Police Warn Holiday Makers About Fake Travel Website.

Police Warn Holiday Makers About Fake Travel Website.

Action Fraud (Holiday)

Holiday makers are being warned about the dangers of online fraud when booking a trip this summer.

It comes as a new report reveals that 1,500 cases of Holiday fraud have been reported to the Police in 2014. The people behind the scams have stolen around £2.2m from travellers they have duped, the average loss was around £889.

Many tourists only found out they had been scammed when they arrived at there accommodation and discovered no booking was ever made.

The findings come from the City of London Police, who have joined forces with Get Safe Online which is a government supported organisation and the UK travel association ABTA to highlight some of the scams tourists could fall victim to in the coming months.

The have published a free PDF which offers advice on spotting holiday scams.

The most common type of scam involves the fraudsters setting up a fake website and adverts so they can trick you into believing you are dealing with a genuine holiday company.

Most people who fall victim to the fraud pay in ways that make it almost impossible to get their money back, like bank transfer.

People booking caravan holidays in the UK are also being targeted by the fraudsters posting a fake advert on Facebook, Gumtree and Craigslist.

Another way the scammers can lure victims is by offering a ‘free’ holiday at a seminar, where they are then sold a fake timeshare.

If you believe you have been a victim, or if you are worried about a booking that you have made, call Action Fraud on 0300 123 2040 or use it’s fraud-reporting tool


Share Button

Pensioners Warned to Keep a Look Out for Fake NS&I Website

Pensioners Warned to Keep a Look Out for Fake NS&I Website


On line scammers are trying to con pensioners out of their hard earned cash by using a fake website that clams to be the official National Savings & Investments (NS&I) site, they claim to offer an opportunity for a 65+ Bond.

Action Fraud have said that some of Googles searches for the NS&I website are producing fake results. If a person clicks on the fake site and submits their details, the scammers will then follow up with an email or phone call asking for proof of ID and their bank details.

Many of the emails Action Fraud have been seeing will be addressed “To whom it may concern” and signed “Best Regards, Kevin Archer”

You can see what the fake site looks like on the official NS&I site, although its highly likely that its appearance will change as people become wise to this scam. The NS&I site is also showing a typical email the fraudsters are currently sending out, ‘Pensioners have until 15 May to open a 65+ Bond which pays between 2.8 and 4 per cent.

The warning came a month after Steve Webb, pensions minister in the previous Government, predicted a “plague’ of pension-related scams, as fraudsters exploit the confusion about the new regulations that kicked in 6 April.

He said at the time: “If you are promised a really eye-catching interest rate above what you are expecting it’s almost always too good to be true”

To stay safe only visit the official NS&I website. NS&I will never try and sell you anything over the phone.

To report a scam email from NS&I, forward it to phishing@nsandi.com. If you think you have fallen victim to a scam phone NS&I on 0500 007 007.

For more information and advice on how to avoid pension scams, visit the Government’s pension Wise website. It reveals tactics that the fraudsters commonly use.

Share Button

Are Scam Downloads Getting Harder to Spot?

Are Scam Downloads Getting Harder to Spot?

Scam Alert

Malwarebytes have revealed the latest strategy’s that are being used by scammers, which has worryingly shown that the scams are getting harder to stop.

You might have decided you need a new antivirus program from a trustworthy company like AVG, Malwarebytes, Norton or McAfee. It downloads without any problems, you accept the terms and conditions and the familiar installer starts, all seems to be going fine until half way through the installation when you get an error message that advises you to ring a phone number. You could easily think this is the antivirus helpline.

But you would be wrong! In fact this is the latest trick used by scammers to steal your money. The software is fake and if you call the number in the error message, you will get through to an Indian call center where they will tell you your computer is crawling with viruses and that they will clean if for a fee. Of course this is a lie.

This type of scam is easy to fall for, but what is worse is that fraudsters are starting to hack genuine security programs so that you pay them instead of the software company. Malwarebytes have detected criminals doing this. Senior security researcher Jerome segura, said: “A few weeks ago we documented a US-based company using our software against our Terms and Conditions. They were charging four times the price and worst of all the license keys were all pirated.”

Its not difficult for criminals to build fake programs that mimic legal ones. Egemen Tas, Comodo’s Vice President of Engineering said that Scammers don’t need to create a fake antivirus from scratch, instead they can “simply take a genuine AV product, modify it and distribute it”.

So how can you protect yourself? You should only download programs from the developers’ official site, or from a reputable site like CNet, TechSpot, or FileHippo. You also need to be cautious when using the Windows Store on Windows 8, as it was recently reported by technology site How to Geek as being filled with fake software.

Malwarebytes, which highlighted these scams on its blog, says that a fake version of genuine software will be flagged by Windows before you download it with the following message: ‘The publisher could not be verified’ or ‘driver have been altered’. These warnings mean the download has not been digitally signed by the programs developer, most reputable software should all be signed. You should click Cancel, not Run, and leave the box ‘Always ask before opening this file’’ ticked.

So despite the increasing deviousness of the scammers you can still shield yourself from their attack, Thankfully, it’s not impossible to spot them, but its definitely getting harder. So stay alert and above all keep safe from these scammers!!!!!

Share Button

Gameover Zeus Email Scam Returns

Gameover Zeus Email Scam Returns

The Gameover Zeus email scam has returned and in the form of a scam email that is claiming to be from NatWest. Security Company Malcovery spotted the scam on 10th July, the malicious email claims to contain your online bank statement in the form of an attachment. If you open this it could leave your PC at risk, as not all antivirus programs are able to detect the malware at present.

International police took down Gameover Zeus and Cryptolocker for two weeks back in June of this year. Malcovery said the hackers behind Gameover Zeus have boosted the infrastructure so it is more resistant to further police action. “This discovery has shown the criminals that were responsible for the Gameover Scam do not intend to give up just yet on their botnet even after they suffered one of the most expansive takeovers/takedowns in history”.

The criminals that are behind this malware still have the same goal – taking your money. It is estimated that the people behind the Gameover Zues scam have be responsible for the theft of £100m since 2007.

For more information you can read Malcovery’s Blog Post

Share Button

Beware of Scam E-mails That Offer Anti-CryptoLocker Protection

Beware of Scam E-mails That Offer Anti-CryptoLocker Protection

We have all been warned about the new phishing scam that falsely claims to help protect you and combat the CryptoLocker ransomware.

There is now an e-mail going around that asks if you have a CryptoLocker infection, and will then advise you to “Use the attached tool to decrypt your files”, and wish you good luck.

RegistryCleanerKitIf you click on the link it will download a tool called ‘cryptolocker-file-de.exe’, it will install a legitimate piece of software called RegistryCleanerKit made by a Malta based company Uniblue. It then scans your registry, once finished shows you how many problems you have, to fix them you have to buy the software. At no point does it ever attempt to or is capable of decrypting the files locked by CryptoLocker.

Bullguard uncovered the scam on June 11; just nine days after the servers running the CryptoLocker and the Gameover Zeus botnet were disabled by international Police.

Over a two-week period ISP’s sent out e-mails to everyone with an infected computer, with instructions how to get rid of the malware. They also directed people to the Get Safe Online Website, were it shows you links to various products to help remove Gameover Zeus and other malware.

A bullGuard researcher said, “The scammers are just trying to exploit your fears and uncertainty”. They also said “we can expect to see more e-mails like this over the coming weeks”.

Share Button