Issues Related to Online Purchases

Overspending on Real Goods

With a host of online retail, auction and daily deals sites it’s easy to get carried away and spend more than intended. (This is especially true considering that most online purchases are made using credit.)

Overspending on Virtual Goods

The market in “virtual goods” – items and services that exist only online – reached 653 million dollars in 2011. Many of these goods relate to online games: from purchasing the games themselves, to upgrading avatars, purchasing items or getting through levels more quickly. Apps for mobile devices are also popular purchases online. (Apple claims to offer over 500,000 Apps for its iPod, iPhone and iPad platforms).

Security Tips

Whether overspending is on physical or virtual goods, there are a number of tools and strategies that can help keep this under control.

  • Since most online purchases are done using credit, keeping the spending limit on a credit card low – or using prepaid credit cards – can help curtail impulse buying. Some retailers such as iTunes allow parents to give their children a set “allowance.”
  • Watch for hidden fees, shipping and handling, or customs fees, when buying physical goods online.
  • When buying any virtual product or service, make sure to read the description and service agreement carefully.
  • Finally, parents should talk to their children about some of the risks associated with buying things online and make sure they understand that many virtual goods cost real money.

Identity Spoofing

Online identity spoofing is when someone else impersonates either you or your computer. Professional scammers have been known to impersonate famous actors, musicians, and athletes as well as other important political and corporate figures. For example, in 2010, Interpol Secretary General Ronald Noble had two Facebook accounts opened in his name by cybercriminals. They then used the profiles to contact various police departments to elicit sensitive information about police investigations.

IP Address Spoofing

Spoofing an IP address involves changing the header of an Internet protocol address (that allows servers to know where information is coming from) to match someone else’s IP. If your IP address is spoofed, this may cause you to be associated with illegal activities like hacking websites, and may also provide a hacker with access to systems that read your computer as “trusted.”

Security Tips

  • It is difficult to fully guard against identity spoofing, as services such as Facebook and Twitter allow anyone to set up an account in any name. To report a spoofed Facebook page, you need to first have a Facebook account: then go to the spoofed profile, click the button next to “Message” and select “Report/Block.” Then click “This profile/timeline is pretending to be someone or is fake” and then “Pretending to be me” and finally “Continue.” If you have been spoofed on Twitter, file a report at this address: https://support.twitter.com/forms/impersonation.

  • To avoid having your own Facebook or Twitter account hacked into, never share your password with anyone and make sure to sign out of each service before you close the tab or window.

  • Your IP address is most at risk when you are using public Internet hotspots at places such as airports or coffee shops. When using these, it is a good idea to use an IP anonymizer such as Hotspot Shield (http://www.hotspotshield.com/) which temporarily assigns you a random IP address so that your computer’s own IP address is not compromised.

Identify Thefts

Data Theft

Identity theft is the deliberate use of someone else’s identity, usually as a method to gain a financial advantage or obtain credit and other benefits in the other person’s name, and perhaps to the other person’s disadvantage or loss.The Internet provides innovative ways for people to steal personal information and to commit fraud. Thieves can obtain your information in several different ways, such as spreading viruses that install key loggers (programs which record everything you type) on your computer to discover your passwords, usernames and credit card numbers.

Many online businesses store personal information about customers and shoppers on their websites so that it can be used for quick and easy service when a customer returns to the website. While convenient, this also provides another way for personal information to be accessed: for example, in 2011 Sony experienced a data breach that resulted in 77 million of their Playstation Network users having their personal information stolen. A Sony spokesperson admitted that it could not predict or protect against the next attack because of the nature of hackers – all the more reason to not permit companies to store credit information on their websites.

Identity theft can go beyond criminals using personal information for monetary gain: this information may also be used to obtain legal documents such as a driver’s licence, health card, social insurance number and passport. This was the case for Stancy Nesby, who was arrested or detained seven times from 2002 to 2004 because her identity had been used in 1999 by a woman with an outstanding warrant for her arrest. It was not until four years later, and a lawsuit against the city of San Francisco, that the warrant was finally corrected.

Security Tips

A good start for preventing identity theft is not giving out any unnecessary information. Be especially careful in protecting your social insurance number.
In addition:

  • Make sure your online accounts have strong passwords: a good password includes both lower and upper case letters as well as a mix of numbers and non-letter characters (such as @ or #) and is at least eight characters long. It’s a good idea to have different passwords for different online accounts, so that if one is compromised the others are safe: you can do this easily by having one “master” password and putting the first and last letter of each online service at the beginning and end, so that if your master password is B!u3b3rrY your Facebook password would be FB!u3b3rrYk.
  • Ensure that any website requiring personal information has a clear and comprehensive privacy policy that explains in detail how your information may be used.
  • Never send personal information via email: email is not secure.
  • Social networking sites are a breeding ground for identity thieves. You should never accept a request to be friends from someone you don’t know and you should also be careful and selective about what type of information you post and share online.

