search must be in the area of learning machines and artificial intelligence” said Grehand.</p>
<p>“Search engines started with the bare basics of computer technology, crawling, indexing and ranking HTML pages based on an end user’s query”</p>
<p>Significant improvements occurred when Google’s distributed its computing across a grid iomplemented network theory in its PageRank algorithm he said.</p>
<p>To be effective, WebProNews made the following suggestions:</p>
<p>1. Use keywords<br />
2. Talk about timely events<br />
3. Have a lot of followers<br />
4. Promote conversation<br />
5. Include calls to engagement</p>
<p>However, one truth remains.</p>
<p>“The keyword is still the core of marketing, not just search” says Grehan.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://rippoffreport.wordpress.com/2009/10/23/will-social-media-rule-the-world/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">408</post-id>
		<media:content url="https://0.gravatar.com/avatar/6c6ca89f06edb15d171dc19488bad8a1a16402938f2fde5a8043f01c5122b4d1?s=96&#38;d=identicon&#38;r=G" medium="image">
			<media:title type="html">opus125</media:title>
		</media:content>

		<media:content url="https://rippoffreport.wordpress.com/wp-content/uploads/2009/10/social_networking_sites.jpg" medium="image">
			<media:title type="html">social_networking_sites</media:title>
		</media:content>
	</item>
		<item>
		<title>671 Percent Increase in Malicious Web Sites</title>
		<link>https://rippoffreport.wordpress.com/2009/10/21/671-percent-increase-in-malicious-web-sites/</link>
					<comments>https://rippoffreport.wordpress.com/2009/10/21/671-percent-increase-in-malicious-web-sites/#respond</comments>
		
		<dc:creator><![CDATA[opus125]]></dc:creator>
		<pubDate>Wed, 21 Oct 2009 11:38:28 +0000</pubDate>
				<category><![CDATA[Internet Security]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[Blog Comments Spam]]></category>
		<category><![CDATA[bots]]></category>
		<category><![CDATA[maicious spam]]></category>
		<category><![CDATA[Malicious Blog Comments]]></category>
		<category><![CDATA[malicious web attacks]]></category>
		<category><![CDATA[Malicious Web Sites]]></category>
		<category><![CDATA[rippoffreport]]></category>
		<category><![CDATA[scam]]></category>
		<category><![CDATA[spam]]></category>
		<guid isPermaLink="false">http://rippoffreport.wordpress.com/?p=400</guid>

					<description><![CDATA[Websense Security Labs Reports 671 Percent Increase in Malicious Web Sites; 95 Percent Blog Comments Spam or Malicious.
37 percent of malicious Web attacks included data-stealing code, 57 percent of data-stealing attacks are conducted over the web in the first half of 2009. <a href="https://rippoffreport.wordpress.com/2009/10/21/671-percent-increase-in-malicious-web-sites/">Continue reading <span class="meta-nav">&#8594;</span></a>]]></description>
										<content:encoded><![CDATA[<iframe class="youtube-player" width="500" height="282" src="https://www.youtube.com/embed/BNu1TXNYArI?version=3&#038;rel=1&#038;showsearch=0&#038;showinfo=1&#038;iv_load_policy=1&#038;fs=1&#038;hl=en&#038;autohide=2&#038;wmode=transparent" allowfullscreen="true" style="border:0;" sandbox="allow-scripts allow-same-origin allow-popups allow-presentation allow-popups-to-escape-sandbox"></iframe>
<p>Malicious websites grew 233% in the last six months and 671% in the last year, stares <a href="http://investor.websense.com/releasedetail.cfm?ReleaseID=409218">Websense Security Labs</a>. This was partly because of the spread  <a href="http://securitylabs.websense.com/content/Blogs/3401.aspx?cmpid=prnr">Gumblar</a>, <a href="http://securitylabs.websense.com/content/Blogs/3408.aspx?cpmid=prnr">Beladen</a> and <a href="http://securitylabs.websense.com/content/Blogs/3422.aspx?cmpid=prnr">Nine Ball</a> attacks which aimed to compromise trusted and known Web sites.</p>
<p>Web 2.0 sites are the worst effected target as 95% of blog comments, chat rooms and message boards are malicious.</p>
<p>&#8220;The last six months have shown that malicious hackers and fraudsters go where the people are on the Web” said Websense Chief Technology Officer Dan Hubbard “and have heightened their attacks on popular Web 2.0 sites.”</p>
<p>The top 100 most visited Web properties, which are “Social Networking” or “Search” sites states Websense.</p>
<p>77% of sites with malicious code are legitimate sites have been compromised by fraudsters exploiting the inherent trust in a business.</p>
<p>61 percent of the top 100 sites either hosted malicious content or contained a masked redirect to lure unsuspecting victims to malicious sites.</p>
<p>The term ”malicious” typically refers to links that have specific, hidden exploits that target a user’s computer.</p>
<p>The next million most visited sites are primarily current event and news sites and are more regionaland genre-focused.</p>
<p>37 percent of malicious Web attacks included data-stealing code, 57 percent of data-stealing attacks are conducted over the web in the first half of 2009.</p>
<p>85.6% of all unwanted emails contained links to spam and/or malicious Web sites and 57% of data-stealing attacks are conducted over the Web. In June virus infected emails rose 600% over May.</p>
<p>An analysis of Web, email and data security trends during the first half of 2009 are explored in the Websense Security Labs bi-annual “<a href="http://www.websense.com/site/docs/whitepapers/en/WSL_Q1_Q2_2009_FNL.PDF">State of Internet Security</a>” report.</p>
<p>Daily Websense® Security Labs<img src="https://s0.wp.com/wp-content/mu-plugins/wpcom-smileys/twemoji/2/72x72/2122.png" alt="™" class="wp-smiley" style="height: 1em; max-height: 1em;" /> Websense ThreatSeeker<img src="https://s0.wp.com/wp-content/mu-plugins/wpcom-smileys/twemoji/2/72x72/2122.png" alt="™" class="wp-smiley" style="height: 1em; max-height: 1em;" /> Network parses more than one billion pieces</p>
<p>of content and over 40 million websites hourly for malicious code and ten million emails. The Websense ThreatSeeker Network uses more than 50 million real-time data collecting systems.</p>
<p>YouTube and BlogSpot are 65 percent to 75 percent ineffective in protecting Web users from objectionable content and security risks. Hate or militant content on Facebook and other popular Web 2.0 sites like YouTube, Yahoo! Groups and Google Groups.</p>
<p>Cyber terrorism (militancy and extremists Web sites)  increased 326 percent increase in increased 326% from January through May 2009 over the same period in 2008.</p>
<p>Websense tracks about15,000 hate and militancy sites, with 1,000 added in he first six months of this year.</p>
<p>78 percent of new Web pages discovered in the first half of 2009 with objectionable content (e.g. Sex, Adult Content, Gambling, Drugs)  and  69 percent of all Web pages with any objectionable content link served malicious content.</p>
<p>Sex, advertisements, business and economy, IT, and travel made up the most commonly</p>
<p>compromised categories of Web content. 50 percent of Web pages with a link categorized as “Sex” also have at least one malicious link.</p>
<p>The three most popular topics for spam remained shopping (28 percent), cosmetics (18.4 percent) and</p>
<p>medical (11.9 percent.)  However, over the last six months, education accounted 9.5 percent of spam.</p>
<p>and could be attributed to the recession.</p>
<p>“Spammers have been targeting the unemployed who are looking to re-train or gain qualifications to help their job prospects” states Websense.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://rippoffreport.wordpress.com/2009/10/21/671-percent-increase-in-malicious-web-sites/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">400</post-id>
		<media:content url="https://0.gravatar.com/avatar/6c6ca89f06edb15d171dc19488bad8a1a16402938f2fde5a8043f01c5122b4d1?s=96&#38;d=identicon&#38;r=G" medium="image">
			<media:title type="html">opus125</media:title>
		</media:content>
	</item>
		<item>
		<title>Phishing Scams and your bank</title>
		<link>https://rippoffreport.wordpress.com/2009/10/20/phishing-scams-and-your-bank/</link>
					<comments>https://rippoffreport.wordpress.com/2009/10/20/phishing-scams-and-your-bank/#comments</comments>
		
