Search
  • Videos
  • Enterprise Software
  • Windows 10
  • Cloud
  • AI
  • Security
  • TR Premium
  • more
    • 5G Guide
    • Build a Website
    • Hardware
    • Innovation
    • Best Smartphones
    • Executive Guides
    • Best VPN Services
    • Web Hosting
    • See All Topics
    • White Papers
    • Downloads
    • Reviews
    • Galleries
    • Videos
    • TechRepublic Forums
  • Newsletters
  • All Writers
    • Preferences
    • Community
    • Newsletters
    • Log Out
  • Menu
    • Videos
    • Enterprise Software
    • Windows 10
    • Cloud
    • AI
    • Security
    • TR Premium
    • 5G Guide
    • Build a Website
    • Hardware
    • Innovation
    • Best Smartphones
    • Executive Guides
    • Best VPN Services
    • Web Hosting
    • See All Topics
    • White Papers
    • Downloads
    • Reviews
    • Galleries
    • Videos
    • TechRepublic Forums
      • Preferences
      • Community
      • Newsletters
      • Log Out
  • us
    • Asia
    • Australia
    • Europe
    • India
    • United Kingdom
    • United States
    • ZDNet around the globe:
    • ZDNet China
    • ZDNet France
    • ZDNet Germany
    • ZDNet Korea
    • ZDNet Japan

The 12 scams of Christmas

7 of 13 NEXT PREV
  • The 12 scams of Christmas

    The 12 scams of Christmas

    This year, cybercrime has evolved to new and more sophisticated levels — far beyond the days of phishing emails by "lawyers" who need to transfer millions of dollars to your account on behalf of a long-lost African uncle. So, what do you need to keep an eye out for as Christmas approaches?

    Published: December 18, 2014 -- 16:10 GMT (08:10 PST)

    Caption by: Charlie Osborne

  • You've got mail

    You've got mail

    Security firm McAfee releases its annual "12 Scams of the Holidays" list as the holiday season approaches. To begin, while phishing emails are a year-round nuisance, as the holiday season approaches, consumers may be more likely to click on legitimate-looking emails promising deals, discounts and sales. In addition, shipping notifications from trusted sources such as FedEx are often replicated by cybercriminals and malicious links created to look legitimate. Keep tabs on your deliveries, check the website address and go to the legitimate website through a browser rather than email if you need to track a shipment.

    Published: December 18, 2014 -- 16:10 GMT (08:10 PST)

    Caption by: Charlie Osborne

  • It's free, honest

    It's free, honest

    There's no such thing as a free lunch, and the likelihood of an e-commerce website being able to offer you Christian Louboutin shoes for 95 percent off or a Boss suit for a few bucks is highly unlikely. When you're looking for this year's most coveted products, keep your eyes peeled and be wary of phoney competitions on social media, dodgy-looking links sent through an email and bogus gift cards.

    Published: December 18, 2014 -- 16:10 GMT (08:10 PST)

    Caption by: Charlie Osborne

  • Fake charity cheer

    Fake charity cheer

    Christmas is the time of giving, and many consumers will use the season to donate to their favorite charity. However, it is also prime time for cybercriminals to trick you into donating — to a fund outside of your chosen charity. Be wary of fake charities or pleas for help shared through emails and social media — especially if some kind of disaster is covered by the media. It is emotionally charged events and the season that cybercriminals will use to lure you in.

    Published: December 18, 2014 -- 16:10 GMT (08:10 PST)

    Caption by: Charlie Osborne

  • Point of sale malware, and the sad reality

    Point of sale malware, and the sad reality

    Sadly, there are some kinds of cybercrime you cannot protect yourself against. Point-of-sale (POS) malware, which hits retailers at the till, can lead to exposed credit card information. In these scenarios, the only thing you can do is keep an eye on your credit card statements and stay on top of security news.

    Image via CNET

    Published: December 18, 2014 -- 16:10 GMT (08:10 PST)

    Caption by: Charlie Osborne

  • iScam, thanks for the data

    iScam, thanks for the data

    Apps, a crucial element of mobile technology, have exploded in popularity as more and more consumers adopt smartphones and tablets. However, as consumers became more interested, so have cybercriminals — and malicious apps are more frequently being used to steal data. Check out reviews first before downloading new apps, and take note of what permissions the app asks for.

    Published: December 18, 2014 -- 16:10 GMT (08:10 PST)

    Caption by: Charlie Osborne

  • Season's Greetings, Merry Malware

    Season's Greetings, Merry Malware

    Digital e-cards are flung across the web during Christmas, and while well-known e-card websites are fine, be wary of unknown senders or cards that ask you to download software.

    Published: December 18, 2014 -- 16:10 GMT (08:10 PST)

    Caption by: Charlie Osborne

  • Travel deals too good to be true

    Travel deals too good to be true

    Travel is often at a premium price when the holidays come around — and cybercriminals will take advantage of this by promoting fake travel deals across email, social networks and legitimate-appearing websites. Not only will some websites simply take your money, but clicking on malicious links may install spyware. It is also worth noting that free, public Wi-Fi networks available when you reach your destination are not secure by nature, and you need to make sure your PC is up to date and you ignore any prompts to download software you did not want or recognize.

