ACMA warns of Do Not Call Register telephone scam
- 17 December, 2012 14:48
Australian consumers are being advised to hang up on scammers who claim they are owed money for receiving telemarketing calls while registered on the Australian Communications and Media Authority's (ACMA) Do Not Call Register.
An ACMA spokesman told Computerworld Australia that the scammers usually request an upfront payment of $149 in order to process the compensation funds which can vary from $300 up to $3000.
“The Do Not Call Register does not contact people to advise that they are entitled to compensation, or to confirm personal details,” he said in a statement.
"People should not provide any personal identification or financial details to scammers claiming to represent the Register."
He added that the Authority had been targeted in a variation of the scam during October 2011 where consumers received calls from people claiming to be from the Data Protection Council which is part of the ACMA.
In addition, the authority reported last year that callers were requesting fees to add a person’s number on the Do Not Register list.
Follow Hamish Barwick on Twitter: @HamishBarwick
Join the CIO Australia group on LinkedIn. The group is open to CIOs, IT Directors, COOs, CTOs and senior IT managers.
Trust issue looms large for tech companies capitalizing on personal data
5 women who've made it in IT
Five trends affecting legal CIOs
CIO Roundtable: The changing face of security
Bitcoin malware count soars as cryptocurrency value climbs
Cloud-Based Mobile Device Security Streamlines Data Protection
Read this white paper to learn why cloud-based security offers superior protection that meets today’s requirements for identifying and preventing access to malicious sites and applications while reducing management complexity and IT staff time and effort. This whitepaper discusses: • Increased use of mobile devices and the associated risks • Ways to address security challenges • Benefits of cloud-based anti-malware solutions
Leading insurance provider’s desktop virtualization deployment
QBE insurance group met the challenge of swiftly deploying a desktop virtualization solution, after practically outsourcing its entire IT department overnight. Read their story to learn how to allow users a comfortable desktop while ensuring that IT can maintain control.
Implementing an Effective Vulnerability Management Program
Your company's information is often not secured in a large safe which can be easily protected. Instead, information is spread across many systems, networks and devices exposing it to a higher possibility of it being compromised in some way. This paper discusses the challenges of vulnerability management - human, implementation, changes, and software and how to overcome these by implementing an effective vulnerability management program.