internet news hass associates warning article code 85258083266-HA STOCKTON - Twenty-four-year-old Stocktonian Bryan Rose is desperate for any type of work these days. Recently, he turned to Craigslist.org's job board and found an ad offering $300 a week. All he had to do was have his vehicle wrapped with a company's advertising, at no cost to him, and drive it around. Simple. Easy money. Turns out it was a sophisticated scam, and Rose and his wife are now out $2,175, most of which they owe to their bank. Rose gets paid for 60 hours a month working as a home-health aide, leaving very little to support himself, his wife and the family dog, let alone repay their bank. In mid-April, Rose applied through the ad and was contacted May 3 by a person using the name James Browne from J-Controls. Within a week, he received a packet. Two addresses were associated with Browne and J-Controls, one leading to a large home in the upscale northeast Atlanta suburb of Suwanee, Ga., and the other leading to a modest home in a working-class neighborhood of Akron, Ohio. On the other end of a phone number with a Maryland area code provided to Rose is an erratic message leading directly to voice mail. In hindsight, Rose discovered that none of the information he was provided could be verified as legitimate. "They sent me a $1,900 check. We were supposed to keep $300 for ourselves for the first week of advertising. A couple of days later, they contacted us, saying sorry for the inconvenien...
Join our network of non-profits, companies and individuals who believe social change can happen through design.Become A Member
Member since February 16, 2013
Communication, Environmental Design
Posted May 28, 2013 in Hass Associates
reference code 85258083266, hass internet technology reviews
reference code 85258083266, hass internet technology reviews Question: I fell for one of those Facebook scams. How do I make sure none of it is left on my Timeline and avoid that kind of mistake in the future? Answer. This question most recently came from a friend who, in a moment of weakness, tried to claim an alleged offer for two free tickets on Southwest Airlines. First, this person reported seeing the free-tickets ad on the profile of a trusted friend. A click on that opened a tiny browser window (unnoticed at first) and then copied the same scammy ad to my friend's profile. It also opened a normal-sized browser window asking for personal information to claim the free tickets; my friend was suspicious enough by then to provide an incorrect birthday and back out after being asked to pay $9.99 a month. But at that point, the bogus ad had littered the profiles of many Facebook pals. Later on, my friend also received telemarketing calls, spam text messages (if you get those, ask your carrier to waive any charges you'd pay to receive them), and about 50 more junk e-mails a day than before. What happened here? The scam worked by exploiting a form of temporary authentication Facebook (like other sites) uses to avoid asking users to enter their passwords all the time. Frederic Wolens, a Facebook security manager, explained that "user access token" hijacking enables the scammer...
Posted April 30, 2013 in Hass Associates