		<dc:creator><![CDATA[opus125]]></dc:creator>
		<pubDate>Tue, 20 Oct 2009 02:37:24 +0000</pubDate>
				<category><![CDATA[Banking Industry]]></category>
		<category><![CDATA[bankin security phishing]]></category>
		<category><![CDATA[email spam]]></category>
		<category><![CDATA[How To Stop Spam]]></category>
		<category><![CDATA[Internet Security]]></category>
		<category><![CDATA[malicious web attacks]]></category>
		<category><![CDATA[Malicious Web Site]]></category>
		<category><![CDATA[mobile phone phishing]]></category>
		<category><![CDATA[panda security]]></category>
		<category><![CDATA[protect ypourself from spam]]></category>
		<category><![CDATA[rippoffreport]]></category>
		<category><![CDATA[spam]]></category>
		<category><![CDATA[trojan email]]></category>
		<category><![CDATA[trojan malware]]></category>
		<guid isPermaLink="false">http://rippoffreport.wordpress.com/?p=383</guid>

					<description><![CDATA["Your information security program is only as strong as your weakest link” said  Linda McGlasson of Bank Info Security.

“That weakest link is your customer or your employee sitting at a screen, deciding whether to click on that link that popped up in their instant messaging screen, or direct message box on Twitter, or visit that site that offers free ringtones (and malware as a bonus).“ <a href="https://rippoffreport.wordpress.com/2009/10/20/phishing-scams-and-your-bank/">Continue reading <span class="meta-nav">&#8594;</span></a>]]></description>
										<content:encoded><![CDATA[<p><a href="https://rippoffreport.wordpress.com/wp-content/uploads/2009/10/phishing2.jpg"><img data-attachment-id="390" data-permalink="https://rippoffreport.wordpress.com/2009/10/20/phishing-scams-and-your-bank/phishing-3/" data-orig-file="https://rippoffreport.wordpress.com/wp-content/uploads/2009/10/phishing2.jpg" data-orig-size="368,245" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;}" data-image-title="phishing" data-image-description="&lt;p&gt;Phishing hits banking&lt;/p&gt;
" data-image-caption="" data-medium-file="https://rippoffreport.wordpress.com/wp-content/uploads/2009/10/phishing2.jpg?w=300" data-large-file="https://rippoffreport.wordpress.com/wp-content/uploads/2009/10/phishing2.jpg?w=368" loading="lazy" class="aligncenter size-full wp-image-390" title="phishing" src="https://rippoffreport.wordpress.com/wp-content/uploads/2009/10/phishing2.jpg?w=500" alt="phishing"   srcset="https://rippoffreport.wordpress.com/wp-content/uploads/2009/10/phishing2.jpg 368w, https://rippoffreport.wordpress.com/wp-content/uploads/2009/10/phishing2.jpg?w=150&amp;h=100 150w, https://rippoffreport.wordpress.com/wp-content/uploads/2009/10/phishing2.jpg?w=300&amp;h=200 300w" sizes="(max-width: 368px) 100vw, 368px" /></a></p>
<p>“Your information security program is only as strong as your weakest link” said  <a href="http://blogs.bankinfosecurity.com/posts.php?postID=328">Linda McGlasson</a> of Bank Info Security.</p>
<p>“That weakest link is your customer or your employee sitting at a screen, deciding whether to click on that link that popped up in their instant messaging screen, or direct message box on Twitter, or visit that site that offers free ringtones (and malware as a bonus).“</p>
<p>Recently 10 US financial institutions in California, New York, Pennsylvania and Wisconsin receiving fraudulent text messages or automated phone calls. </p>
<p>On September 28, 2009, the 1st Federal Credit Union of central Pennsylvania reported that it received calls from customers about text messages claiming that their cards were blocked.</p>
<p>Similarly on October 2 phishers sent text messages to mobile phones in the Omaha area, claiming their bank card had been deactivated. Inclded were instructions to call an 877 number to reactivate it. At least one customer lost several hundred dollars.</p>
<p>&#8220;Once he changed his PIN, somebody went in and withdrew the money,&#8221; said Richard Patterson, president of Greater Omaha Federal Credit Union.</p>
<p>A very convincing automated phone call phishing scam directly named the Liberty Bank.</p>
<blockquote><p>&#8220;Your card has been suspended because we believe it was accessed by a third party. Please press 1 now to be transferred to our security department&#8221; the recording, before liting an impressive array of details designed to sound official.</p></blockquote>
<p>Customers who pressed &#8220;1&#8221; were asked to enter their credit/debit card number and personal identification number.</p>
<p>“There will be some losses,” Liberty Bank Vice President Jill Hitchman said. “Charges started showing up almost immediately after our customers gave away their card numbers.”</p>
<p>Of course, <a href="http://www.libertybk.com/asp/privacy.asp#ID">Liberty</a> responsibly warns its customers to “never reply to email, pop-up messages or phone callers that ask for your personal or financial information. LIBERTY BANK WILL NEVER ask you to disclose your password or pin”.</p>
<p>Spam works because about one out of six respond to messages suspect are spam survey data by the <a href="../../../../../2009/10/02/why-does-spam-work/">Messaging Anti-Abuse Working Group, an anti-spam trade organization</a> (MAAWG).</p>
<p>A record five million new malware threats were detected in third quarter of 2009 according to the <a href="../../../../../2009/10/07/malware-pandemic/">Cloud Security firm, Panda Security</a>. Trojans accounted for 71 percent of all new malware between July and September 2009s bots and other malware are morphing rapidly.</p>
<p>Globally 59% of computers are infected  states Panda.</p>
<p>Obviously we need to keep our viral security up to date. This is why Bank Info Security recommends regular, preferably quarterly, programs to remind their customers of secure banking practices.</p>
<p>The problem is that people are the weakest lin. Even normally cautious people may once in a while press a link they normally would ignore.</p>
<p>Since, most of us are not rocket scientists perhaps give oursleves a reality check. Perhaps we should put ourselves through a similar audit of our email and web habits.</p>
<p>People need to be trained to obtain a drivers license so perhaps we need to begin to train people in the rules of internet safety said Linda McGlasson.</p>
<p>She suggests the first very basic tips:</p>
<ul>
<li>Keep your operating system up to date with the latest      patches;</li>
<li>Update your anti-virus and anti-spyware regularly, if      not daily;</li>
<li>Install a firewall on your PC;</li>
<li>Don&#8217;t click on links in emails that are from unknown      origins (or known origins for that matter).</li>
</ul>
]]></content:encoded>
					
