Scams

fraud, scams, hoax & hackers!

The bluetooth hack

Posted by Awareness

The Definition: The Bluetooth Hack. You may have never heard of the term “blue-jacking”, and you certainly hope you are never its victim. When your phone is blue-jacked, a scammer can take control of your mobile and use it to make himself quite a handsome payday, indeed.

The Mark: Any owner of a Bluetooth enabled mobile phone – if he has forgotten to disable the Bluetooth when he is not using it. As is typical, a mark is someone who is too lazy, or too careless, or too just-plain uninformed. Visitors to this site have no such excuse.

The Scam: The piece of equipment that is key to pulling off this scam is a mobile pocket PC, set up to hunt for a blue-tooth connection. Due to a flaw in many Bluetooth enabled mobile phones, a remote mobile looking for a signal can actually pick up the signal of another nearby mobile. This defect is the only crack in the armor our modern-day cons need to exploit your phone, and your wallet.

Our scammer works in any crowded public place, seemingly intent on his pocket PC, but in reality searching for a signal to blue-jack. When he finds one, he has two jobs: one is to stay in range so he can control the hijacked phone; the other is to use his PC to make a call on the hijacked line. This is where the hustler stuffs his pockets.

Prior to instituting the scam, our con men have set up a premium-rate telephone line, which will charge those who call the line £1.50 per minute of call time. So all our hustler has to do, whilst in range of the mark’s phone, is dial up the premium-rate line using the mark’s connection and keep that connection going as long as possible. Every minute that goes by makes him a little richer.

Read the rest of this entry »

The Wi-Fi Scam

Posted by Awareness

The Definition: The Wi-Fi Scam is scamming gone high-tech. Setting up in one of the now-common free, wireless access locations so frequently found in hotel lobbies, airports or coffee shops, our hustler-turned-techie steals credit card information from unsuspecting marks. Before he leaves the area, he has gone on an on-line shopping spree, and left a roomful of dupes with fraudulent credit card charges.

The Mark: It is becoming more and more common these days for laptop owners to use their computers on unsecured networks in public places. These Wi-Fi access points are quite accommodating and convenient, but unless your anti-scam program is running, you, too can be a victim of the Wi-Fi hustle.

The Scam: Hustling has been around as long as money, and the art of the scam has proven to be as adaptable as mankind itself. When technology advances, larceny advances with it.

So it is with the Wi-Fi Scam. Having pre-tested his system, the swindler enters a hotel lobby or airport waiting area and sets up his laptop. He has configured it so that his laptop can hijack the internet signal at the access point – because of its proximity to other users, he putting out a more powerful signal than the hotel, café or airport.

As the marks filter in and set up their computers, little do they know that when they attempt to log on, it will be the scammer’s network onto which they will be logging – not the hotels.

Read the rest of this entry »

Tutorial – How to avoid key-loggers

Posted by Awareness

Tutorial – How to avoid key-loggers

Definition: What is a key-logger? A key-logger is a device (physical device, hardware) or a computer program (software). The aim of this device/program is to log all keystrokes that are generated from a keyboard. The keystrokes are secretly logged without the PC user knowing that whatever he types can be viewed by someone else. Usually, the person who has installed the key-logger can retrieve the log by pressing a combination of keys simultaneously and/or by providing a secret password. In some cases, the key-logger is also able to transmit the log remotely using email, Bluetooth signals or other methods.

Read the rest of this entry »

About Us

    About Scamplots

    First of all, all information, concepts & illustrations presented in this website are here to protect you.
    Who are we protecting you from? If you don't know the answer to this question then you shouldn't be reading this page at all.

    "If you know the enemy and know yourself, you need NOT fear the result of a hundred battles. If you know yourself but not the enemy, for every victory gained you will also suffer a defeat. If you know neither the enemy nor yourself, you will succumb in every battle." - Sun Tzu.
    We will try to let you know as many things as possible about the enemy & the modern 'modus operandi' of crooks. However, getting to know yourself & learning to recognize newly-introduced scam/fraud patterns is your own responsibility.

    Why are we taking thing so seriously? Well, the truth is that as time passes and technology advances scams & frauds are getting more and more dangerous.

    Be Careful: If you misuse information provided in this website you might end up in jail. Again, all information in this website is here to protect you.

2008 © SCAMPLOTS.COM