The Office of the Privacy Commissioner of Canada (OPC) is one of many organizations that provides valuable facts and information about identity theft, including preventative measures to identity theft concerns. For consumers who believe they are a victim of identity theft, the OPC recommends taking immediate steps to protect yourself by placing fraud alerts on your credit cards, filing police reports, and filing a complaint with the Office of the Privacy Commissioner.

Types of Online Scams

Auction Fraud

Online auction fraud is common and one of the most complained-about online issues today. Credit card fraud is a wide-ranging term for theft and fraud committed using or involving a payment card, such as a credit card or debit card, as a fraudulent source of funds in a transaction. You can run into several different scams when shopping online. While making purchases on an online auction site such as eBay, for example, you could end up paying for stolen or counterfeit goods, or for goods that never arrive at all. In addition to this, sellers can place false bids on their own goods to drive their prices up or could include disproportionately large or hidden shipping and handling fees.  A healthy dose of skepticism and caution is definitely required when shopping online: some sellers, unfortunately, take advantage of the scarcity of popular products such as the iPad or Nintendo 3DS to defraud buyers.

Email/IM Phishing Scam

The main goal of these scams is to obtain personally identifiable information or to get access to credit cards or bank accounts. Phishing is when someone attempts to lure you into compromising your password information through emails (usually claiming to be from a bank) and Web pages that appear to be legitimate but are not the real thing.

Keep in mind that banks and other financial institutions never contact clients by email first. If you think there may be a problem with your bank account or credit card, call your bank or credit card company or go to their legitimate website (remember to confirm that the Web address starts with https, as in https:www.abank.ca.)

There are a number of signs that can raise red flags about the legitimacy of emails that claim to be from a financial institution:

  1. They request your password or account number. Banks will never ask you to “confirm” these.
  2. They say you need to act immediately. These emails often try to prey on your fears by saying that your account will be closed if you don’t act right away.
  3. They make spelling or grammar mistakes.
  4. The link they want you to click has a long URL, often with a lot of meaningless numbers and letters. Banks actually keep their URLs as short as possible to help you remember them.
  5. They don’t look or feel quite right. Phishing URLs sometimes try to copy the logo or other visual elements of a bank or financial institution, but they often don’t get it quite right. Even if it looks right, don’t trust an email claiming to be from a financial institution if it fails any of these tests.
Scareware

Scareware is the term used to refer to online “pop-up” alerts which claim to have detected a virus or other problem on your computer. These often claim to be from Internet security companies or from law enforcement agencies. Clicking on one of these can have a variety of negative effects, from downloading malware onto your computer to exposing your personal information. In some cases clicking on a scareware pop-up will simply freeze your computer, after which the scammers will try to extort money from you in exchange for unlocking it.

Scareware can generally be avoided by running a pop-up blocker. Most browsers allow you to determine whether or not you see pop-ups:

  • In Internet Explorer, select Tools, then Pop-Up Blocker
  • In Firefox, select Tools, then Options, then Block Pop-Up Windows
  • In Chrome, select Options, then Under the Hood, then Content Settings (under Privacy), then Pop-Ups and select “Do not allow any site to show up (recommended)”
  • In Safari, select Preferences, then Security, then Block Pop-up Windows

Running a reliable Internet security program will also help keep you from receiving malicious pop-ups, as will some add-on programs such as AdAware and NoScript.

419 Scam

This scam, also known as the advance fee scam, starts with an email from someone who claims to need your help moving money out of another country. The catch is that you must provide some money up front, supposedly to cover a transfer fee, with the promise of receiving a small fortune when the task is complete. [14] Victims of this fraud typically lose thousands of dollars.

Chain Letter Scams

Chain letter scams involve sending an email to a large list of contacts which prompts them to forward it to their own contacts, and so on. In the email you are asked to send a small amount of money to a certain number of contacts and to add your name to the contact list. This supposedly guarantees that in the end a large amount of money will come back your way. The problem with this is that it is a modern-day version of a pyramid scheme: only the original senders ever make any money. Chain letter scams of this nature are illegal in most countries, including Canada and the U.S..

Postal Forwarding/Reshipping Scam

In this scam you are asked, either through emails or online job postings, to receive and then re-ship goods for a foreign company. The goods that come your way, however, are usually stolen or acquired through credit card fraud, making you an accessory to the scammers’ crimes.