					<wfw:commentRss>https://rippoffreport.wordpress.com/2009/10/20/phishing-scams-and-your-bank/feed/</wfw:commentRss>
			<slash:comments>2</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">383</post-id>
		<media:content url="https://0.gravatar.com/avatar/6c6ca89f06edb15d171dc19488bad8a1a16402938f2fde5a8043f01c5122b4d1?s=96&#38;d=identicon&#38;r=G" medium="image">
			<media:title type="html">opus125</media:title>
		</media:content>

		<media:content url="https://rippoffreport.wordpress.com/wp-content/uploads/2009/10/phishing2.jpg" medium="image">
			<media:title type="html">phishing</media:title>
		</media:content>
	</item>
		<item>
		<title>Internet Health Scams</title>
		<link>https://rippoffreport.wordpress.com/2009/10/08/369/</link>
					<comments>https://rippoffreport.wordpress.com/2009/10/08/369/#respond</comments>
		
		<dc:creator><![CDATA[opus125]]></dc:creator>
		<pubDate>Thu, 08 Oct 2009 11:39:31 +0000</pubDate>
				<category><![CDATA[Health Scams]]></category>
		<category><![CDATA[Online Fraud]]></category>
		<category><![CDATA[Internet Health Scams]]></category>
		<guid isPermaLink="false">http://rippoffreport.wordpress.com/?p=369</guid>

