The Internet has become an integral part of our daily lives. It is used for work, learning, and exchanging information, as well as thanks to it, we can shop without leaving home. Unfortunately, the Internet is also used by people who use it to commit crimes. Through it, as in the real world, a whole range of them are committed. Internet users do not always realize how easy it is to become a victim of online fraud.
There is no need to stand in lines, we are not limited by opening hours. We can do our shopping today without leaving home, sitting comfortably in a chair in front of the computer, or riding the bus with a smartphone – all we need is an Internet connection. It’s fast, cheap, and 24 hours a day. You can conclude an insurance contract, open a bank account and buy almost anything. By the way, it is very easy to fall prey to the activities of cybercriminals, who in 99% of cases take advantage of inattention, haste, and human naivety, rather than advanced software or new technologies. When shopping online, we must not forget to be vigilant and use common sense – especially when browsing “special bargains.” By following a few basic rules, you can guard against the unpleasant consequences of fraudsters’ dishonest activity. It is better to lose three uncertain opportunities than to be fooled once.
Internet scammers in Grand Haven are a very real threat. They use a variety of tactics to try to get access to your personal and financial information. They may attempt to phish your information by sending emails or texts claiming to be from a legitimate source. They may also call you and offer you a “great deal” on a product or service. They may even try to convince you to send them money.
How not to fall victim to scammers?
First, remember the basic safety rules when using the Internet:
– use a regularly updated antivirus program;
– do not open links or attachments provided in questionable e-mails, as they may contain malware or will connect you to fake addresses used to extort money or steal your identity;
– make all bank payments using the HTTP protocol (marked with a padlock-shaped icon), ensuring data transmission security. It’s also a good idea to display a certificate certifying secure data transmission, as more sophisticated criminal perpetrators are able to use the https protocol, but do not have a security certificate.
How to “go shopping” on the Internet?
By following a few simple rules when shopping online, we can significantly reduce the risk of getting caught by the hook thrown by criminals. What should we do before we click the “buy now” icon on our screen?
– check opinions about the selected store – for this, we use Internet forums and services specializing in collecting this type of information;
– remember that an online store, like any other company, must have a landline phone numbers, address, and registration data – such as NIP and REGON numbers. There should also be a KRS (National Court Register) number, which can be verified online;
– the credibility of the store should be checked by telephone contact and e-mail;
– if you have any suspicions, you should at least for the first purchase check the condition of the shipment in the presence of the courier;
– it is good to use the offers of stores that offer the ability to track the status of the order;
– an important issue is the fact that there is a protocol for encrypting data on the store’s website when making purchases;
– before sending money, make sure that the order confirmation appears in our e-mail box;
– do not make transactions through the so-called “buying outside the auction” (scammers most often treat the auction site as a way to get a victim);
– after the auction is over, wait a few hours and contact the seller yourself to confirm the data needed for the transfer, remembering that the instant e-mail received after the auction may be crafted by a scammer.
However, what should you do if, despite your caution, you fall victim to a scam?
First of all, you should:
– inform the security administrators of the site in question as soon as possible;
– keep all documents related to the transaction, i.e. proof of transfer to a bank account, email correspondence, etc., as well as all correspondence with the seller keep records of conversations via instant messaging, and text messages;
– report the above documents to the nearest police station;
– when the fraud occurred at an online auction, complete the following data: the date and number of the auction, its subject and the amount bid, the nickname of the perpetrator of the fraud and his e-mail address, the method of contact with the seller – his e-mail, telephone number, address (e-mail correspondence should be saved in electronic form, for example, in *.eml format), the method of payment – transfer to a bank account, payment on delivery.
Do not forget to protect your personal information. This will protect us from getting entangled in the criminal activity of auction fraudsters, therefore:
– do not log in to services from a computer other than your own, as we cannot be sure that the computer in question is not running software for obtaining information that should be known only to us (sniffers, keyloggers) or even whether it has an antivirus program installed with up-to-date databases of malware.
– do not provide any data in response to alleged inquiries from the administration of the auction site, these are 100% prepared by fraudsters’ e-mails to take over our user account
– do not make payments and log in to services with your password in points of free public access to the Internet (so-called hot spots)
Nobody gives anything for free!