“Congratulations, You’ve Won an Xbox…” Scam

This scam begins with an email telling you that you have won a popular gadget, such as a new gaming console, but to receive it, you have to submit your bank account or credit card information to cover shipping charges. Not only will you lose that money but you may also have your bank account or credit card compromised. If you legitimately win a product you will not be asked for any personal financial information or to pay for the shipping.

Gaming Console Threats

Because most gaming consoles today are able to connect to the Internet, they are now susceptible to some of the security issues that are associated with computers. While viruses have not yet become a problem with gaming consoles, the breach of Sony’s Playstation Network – which compromised the data of 77 million users – indicates that hacking and identity theft are a potential risk when using consoles.

Understanding Spams

Spam Email

Spam Email is often disguised in an attempt to fool any anti-spam software you may have installed. Spammers try to find ways to modify or conceal their messages to achieve this, such as putting spaces between letters or replacing key letters with numbers or characters so that spam filters will not be triggered. While your anti-spam software may not always be able to catch this, you should be able to identify it fairly easily. Spam may be used to bombard you with unsolicited messages, which may include inappropriate or offensive adult content. Spam may also contain malware or be part of a “phishing” scam (see the Online Scams section below).

Instant Messaging (IM) Spam

Instant Messaging spam (IM Spam) is similar to spam email. The main difference is that rather than focusing their efforts on bombarding your email inbox, spammers attempt to fool you on an instant messaging service such as BlackBerry Messenger or Apple’s iMessage. While not as common as spam email, IM spam is more difficult to block out because no particular software exists specifically for spam received while using instant messaging services. A good way to avoid most of it is to create a closed list of friends from whom instant messages are accepted. Even then, it is always possible that a computer belonging to someone within your “safe” list could become infected, so any strange link you receive via IM should be verified before you click on it.

Forum and Comment Spam

Spam is also often found in online forums and discussion boards and in the comments sections of online newspaper and magazine articles Spammers can attack these by posting spam messages as comments. These may be simple ads but can also include links leading to malicious websites.

Mobile Phone Spam

It is possible to receive spam messages through email, text messages or even phone calls on your mobile phone. On top of the usual issues with spam, you may be charged for these unsolicited text messages or pay valuable minutes for the intrusive phone calls.

SPIT (Spam in VoIP Sessions)

SPIT (Spam over Internet telephony), or VoIP

(Voice over Internet Protocol) spam, comes as a phone call using VoIP. While it is not yet very common, the biggest problem surrounding SPIT is that on average, voice messages are 10 times larger than email messages and therefore consume a lot of bandwidth. This could lead to significantly decreased call clarity and quality. The prevalence of SPIT is expected to rise as the same sources that produce large amounts of spam email can easily modify their messages into VoIP spam calls.

Spam, Scams, Frauds and Identity Theft

Spam refers to unsolicited bulk messages being sent through email, instant messaging or other digital communication tools. It is generally used by advertisers because there are no operating costs beyond that of managing their mailing lists. It could also take place in chat rooms, in blogs and more recently within voice over internet conversation (such as Skype). Beyond being a simple nuisance, spam can also be used to collect sensitive information from users and has also been used to spread viruses and other malware.

Online identity theft is the theft of personal information in order to commit fraud. This can happen through your email account but it can also be a result of online purchases or other situations where you give out sensitive information such as your credit card information or your social insurance number.

A related concern is identity spoofing, in which the victim is impersonated on social networking sites such as Facebook or Twitter. Identity spoofing may also involve spoofing someone’s IP address (the unique number associated to your computer as you surf the internet). The purpose of identity spoofing on social networking sites can range from a simple prank to more serious attacks aimed at shaming or hurting someone’s social networks. Internet Protocol spoofing is used by hackers to cover their tracks or to gain access to places normally closed to them.

Risks relating to online shopping can include overspending or receiving items that do not match their description once you have already paid for them (or not having received any item at all). Because of the distance between the buyer and seller online, shopping on the Internet puts consumers particularly at risk of receiving shoddy goods.

The best defenses to these online scams and frauds generally rely on caution and skepticism when using the Internet. For example:

  • You should only open email from trusted senders and use spam filters or anti-spam software (some anti-spam software is available online free of charge, such as Spamfence).
  • Verify any request for your personal information online before responding. For example, no reputable financial institution will ever ask you for highly personal information via email: to find out if a request is legitimate, call your bank or navigate to their website (do not follow links in an email claiming to be from a bank or credit card company).
  • Don’t give out personally identifiable information (your full name, your age, your address, your social insurance number, etc.) without a good reason.
  • Turn any device that uses the Internet to offline mode when they are not in use (most mobile devices have an “Airplane mode” that turns off their Internet functions).
  • You can also help to minimize your risk by visiting only trusted sites.

The sections that follow give more detail on these threats and more detailed security tips for each.