					<description><![CDATA[On 20 August 2009 The Australian Competition and Consumer Commission (ACCC) obtained court orders against two individuals for medical quackery. The United States also acted against involved individuals.
They made over $US 1 million selling more than 60,000 eBooks to consumers internationally using fabricated testimonials.
What can you look out for to verify health information online?
 <a href="https://rippoffreport.wordpress.com/2009/10/08/369/">Continue reading <span class="meta-nav">&#8594;</span></a>]]></description>
										<content:encoded><![CDATA[<p><a href="https://rippoffreport.wordpress.com/wp-content/uploads/2009/10/fatloss4idiots.jpg"><img data-attachment-id="371" data-permalink="https://rippoffreport.wordpress.com/2009/10/08/369/fatloss4idiots/" data-orig-file="https://rippoffreport.wordpress.com/wp-content/uploads/2009/10/fatloss4idiots.jpg" data-orig-size="500,400" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;}" data-image-title="fatloss4idiots" data-image-description="" data-image-caption="" data-medium-file="https://rippoffreport.wordpress.com/wp-content/uploads/2009/10/fatloss4idiots.jpg?w=300" data-large-file="https://rippoffreport.wordpress.com/wp-content/uploads/2009/10/fatloss4idiots.jpg?w=500" loading="lazy" class="aligncenter size-full wp-image-371" title="fatloss4idiots" src="https://rippoffreport.wordpress.com/wp-content/uploads/2009/10/fatloss4idiots.jpg?w=500&#038;h=400" alt="fatloss4idiots" width="500" height="400" srcset="https://rippoffreport.wordpress.com/wp-content/uploads/2009/10/fatloss4idiots.jpg 500w, https://rippoffreport.wordpress.com/wp-content/uploads/2009/10/fatloss4idiots.jpg?w=150&amp;h=120 150w, https://rippoffreport.wordpress.com/wp-content/uploads/2009/10/fatloss4idiots.jpg?w=300&amp;h=240 300w" sizes="(max-width: 500px) 100vw, 500px" /></a></p>
<p>International cooperation between Australian and American agencies has shut down an internet medical eBook scam.</p>
<p>On 20 August 2009 <a href="http://www.accc.gov.au/content/index.phtml/itemId/889908">The Australian Competition and Consumer Commission</a> (ACCC) obtained court orders against two individuals for medical quackery. The United States acted against involved individuals there.</p>
<p>They made over $US 1 million selling more than 60,000 eBooks to consumers internationally that promoted claimed cures for a wide range of health conditions including acne, asthma, multiple sclerosis, fibromyalgia, menopause and prostate cancer.</p>
<p>The websites also contained testimonials from happy users of the eBooks. The testimonials were from the same people across numerous different websites.</p>
<p>The testimonials were plainly contrived and the defendants engaged in false, misleading and deceptive conduct stated Justice Graham, in an ex tempore judgment. He described them as &#8220;purveyors of quack medical advice and of quack medicine.&#8221;</p>
<p>The testimonials were from the same people across numerous different websites.</p>
<p>The treatments would not have any therapeutic benefits and had no medical efficacy according to expert witnesses.</p>
<p>. &#8220;This is a warning to all internet scammers. It is becoming more and more common for agencies such as the ACCC to work with international agencies to bring about the demise of international scams like this&#8221; said ACCC chairman Graeme Samuel.</p>
<p>But How Do You Know If Something Is Genuine?</p>
<p>Many ‘cures’ rely on the placebo effect. This is not to deny the power of the mind.</p>
<p>Some other cures may obtain benefits because of the relaxation response, researched by Herbert Benson. This res[pponse is often triggered in prayer and meditation and its benefits include:</p>
<ul>
<li>Decreased metabolism</li>
<li>Slower heart rate, muscle relaxation</li>
<li>Slower breathing</li>
<li>Decreased blood pressure</li>
<li>Increase in nitric oxide levels</li>
</ul>
<p>Few doubt the power of the mind. Ever since Maxwell Maltz wrote Psych-cybernetics, visualization has revolutionized success coaching.</p>
<p>Perhaps you have recited ‘Every day, in every way, I’m getting better and better.’ This was used by <a href="http://mindpowermasters.ning.com/profiles/blogs/can-meditation-help-you">French Physician Emile Coue</a> (1857-1926) who documented thousands of healings combining western medicine with affirmations.</p>
<p>Then there is the Placebo Effect.</p>
<p>However, scammers (like some MLM marketers) use a familiar manta:</p>
<ol>
<li>If you are unwell you need it</li>
<li>If you are getting worse you need more</li>
<li>If you are getting better well it must be because of the miracle cure</li>
<li>If you die, then its your fault for not trying the miracle cure earlier.</li>
</ol>
<p>OK perhaps I am guilty of hyperbole, but how can I know what is genuine?</p>
<h2>Evaluating Health Information on the Internet</h2>
<p>Websites have helped spread vital health information. They can be a great way to encourage people to consider if they need to check a health practitioner for further information..</p>
<h3><span style="color:#3366ff;"><strong>Who runs the Web site?</strong></span></h3>
<p>How clearly is the owner of the website identified?Does the owner have a vested interest in a health product?</p>
<h3><strong> </strong><span style="color:#3366ff;"><strong>Does the site clearly identify the source of its information?</strong></span></h3>
<p>For example, if an article comes from a different writer, or claims made are references made? Is referenced material identified, either in footnotes, a bibliography or by hyperlink?</p>
<h3><span style="color:#3366ff;"><strong>Who funds the website?</strong></span></h3>
<p>The source of funding can affect what and how content is presented. A site may be cautious about referring to information from potential competitors, or disparaging of their own products.</p>
<h3><span style="color:#3366ff;"><strong>What is the purpose of the Web site?</strong></span><strong><br />
</strong></h3>
<p>Is the site advertorial or research oriented? This relates to who funds the site. A good website will have an “About This Site,” page that defines the  purpose of the site so that you can evaluate its reliability.</p>
<h3><span style="color:#3366ff;"><strong>What is the original source of the      information on the Web site?</strong></span></h3>
<p>Many health and medical Web sites post information collected from other Web sites or sources. If the person or organization in charge of the site did not write the material, the original source should be clearly identified. Are facts sourced and documented? When there is a lot of research it is preferable to have a bibliography or footnotes because hyperlinks may potentially become dead links.</p>
<p>In addition to identifying the original source of the material, the site should identify the evidence on which the material is based. Medical facts and figures should have references (such as citations of articles in medical journals). Also, opinions or advice should be clearly set apart from information that is “evidence-based” (that is, based on research results).</p>
<p>The differences between opinions and researched facts must be clear.</p>
<h3><span style="color:#3366ff;"><strong>How is information reviewed before it is      posted on the Web site?</strong></span><strong><br />
</strong></h3>
<p>Many claims are made by statistical association. But association is not the same as cause. Correlation does not mean causation. Causation needs a deeper analysis. I find t particularly disturbing when <a href="https://rippoffreport.wordpress.com/wp-content/uploads/2009/07/jupiter-study-findings-hardly-exciting.pdf">pharmaceutical companies misrepresent their claims in cases of life threatening illness</a>. You can check out how one <a href="../../../../../2009/07/22/is-adonis-effectual/">steroid constructed body builder</a> was used to promote a body building product fobbing off that people should be smarter than who choose to believe that he hasn’t used other products.</p>
<p>Serious Health websites present the credentials of the author of articles. Are the facts peer reviewed. There is a mass of statistical information all dependent on variables that may throw results. Are tests repeatable or are they a one off fluke?</p>
<p>How large was the sample base?</p>
<p>Over how long a period? How are the conclusions drawn from the research? Is there a qualified editorial board that weeds out fact from fallacy? Even information from reliable sources may require special training in order to evaluate it properly and to determine whether the information applies to your disease or condition.</p>
<h3><span style="color:#3366ff;"><strong>How current is the information on the Web      site?</strong></span><strong><br />
</strong></h3>
<p>Often alternative medicine sites quote old, discredited information. (For the record, I am a supporter of some alternative therapies.) It is also di9fficult to compare health data between cultures and time periods when life expectancies are different.</p>
<p>Is the websites updated as new information becomes available?</p>
<h3><span style="color:#3366ff;"><strong>What information about users does the Web site collect, and why?</strong></span><strong><br />
</strong></h3>
<p>Is the site wanting your email so it can advertise products or simply to keep you informed of new research?</p>
<p><span style="color:#3366ff;"><strong>How does the Web site choose links to other sites?</strong></span><strong><br />
</strong></p>
<p>For example, a site may quote some impressive statistics and research. But if you follow the associated link you find the research may come from an inferior source that may be slanting the material to its own ends.</p>
<h3><span style="color:#3366ff;"><strong>Be cautious about buying medical products via the Internet.</strong></span></h3>
<p>It is often hard, or expensive, to get a refund and verify quality. Safety, quality and efficacy may be lacking.</p>
<p>Beware of hyped up claims:</p>
<ul>
<li>Beware phrases like  &#8220;scientific breakthrough&#8221;, &#8220;miraculous cure&#8221;, &#8220;exclusive product&#8221;, &#8220;secret formula&#8221;, &#8220;ancient ingredient&#8221;, &#8220;without risk&#8221;, &#8220;anti-ageing&#8221;, &#8220;improve sexual performance&#8221;, and &#8220;all natural&#8221;;</li>
<li>Case histories from &#8220;cured&#8221; customers claiming amazing results.</li>
<li>A list of symptoms and diseases it is claimed the product cures &#8211; for example, claims that one product can cure or treat HIV/AIDS, cancer, arthritis, Alzheimer&#8217;s disease, wrinkles, weight problems, memory loss, and so on;</li>
<li>Advertisements pumping the latest trendy ingredient in the news;</li>
<li>Claims that the product is available from only one source, for a limited time;</li>
<li>Testimonials from &#8220;famous&#8221; medical experts;</li>
<li>Claims of &#8220;no risk&#8221; or lack of any risk information &#8211; no product or treatment is completely risk-free!</li>
<li>Claims that a product is &#8220;scientifically proven&#8221; and &#8220;absolutely safe&#8221;.</li>
</ul>
<p>Does the site advertising a health product give the following information:</p>
<ul>
<li>product name</li>
<li>active ingredient(s)</li>
<li>name of other ingredients known to cause problems to some people</li>
<li>what to use the product for</li>
<li>when not to use the product (for example, in pregnancy, allergies, interactions with other medicines or foods)</li>
<li>how to use the product</li>
<li>possible undesired effects</li>
<li>how to store the product</li>
<li>manufacturer&#8217;s name and contact information</li>
<li>last update of the information</li>
<li>Products with the same name may contain different ingredients in different countries.</li>
</ul>
<p>Hopefully Graeme Samuel is right, and international cooperation will make it harder for scammers to use the net to sell bogus health information.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://rippoffreport.wordpress.com/2009/10/08/369/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">369</post-id>
		<media:content url="https://0.gravatar.com/avatar/6c6ca89f06edb15d171dc19488bad8a1a16402938f2fde5a8043f01c5122b4d1?s=96&#38;d=identicon&#38;r=G" medium="image">
			<media:title type="html">opus125</media:title>
		</media:content>

