Current Scams and Alerts

ALERT – SCAM Companies listed here

The list contains the names of the companies identified as Money circulation companies using the multilevel marketing compensation plans.

Please note :

  1. This list contains names of unviable business models which may have been initiated by the promoters intentionally (with full knowledge of implications) or unintentionally (copied from other scams without understanding the viability).
  2. These companies have Unviable Business plans or have Deceptive information on the website or have a Deceptive business model.
  3. This is not an exhaustive list of these types of companies, but contains a fraction of thousands of companies with presence on the internet which continues to exploit regulatory loopholes in India.
  4. This list also contains names of companies disguising money circulation by promoting intangible products which are of no value to the people paying for the same.
  5. This list does not include companies promoting tangible products using the MLM compensation plans even though they might be falling in the ambit of Money circulation (more payout being offered than provisioned for on the sale of products ) because of their unviable business plan and/or compensation plan.
  6. The details on these companies listed here including – Snapshots of the Web pages with date and time stamps, Names of the directors, Names of the Promoters/Top distributors, Addresses, Contact numbers, Compensation plan, Franchisee addresses, Server details, IP addresses, Name of the Software developer and support, Approximate turnover, Area of operation, Videos of the company meetings, brochures, literatures, etc would be shared on request with Law Enforcement agencies only if requested using official email ids and contact details .
  7. The list also includes Registered/ Non-Registered Entities (with the Registrar of companies) or Individuals using the Multilevel marketing compensation plan (MLM) to promote products or services.
  8. Collective investment schemes registered with SEBI (A Collective investment scheme is any scheme or arrangement, which satisfies the conditions, referred to in sub-section (2) of section 11AA of the SEBI Act) or any registered Chit fund companies are not listed here.

Total Scam Compnies : 702 (http://www.strategyindia.com/blog/scam-alerts/)

 

 

Addtional info on International ALERTS

 

Identifying Information on the Internet

Install all recommended software and/or hardware to protect your information. To be protected against cyber criminals, you need current anti-virus, anti-spyware, anti-malware, and firewall programs.

  • Install reputable anti-spam software. Most reputable anti-spam software programs today are also programmed to identify known viruses, which could contain Trojan horses as well.
  • Keep all your security software and operating systems updated.
  • Verify BOTH the source AND content of each file you download! Don’t download an executable program just to “check it out.” If it’s a Trojan, the first time you run it, you’re already infected!
  • Use caution when dealing with pop-ups. This is a perfect place to plant a virus or Trojan programs.
  • Beware of hidden file extensions. Windows by default hides the last extension of a file, so that innocuous-looking picture “susie.jpg” might really be “susie.jpg.exe” – an executable Trojan! To avoid being tricked, unhide those pesky extensions. This is an option selected in Windows Explorer under ToolsFolder OptionsView.
  • If you are an online multi-gamer type, do not publish your I.P. address on websites or newsgroups, unless you are very sure that you are fully protected. You would be much better off logging into others’ game servers than inviting others to log onto your game server at a precise I.P. address.
  • Backup your system!
  • Turn off your computer when not in use. If you are not connected to the Internet, you cannot be infected, hacked or hijacked.
  • Reconsider storing personal information in your computer. Transfer it to a CD and use the CD when you need the information. This is especially true of passwords, SSNs, tax and financial records.

Scam Alert from LendingTree

LendingTree has issued the following alert: It has come to our attention that LendingTree, LLC’s name and logo were recently used by an illegitimate company in an attempt to defraud consumers. The imposter imitated LendingTree correspondence and paperwork to request advance loan fees before granting the loan and asked customers to send ‘insurance fee’ money via Western Union wire transfer.

FBI Alert

The FBI is aware of a spear-phishing e-mail appearing as if it were sent from the National Center for Missing and Exploited Children. The subject of the e-mail is “Search for Missing Children,” and a zip file containing three malicious files is attached. E-mail recipients should always treat links and attachments in unsolicited or unexpected e-mail with caution.  US-CERT recommends users and administrators review the FBI Internet Crime Complaint Center’s announcement and refer to the US-CERT Security.

 

FTC Warning

From FTC.gov – The Federal Trade Commission is warning small businesses that an email with a subject line “NOTIFICATION OF CONSUMER COMPLAINT” is not from the FTC. The email falsely states that a complaint has been filed with the agency against their company. The FTC advises recipients not to click on any of the links or attachments with the email. Clicking on the links may install a virus or other spyware on the computer.  The FTC’s advice: Delete the email. For more information on malicious software (malware), visit www.OnGuardOnline.gov/malware.

Source:

http://www.idtheftcenter.org/

Advertisements

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s