Stolen Phones to Become Useless

Front view of a closed Verizon Wireless LG EnV...

Front view of a closed Verizon Wireless LG EnV3 mobile phone. This phone is also known as the LG VX9200 (Photo credit: Wikipedia)

‘The US Federal Communications Commission (FCC) announced Tuesday that it had reached an agreement among the nation’s four biggest wireless carriers — AT&T, Sprint, T-Mobile, and Verizon Wireless — to create databases within six months that will track blacklisted stolen phones. Within 18 months, the databases will be linked and shared among all wireless providers…’

How to Spot Scams on Your Pinterest Page
How to Prevent Scammers From Making Money Off Your Pinterest

‘…What you need to do is keep an eye on who is pinning the things you like. Check out users’ profiles and look for the key signs of a bot: an unusual name, the lack of profile photo (or a stock image of an unusually attractive lady in a provocative pose), a link to a (suspended) Twitter account, and five empty boards. The sixth board? That’ll be full, with a ridiculously high number of pins.
If that simple test is too much, there’s an even easier way to check by looking at the repin profile on the pin you like found on the bottom of each page. A real pin will feature an assortment of profile pictures and a collection of genuine-sounding names. Also, the pin will likely to have been stuck into a wide variety of customized boards, often with unique and creative spelling (c’mon, you all have one called Wannnttttttt!, right?)…’

How Fortune 500 Abets Scams
Facebook ‘Likejacking’ scams can fool even the savviest users. But behind the scammers lie some of the powerful marketing firms in the world

‘Is that Facebook hottie you just friended interested in more than just being friends? Yes, but not in the way you might hope. She’s probably after your data, and possibly much more.

‘In a TY4NS post about the scourge of Social Media Spam last week I noted how easy it is for scammers to create bogus accounts they can use for spammy purposes. Even allegedly tech savvy types can be taken in. Exhibit A: A Facebook account for one “Jessica Ceceli,” which used photos of beguiling Japanese adult star Maria Ozama to lure unsuspecting geeks – including some highly recognizable tech journos – into befriending her.

‘Shortly after I posted that item Jessica changed her account name to “Nadja Castelle.” Everything else remained the same…’

Free Virus Removal Tool from Sophos
Sophos has just released its Virus Removal Tool. Designed to be child’s play to use, it detects and, more importantly, disinfects all those nasty viruses, spyware, rootkits and even fake anti-virus with its flagship industrial-strength anti-virus.

Best of all it is free, and for Naked Security readers, there are no details to enter before you can download and use it.

Actually, really best of all, there is no need to remove existing anti-virus that is already installed.


About DigitalPlato

Poch is a Bookrix author and a freelance writer. He is a frequent contributor to TED Conversations.
This entry was posted in computer, CRIME, cybercrime, social networking, TECHNOLOGY. Bookmark the permalink.

What do you think?

Please log in using one of these methods to post your comment: Logo

You are commenting using your account. Log Out /  Change )

Google+ photo

You are commenting using your Google+ account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )


Connecting to %s