		<media:content url="https://rippoffreport.wordpress.com/wp-content/uploads/2009/10/fatloss4idiots.jpg" medium="image">
			<media:title type="html">fatloss4idiots</media:title>
		</media:content>
	</item>
		<item>
		<title>Malware Pandemic</title>
		<link>https://rippoffreport.wordpress.com/2009/10/07/malware-pandemic/</link>
					<comments>https://rippoffreport.wordpress.com/2009/10/07/malware-pandemic/#respond</comments>
		
		<dc:creator><![CDATA[opus125]]></dc:creator>
		<pubDate>Wed, 07 Oct 2009 05:43:33 +0000</pubDate>
				<category><![CDATA[Internet Security]]></category>
		<category><![CDATA[bots]]></category>
		<category><![CDATA[email spam]]></category>
		<category><![CDATA[How To Stop Spam]]></category>
		<category><![CDATA[malicious web attacks]]></category>
		<category><![CDATA[Malicious Web Site]]></category>
		<category><![CDATA[panda security]]></category>
		<category><![CDATA[protect ypourself from spam]]></category>
		<category><![CDATA[rippoffreport]]></category>
		<category><![CDATA[spam]]></category>
		<category><![CDATA[trojan malware]]></category>
		<guid isPermaLink="false">http://rippoffreport.wordpress.com/?p=358</guid>

					<description><![CDATA[A record five million new malware threats were detected in third quarter of 2009 according to the Cloud Security, Panda Security.
Trojans accounted for 71 percent of all new malware between July and September 2009. Adware (13 percent) and spyware (9 percent) have also all increased, while traditional viruses and worms have decreased to 2 percent of the total. <a href="https://rippoffreport.wordpress.com/2009/10/07/malware-pandemic/">Continue reading <span class="meta-nav">&#8594;</span></a>]]></description>
										<content:encoded><![CDATA[<p>A record five million new malware threats were detected in third quarter of 2009 according to the Cloud Security firm, Panda Security.<br />
Trojans accounted for 71 percent of all new malware between July and September 2009. Adware (13 percent) and spyware (9 percent) have also all increased, while traditional viruses and worms have decreased to 2 percent of the total.</p>
<p>SAdly, thw weak lin is still the individual user who fails to apply basic net safety rules or applies commonsense when an impressive sounding <a href="https://rippoffreport.wordpress.com/2009/10/20/phishing-scams-and-your-bank/">phishing scam asks for bank details</a>.</p>
<div data-shortcode="caption" id="attachment_359" style="width: 510px" class="wp-caption aligncenter"><a href="http://www.flickr.com/photos/panda_security/3968713973/in/photostream/"><img aria-describedby="caption-attachment-359" data-attachment-id="359" data-permalink="https://rippoffreport.wordpress.com/2009/10/07/malware-pandemic/malware-detected/" data-orig-file="https://rippoffreport.wordpress.com/wp-content/uploads/2009/10/malware-detected.jpg" data-orig-size="500,294" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;}" data-image-title="malware detected" data-image-description="" data-image-caption="" data-medium-file="https://rippoffreport.wordpress.com/wp-content/uploads/2009/10/malware-detected.jpg?w=300" data-large-file="https://rippoffreport.wordpress.com/wp-content/uploads/2009/10/malware-detected.jpg?w=500" loading="lazy" class="size-full wp-image-359" title="malware detected" src="https://rippoffreport.wordpress.com/wp-content/uploads/2009/10/malware-detected.jpg?w=500&#038;h=294" alt="malware detected" width="500" height="294" srcset="https://rippoffreport.wordpress.com/wp-content/uploads/2009/10/malware-detected.jpg 500w, https://rippoffreport.wordpress.com/wp-content/uploads/2009/10/malware-detected.jpg?w=150&amp;h=88 150w, https://rippoffreport.wordpress.com/wp-content/uploads/2009/10/malware-detected.jpg?w=300&amp;h=176 300w" sizes="(max-width: 500px) 100vw, 500px" /></a><p id="caption-attachment-359" class="wp-caption-text">PandaLabs has recorded five million new strains of malware. Most of these were banker Trojans, although adware and spyware have also increased.</p></div>
<p>“Spyware has increased for the first time this year, rising from 6.90% to 9.16%. Adware however has decreased slightly from 16.37% to 13.13%, yet it was still the second most detected malware category this year” according to the  quarterly report.<br />
“We currently receive approximately 50,000 new samples of malware every day, compared to 37,000 just a few months ago. There is no reason to believe that the situation will improve in the coming months,” explains Luis Corrons, Technical Director of PandaLabs.<br />
There has been a marked increase in malware distributed through spam, social networks and search engine optimization techniques, which draw users to spoof Web pages where malware is downloaded. These exploit topical issues like swine flu, Independence Day, forest fires or Presidential speeches by Barack Obama.<br />
“There is a false sense of security, as users perceive there to be no real danger at the moment. When their computers get infected, they rarely notice any symptoms” said According to Luis Corrons, Technical Director of PandaLabs, According to Panda’s U.S. computers are infected by the most dangerous malware strains: Trojans, followed by adware, worms and viruses.<br />
The global infection rate on computers rose to 59% states Panda Security. Taiwan has the most infected PCs, with a 69.10 percent corruption, followed by Russia and China at 67.99 percent and 61.97 percent, respectively. U.S. ranks ninth with an infection ratio of 58.25. The country with the least infections is Norway at 39.60 percent.</p>
<p>“Spyware has increased for the first time this year, rising from 6.90% to 9.16%. Adware however has decreased slightly from 16.37% to 13.13%, yet it was still the second most detected malware category this year” according to the  quarterly report.<br />
“We currently receive approximately 50,000 new samples of malware every day, compared to 37,000 just a few months ago. There is no reason to believe that the situation will improve in the coming months,” explains Luis Corrons, Technical Director of PandaLabs.<br />
There has been a marked increase in malware distributed through spam, social networks and search engine optimization techniques, which draw users to spoof Web pages where malware is downloaded. These exploit topical issues like swine flu, Independence Day, forest fires or Presidential speeches by Barack Obama.<br />
“There is a false sense of security, as users perceive there to be no real danger at the moment. When their computers get infected, they rarely notice any symptoms” said According to Luis Corrons, Technical Director of PandaLabs, According to Panda’s U.S. computers are infected by the most dangerous malware strains: Trojans, followed by adware, worms and viruses.<br />
“This is a clear sign that hackers are becoming more and more sophisticated,” said Corrons.<br />
“Cybercriminals have found news ways to spread their creations, frequently exploiting the latest news stories to launch attacks through social networks, videos, and email. The huge amount of Trojans in circulation is due to the spectacular increase in the number of banker Trojans aimed at stealing user data.”<br />
The global infection rate on computers rose to 59% states Panda Security.  Taiwan has the most infected PCs, with a 69.10 percent corruption, followed by Russia and China at 67.99 percent and 61.97 percent, respectively. U.S. ranks ninth with an infection ratio of 58.25. The country with the least infections is Norway at 39.60 percent.</p>
<p><a href="http://www.flickr.com/photos/panda_security/3963144168/in/photostream/"><img data-attachment-id="362" data-permalink="https://rippoffreport.wordpress.com/2009/10/07/malware-pandemic/infected-pcs-2/" data-orig-file="https://rippoffreport.wordpress.com/wp-content/uploads/2009/10/infected-pcs1.jpg" data-orig-size="470,500" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;}" data-image-title="infected PCs" data-image-description="" data-image-caption="" data-medium-file="https://rippoffreport.wordpress.com/wp-content/uploads/2009/10/infected-pcs1.jpg?w=282" data-large-file="https://rippoffreport.wordpress.com/wp-content/uploads/2009/10/infected-pcs1.jpg?w=470" loading="lazy" class="aligncenter size-full wp-image-362" title="infected PCs" src="https://rippoffreport.wordpress.com/wp-content/uploads/2009/10/infected-pcs1.jpg?w=500" alt="infected PCs"   srcset="https://rippoffreport.wordpress.com/wp-content/uploads/2009/10/infected-pcs1.jpg 470w, https://rippoffreport.wordpress.com/wp-content/uploads/2009/10/infected-pcs1.jpg?w=141&amp;h=150 141w, https://rippoffreport.wordpress.com/wp-content/uploads/2009/10/infected-pcs1.jpg?w=282&amp;h=300 282w" sizes="(max-width: 470px) 100vw, 470px" /></a></p>
]]></content:encoded>
					