    Published: December 18, 2014 -- 16:10 GMT (08:10 PST)

    Caption by: Charlie Osborne

  • Bank robocalls, IT help

    Bank robocalls, IT help

    Fake phone calls, which often take the guise of IT technicians (I'm from Microsoft and we've scanned your computer, you are infected, we need money to clean it up), can dupe the less tech-savvy among us. In addition, automated "security agents" state that a user account has been compromised and personal information will be requested — including a password — to unlock an account. These are fake and must be ignored, as no business will ask for such details on the phone.

    Published: December 18, 2014 -- 16:10 GMT (08:10 PST)

    Caption by: Charlie Osborne

  • ATM skimming

    ATM skimming

    ATM skimming — the practice of installing devices on cash machines that read the data on a card's magnetic strip — increases in frequency as Christmas comes calling. Either a camera or keypad overlay is often used to skim cards, so use your hand to cover which numbers you punch in and look carefully at the ATM before use.

    Published: December 18, 2014 -- 16:10 GMT (08:10 PST)

    Photo by: ATM Keypad 2 image by William Grootonk, CC BY-SA 2.0

    Caption by: Charlie Osborne

  • Year in review

    Year in review

    Many news services send out "Year in review" features during the holiday season. However, some cybercriminals are known to target business email lists with industry-specific types that, unmasked, are phishing campaigns that could lead to malicious websites.

    Published: December 18, 2014 -- 16:10 GMT (08:10 PST)

    Caption by: Charlie Osborne

  • Bring your own... device

    Bring your own... device

    Christmas is here and the parties begin. Unsurprisingly, this is one time of the year when you'll hear at least one person bemoaning the loss of their smartphone while enjoying the bubbly. If you do, use a phone-tracking service such as Find my Phone on Android or Find my iPhone for Apple devices, and immediately change the passwords to any accounts connected to your mobile.

    Published: December 18, 2014 -- 16:10 GMT (08:10 PST)

    Photo by: Charlie Osborne | ZDNet

    Caption by: Charlie Osborne

  • The risk of USB freebies

    The risk of USB freebies

    During the holiday season, you may see an increase in gift baskets from vendors who want to continue doing business with your company. One popular gift is branded USBs — but be aware that pre-installed malware may come installed on them.

    Published: December 18, 2014 -- 16:10 GMT (08:10 PST)

    Caption by: Charlie Osborne

7 of 13 NEXT PREV
Charlie Osborne

By Charlie Osborne for Zero Day | December 18, 2014 -- 16:10 GMT (08:10 PST) | Topic: Security

  • The 12 scams of Christmas
  • You've got mail
  • It's free, honest
  • Fake charity cheer
  • Point of sale malware, and the sad reality
  • iScam, thanks for the data
  • Season's Greetings, Merry Malware
  • Travel deals too good to be true
  • Bank robocalls, IT help
  • ATM skimming
  • Year in review
  • Bring your own... device
  • The risk of USB freebies

What scams and schemes do you need to watch out for during the holiday season?

Read More Read Less

Season's Greetings, Merry Malware

Digital e-cards are flung across the web during Christmas, and while well-known e-card websites are fine, be wary of unknown senders or cards that ask you to download software.

Published: December 18, 2014 -- 16:10 GMT (08:10 PST)

Caption by: Charlie Osborne

7 of 13 NEXT PREV

Related Topics:

Security TV Data Management CXO Data Centers
Charlie Osborne

By Charlie Osborne for Zero Day | December 18, 2014 -- 16:10 GMT (08:10 PST) | Topic: Security

Show Comments
LOG IN TO COMMENT
  • My Profile
  • Log Out
| Community Guidelines

Join Discussion

Add Your Comment
Add Your Comment

Related Galleries

  • 1 of 3
  • The Nightmare in Silicon Valley: 8 horror technologies that should scare you to death

    Every night is fright night with what can happen once these scary technologies take hold in ways that you may not have imagined.

  • Julia programming language, cloud computing, cybersecurity worries: Research round-up

    All the facts and figures that matter to you and your business from the past month in technology news.

  • YubiKey 5Ci: USB-C and Lightning Security Key

    The world’s first Lightning-compatible security key

  • 10 Linux distros: From different to dangerous

    One of the great benefits of Linux is the ability to roll your own. Throughout the years, individuals, organizations, and even nation states have done just that. In this gallery, we're ...

  • 2019's tech, security, and authentication trends

    We take a look at the top tech, cybersecurity, and authentication trends as revealed today by the Duo Security's 2019 Trusted Access Report, which includes data from 24 million devices, ...

  • The world's most famous and dangerous APT (state-developed) malware

    A list of the most dangerous, effective, and most well-known malware strains that have been developed by the cyber-security units of various countries' intelligence and military ...

  • Best-paid tech jobs, malware warnings and shadow IT: Research round-up

    All the facts and figures that matter to you and your business from the past month in technology news.

ZDNet
Connect with us

© 2019 CBS Interactive. All rights reserved. Privacy Policy | Cookies | Ad Choice | Advertise | Terms of Use | Mobile User Agreement

  • Topics
  • All Authors
  • Galleries
  • Videos
  • Sponsored Narratives
  • About ZDNet
  • Meet The Team
  • Site Map
  • RSS Feeds
  • Reprint Policy
  • Manage | Log Out
  • Join | Log In | Membership
  • Newsletters
  • Site Assistance
  • ZDNet Academy
  • TechRepublic Forums