					<wfw:commentRss>https://rippoffreport.wordpress.com/2009/10/07/malware-pandemic/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">358</post-id>
		<media:content url="https://0.gravatar.com/avatar/6c6ca89f06edb15d171dc19488bad8a1a16402938f2fde5a8043f01c5122b4d1?s=96&#38;d=identicon&#38;r=G" medium="image">
			<media:title type="html">opus125</media:title>
		</media:content>

		<media:content url="https://rippoffreport.wordpress.com/wp-content/uploads/2009/10/malware-detected.jpg" medium="image">
			<media:title type="html">malware detected</media:title>
		</media:content>

		<media:content url="https://rippoffreport.wordpress.com/wp-content/uploads/2009/10/infected-pcs1.jpg" medium="image">
			<media:title type="html">infected PCs</media:title>
		</media:content>
	</item>
		<item>
		<title>European ATM Crimes Increasing</title>
		<link>https://rippoffreport.wordpress.com/2009/10/06/european-atm-crimes-increasing/</link>
					<comments>https://rippoffreport.wordpress.com/2009/10/06/european-atm-crimes-increasing/#comments</comments>
		
		<dc:creator><![CDATA[opus125]]></dc:creator>
		<pubDate>Tue, 06 Oct 2009 02:23:19 +0000</pubDate>
				<category><![CDATA[Banking Industry]]></category>
		<category><![CDATA[scam]]></category>
		<category><![CDATA[ATM Fraud]]></category>
		<category><![CDATA[ATM Security]]></category>
		<guid isPermaLink="false">http://rippoffreport.wordpress.com/?p=348</guid>

					<description><![CDATA[ATM attacks rose 149% on 2008 in Europe and annual cash machine losses approach EUR 500 million.
ATM numbers have increased in Europe by 6% last year to almost 400,000. Seventy-two percent of European ATMs are located in just five countries: UK, Spain, Germany, France and Italy. Many ATM’s are in remote locations such as convenience stores, airports and petrol stations.

Criminals prefer take money directly ATM’s after obtaining pin numbers using a wide range of techniques from ‘shoulder surfing’ to complex skimming techniques. During 2008, 10,302 skimming incidents were reported in Europe.

“This can involve the usage of a small spy camera, a false PIN overlay and even fake machines; while increasingly Blue Tooth wireless technology is used to transmit card and PIN details to a nearby laptop computer” states ENISA. <a href="https://rippoffreport.wordpress.com/2009/10/06/european-atm-crimes-increasing/">Continue reading <span class="meta-nav">&#8594;</span></a>]]></description>
										<content:encoded><![CDATA[<p><a href="https://rippoffreport.wordpress.com/wp-content/uploads/2009/10/security12.jpg"><img data-attachment-id="355" data-permalink="https://rippoffreport.wordpress.com/2009/10/06/european-atm-crimes-increasing/security12/" data-orig-file="https://rippoffreport.wordpress.com/wp-content/uploads/2009/10/security12.jpg" data-orig-size="317,448" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;}" data-image-title="security12" data-image-description="" data-image-caption="" data-medium-file="https://rippoffreport.wordpress.com/wp-content/uploads/2009/10/security12.jpg?w=212" data-large-file="https://rippoffreport.wordpress.com/wp-content/uploads/2009/10/security12.jpg?w=317" loading="lazy" src="https://rippoffreport.wordpress.com/wp-content/uploads/2009/10/security12.jpg?w=500" alt="security12" title="security12"   class="aligncenter size-full wp-image-355" srcset="https://rippoffreport.wordpress.com/wp-content/uploads/2009/10/security12.jpg 317w, https://rippoffreport.wordpress.com/wp-content/uploads/2009/10/security12.jpg?w=106&amp;h=150 106w, https://rippoffreport.wordpress.com/wp-content/uploads/2009/10/security12.jpg?w=212&amp;h=300 212w" sizes="(max-width: 317px) 100vw, 317px" /></a></p>
<p>ATM attacks rose 149% on 2008 in Europe and annual cash machine losses approach EUR 500 million states <a href="http://www.enisa.europa.eu/media/press-releases/enisa-warns-increase-in-atm-crime">ENISA</a>, the European Network and Information Security Agency.</p>
<p>ATM burglaries and physical attacks have also seen an increase by 32% over the last 12 months from ram raids and explosions to the use of rotary saws, thermal lances and diamond drills.</p>
<p>“ATMs are attractive to criminals because they contain bank notes, while the bank cards themselves give thieves access to customers’ bank accounts,” said Mr. Andrea Pirotti, Executive Director at ENISA.</p>
<p>ATM numbers have increased in Europe by 6% last year to almost 400,000. Seventy-two percent of European ATMs are located in just five countries: UK, Spain, Germany, France and Italy. Many ATM’s are in remote locations such as convenience stores, airports and petrol stations.</p>
<p>Criminals prefer take money directly ATM’s after obtaining pin numbers using a wide range of techniques from ‘shoulder surfing’ to complex skimming techniques. During 2008, 10,302 skimming incidents were reported in Europe.</p>
<p>“This can involve the usage of a small spy camera, a false PIN overlay and even fake machines; while increasingly Blue Tooth wireless technology is used to transmit card and PIN details to a nearby laptop computer” states ENISA.</p>
<p><a href="https://rippoffreport.wordpress.com/wp-content/uploads/2009/10/unset.jpg"><img data-attachment-id="351" data-permalink="https://rippoffreport.wordpress.com/2009/10/06/european-atm-crimes-increasing/unset/" data-orig-file="https://rippoffreport.wordpress.com/wp-content/uploads/2009/10/unset.jpg" data-orig-size="796,600" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;}" data-image-title="[UNSET]" data-image-description="" data-image-caption="" data-medium-file="https://rippoffreport.wordpress.com/wp-content/uploads/2009/10/unset.jpg?w=300" data-large-file="https://rippoffreport.wordpress.com/wp-content/uploads/2009/10/unset.jpg?w=500" loading="lazy" class="aligncenter size-full wp-image-351" title="[UNSET]" src="https://rippoffreport.wordpress.com/wp-content/uploads/2009/10/unset.jpg?w=500&#038;h=376" alt="[UNSET]" width="500" height="376" srcset="https://rippoffreport.wordpress.com/wp-content/uploads/2009/10/unset.jpg?w=500&amp;h=377 500w, https://rippoffreport.wordpress.com/wp-content/uploads/2009/10/unset.jpg?w=150&amp;h=113 150w, https://rippoffreport.wordpress.com/wp-content/uploads/2009/10/unset.jpg?w=300&amp;h=226 300w, https://rippoffreport.wordpress.com/wp-content/uploads/2009/10/unset.jpg?w=768&amp;h=579 768w, https://rippoffreport.wordpress.com/wp-content/uploads/2009/10/unset.jpg 796w" sizes="(max-width: 500px) 100vw, 500px" /></a></p>
<p>“ATM crime is likely to become even more attractive as the latest generation of ATMs is designed to dispense other services and products such as phone top ups and stamps” he said.</p>
<p>Organised criminal gangs have also extracted money by trapping and then retrieving users’ cards, stopping withdrawals in the middle of a transaction and completing them later or even trapping cash in the machine.</p>
<p>PIN and account information has been obtained by sophisticated phishing techniques and hacking into bank computer systems and web sites, states ENISA.</p>
<p>“Most ATM crime is focused on exploiting the human element and card holders must be more aware of the risks they are exposed to and how to prevent fraud occurring” said Pirotti. “Information security has, for too long, been focusing on technical solutions to maximise protection.”</p>
<p>“The first line of defence against ATM crime is increasing awareness of the risks” so that users can take simple precautions such as shielding their PIN when entering it and by keeping alert to any signs of tampering or suspicious activity at an ATM.”</p>
<p>The ENISA suggests a few Golden Rules to offer maximum protection with minimum effort.</p>
<h2><span style="color:#3366ff;">ENISA Golden Rules</span></h2>
<ul>
<li>Choosing an ATM Machine</li>
<li>Don’t use ATMs with extra signage or warnings</li>
<li>Try to use ATMs inside banks</li>
<li>Don’t use freestanding ATMs</li>
<li>Physical surroundings</li>
<li>Use an ATM which is in clear view and well lit</li>
<li>Be cautious of strangers and check they are at a reasonable distance away</li>
</ul>
<p>Making Operations</p>
<ul>
<li>Pay careful attention to the front of the machine for tampering</li>
<li>Pay attention to the card reader for signs of additional devices</li>
<li>Look carefully for differences or unusual characteristics of the ATM’s PIN pad</li>
<li>Look out for extra cameras</li>
<li>Protect your PIN by standing close to the ATM and shielding the key pad</li>
<li>Report confiscated cards immediately</li>
<li>Beware of ATMs that don’t dispense cash and non-bank ATMs that don’t charge fees</li>
</ul>
<p>Statement Reviews</p>
<ul>
<li>Frequently review your account statements</li>
<li>Report any suspicious activity immediately</li>
</ul>
<p>(‘ATM Crime: Overview of the European situation and golden rules on how to avoid it’.)</p>
]]></content:encoded>
					
					<wfw:commentRss>https://rippoffreport.wordpress.com/2009/10/06/european-atm-crimes-increasing/feed/</wfw:commentRss>
			<slash:comments>2</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">348</post-id>
		<media:content url="https://0.gravatar.com/avatar/6c6ca89f06edb15d171dc19488bad8a1a16402938f2fde5a8043f01c5122b4d1?s=96&#38;d=identicon&#38;r=G" medium="image">
			<media:title type="html">opus125</media:title>
		</media:content>

		<media:content url="https://rippoffreport.wordpress.com/wp-content/uploads/2009/10/security12.jpg" medium="image">
			<media:title type="html">security12</media:title>
		</media:content>

		<media:content url="https://rippoffreport.wordpress.com/wp-content/uploads/2009/10/unset.jpg" medium="image">
			<media:title type="html">[UNSET]</media:title>
		</media:content>
	</item>
		<item>
		<title>Cybercrime Hits Smaller Business</title>
		<link>https://rippoffreport.wordpress.com/2009/10/03/cybercrime-hits-smaller-businesses/</link>
					<comments>https://rippoffreport.wordpress.com/2009/10/03/cybercrime-hits-smaller-businesses/#respond</comments>
		
		<dc:creator><![CDATA[opus125]]></dc:creator>
		<pubDate>Fri, 02 Oct 2009 23:46:51 +0000</pubDate>
				<category><![CDATA[Banking Industry]]></category>
		<category><![CDATA[Internet Security]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[Online Fraud]]></category>
		<category><![CDATA[scam]]></category>
		<category><![CDATA[rippoffreport]]></category>
		<guid isPermaLink="false">http://rippoffreport.wordpress.com/?p=338</guid>

					<description><![CDATA[“It starts very cagily by the fraudsters, mostly from Eastern Europe, doing some social intelligence associated with the business” said Johnson “ so they might know who the CFO is, or they might know who someone in HR is or what have you, or in IT.”

“Then they will send an email, which might be a Microsoft update for instance, or some other thing, which that particular individual would be aware of. The CFO might get something that purportedly is coming from the Better Business Bureau, for instance, things of that nature.” <a href="https://rippoffreport.wordpress.com/2009/10/03/cybercrime-hits-smaller-businesses/">Continue reading <span class="meta-nav">&#8594;</span></a>]]></description>
										<content:encoded><![CDATA[<p><a href="https://rippoffreport.wordpress.com/wp-content/uploads/2009/10/security1.jpg"><img data-attachment-id="340" data-permalink="https://rippoffreport.wordpress.com/2009/10/03/cybercrime-hits-smaller-businesses/security1/" data-orig-file="https://rippoffreport.wordpress.com/wp-content/uploads/2009/10/security1.jpg" data-orig-size="294,270" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;}" data-image-title="security1" data-image-description="" data-image-caption="" data-medium-file="https://rippoffreport.wordpress.com/wp-content/uploads/2009/10/security1.jpg?w=294" data-large-file="https://rippoffreport.wordpress.com/wp-content/uploads/2009/10/security1.jpg?w=294" loading="lazy" class="aligncenter size-full wp-image-340" title="security1" src="https://rippoffreport.wordpress.com/wp-content/uploads/2009/10/security1.jpg?w=500" alt="security1"   srcset="https://rippoffreport.wordpress.com/wp-content/uploads/2009/10/security1.jpg 294w, https://rippoffreport.wordpress.com/wp-content/uploads/2009/10/security1.jpg?w=150&amp;h=138 150w" sizes="(max-width: 294px) 100vw, 294px" /></a></p>
<p>Heartland Payment Systems, Radisson Hotels and Network Solutions have made news because of data breaches. In 2008 285 million records were compromised according to the 2009 Data Breach Investigations Report by the Verizon Business Investigative Response Team.</p>
<p>However, the Federal Deposit Insurance corporation (FDIC) reports that online crime is attacking small and medium sized businesses and fraudulently draining funds from their bank accounts.</p>
<p>In a recent podcast with <a href="http://www.bankinfosecurity.com/articles.php?art_id=1790&amp;search_keyword=johnson&amp;search_method=exact">Doug Johnson</a> Senior Policy Analyst for the American Bankers Association noted that although it is hard “get a fix on the exact number” “law enforcement and institutions have really seen the exploit migrate from large businesses to small businesses”.</p>
<p>Smaller businesses may not be aware of this type of fraud or know how to protect themselves.</p>
<p>Johnson recommends authentication at the business customer level and educating customers about how to protect themselves.</p>
<p>“It starts very cagily by the fraudsters, mostly from Eastern Europe, doing some social intelligence associated with the business” said Johnson “ so they might know who the CFO is, or they might know who someone in HR is or what have you, or in IT.”</p>
<p>“Then they will send an email, which might be a Microsoft update for instance, or some other thing, which that particular individual would be aware of. The CFO might get something that purportedly is coming from the Better Business Bureau, for instance, things of that nature.”</p>
<p>In other words, an email that looks legitimate or expected may be a bait.</p>
<p><a href="https://rippoffreport.wordpress.com/wp-content/uploads/2009/10/security-breach.jpg"><img data-attachment-id="343" data-permalink="https://rippoffreport.wordpress.com/2009/10/03/cybercrime-hits-smaller-businesses/security-breach/" data-orig-file="https://rippoffreport.wordpress.com/wp-content/uploads/2009/10/security-breach.jpg" data-orig-size="360,240" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;}" data-image-title="security-breach" data-image-description="" data-image-caption="" data-medium-file="https://rippoffreport.wordpress.com/wp-content/uploads/2009/10/security-breach.jpg?w=300" data-large-file="https://rippoffreport.wordpress.com/wp-content/uploads/2009/10/security-breach.jpg?w=360" loading="lazy" class="aligncenter size-full wp-image-343" title="security-breach" src="https://rippoffreport.wordpress.com/wp-content/uploads/2009/10/security-breach.jpg?w=500" alt="security-breach"   srcset="https://rippoffreport.wordpress.com/wp-content/uploads/2009/10/security-breach.jpg 360w, https://rippoffreport.wordpress.com/wp-content/uploads/2009/10/security-breach.jpg?w=150&amp;h=100 150w, https://rippoffreport.wordpress.com/wp-content/uploads/2009/10/security-breach.jpg?w=300&amp;h=200 300w" sizes="(max-width: 360px) 100vw, 360px" /></a></p>
<p>Recently, the <a href="../../../../../2009/10/02/why-does-spam-work/">Rippoff Report</a> pointed out that Two-thirds used the sender’s name to gauge whether a mail was spam, 45% looked at the subject line and 22% use “visual indicators.” About 3% relied on the time a message was sent to judge if it was legitimate.</p>
<p>As technology improves judging an email on visual clues can be problematic.  Businesses obviously need to avoid clicking links in these emails.</p>
<p>“I think that it is not unusual for business customers to in their busy day not even think about the emails that they are clicking on” he said.</p>
<p><a href="http://www.bankinfosecurity.com/articles.php?art_id=1818">Chris Novak</a>, managing principal at Verizon Business Investigative Response Team describes online security as a “kind of cat and mouse game “ requiring vigilance over a continually evolving threat.</p>
<p>Mr Novak has investigated criminal and civil data breaches for over a decade.</p>
<p>“I think the biggest thing is the evolution of malware. We are seeing that the malware is getting more advanced, and the hackers &#8212; particularly the organized crime groups &#8211; they actually have development teams” he said.</p>
<p>“Some of the malware is purposely built just for one specific victim environment, and the hackers have the capability to do that.”</p>
<p>Novak expresses concern that people think there are just a few types of malware that viral protection can handle.</p>
<p>“Malware is evolving rapidly with added capabilities that may frighten some people he said.</p>
<p>“The key piece if really making sure that you stay up on the latest and greatest threat information to know what you need to do protect yourself.”</p>
<p>Fortunately the recent big name security breaches demonstrated that event monitoring and log analysis revealed what was happening in 82% of cases. To be effective this requires a combination of people, processes and technology.</p>
<p>Novak expressed concern that people have developed an over reliance on technology.</p>
<p>“The problem with a lot of that is, like most technology, it is pre-configured to understand certain things and detect certain threats, but for the most part it is based on what&#8217;s been programmed into and how it has been configured.”</p>
<p>“In a lot of cases, you need a backup to technology of those appliances with people resources that can look at it and kind of do sanity check on it and say &#8216;You know what, this doesn&#8217;t look right. Someone logged into their bank account 7000 times today, and that is probably a problem.&#8217; Sometimes the technology picks up things like that, and sometimes it doesn&#8217;t.”</p>
<p>Data can be moved in and out of an environment so quickly, which is why monitoring is so important.</p>
<p>“The biggest breaches that we&#8217;ve ever investigated took place in 24-to-48 hours. That&#8217;s all the hacker needed, depending on how organized they were.”</p>
]]></content:encoded>
					
					<wfw:commentRss>https://rippoffreport.wordpress.com/2009/10/03/cybercrime-hits-smaller-businesses/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">338</post-id>
		<media:content url="https://0.gravatar.com/avatar/6c6ca89f06edb15d171dc19488bad8a1a16402938f2fde5a8043f01c5122b4d1?s=96&#38;d=identicon&#38;r=G" medium="image">
			<media:title type="html">opus125</media:title>
		</media:content>

		<media:content url="https://rippoffreport.wordpress.com/wp-content/uploads/2009/10/security1.jpg" medium="image">
			<media:title type="html">security1</media:title>
		</media:content>

		<media:content url="https://rippoffreport.wordpress.com/wp-content/uploads/2009/10/security-breach.jpg" medium="image">
			<media:title type="html">security-breach</media:title>
		</media:content>
	</item>
	</channel>
</rss>
