Fake bushfire appeal emails flagged: ACCC
- 17 January, 2013 14:40
Scammers are targeting Australian households with emails asking people to donate to phony bushfire appeals, according to the Australian Competition and Consumer Commission (ACCC).
An ACCC spokesperson warned that scammers have been known to take advantage of people’s generosity in the aftermath of disasters such as the Victorian bushfires of 2009.
“If approached online, the person may be directed to a website that looks much like those operated by real charities, with official looking logos and information, but which in fact is subtly different,” the spokesperson said in a statement.
According to the ACCC, the online scammer will insist on payment by a money transfer service meaning that recovery of any money sent will be difficult.
“If you receive an email from an unverified sender, do not click on any links or open attachments and press delete,” said the spokesperson.
“Not only do these scams cost people money, they also divert much needed donations away from legitimate causes.”
However, Australians who do want to donate to a legitimate charity can check the organisation’s credentials at the Australian Charities and Not-for-Profits (ACNC) website.
The ACNC register contains details of all 56,000 registered charities in Australia and links to the Australian Business Register where consumers can check if a charity has deductible gift recipient (DGR) status.
“It is important to note that donations to a charity without DGR are not tax deductible,” said the ACCC spokesperson.
Follow Hamish Barwick on Twitter: @HamishBarwick
Join the CIO Australia group on LinkedIn. The group is open to CIOs, IT Directors, COOs, CTOs and senior IT managers.
Five trends affecting legal CIOs
CIO Roundtable: The changing face of security
Bitcoin malware count soars as cryptocurrency value climbs
Bouncing Back From CIO Unemployment
Union slams latest fibre-to-premise trial in Tasmania
Whitepaper: Preventing Data Loss Takes More Than MDM
You need to secure your BYOD devices—but MDM alone isn't enough to prevent data loss. Read this whitepaper—Data Loss Prevention: When MDM Is Not Enough—to learn how to combat MDM shortcomings. See how to add cross-platform security, implement protection policies, and address risks in consumer apps.
Assessing IP Telephony Total Cost of Ownership
Understanding total cost of ownership (TCO) of IP telephony (IPT) and unified communications (UC) implementations is critical to sound decision making. Based on data gathered from 211 Enterprises, this whitepaper reveals TCO for each vendor across a range of implementation sizes.
Protection Storage Architecture: The What, Why, and How
Traditional backup architectures lack the flexibility, agility, and scale to meet new data protection challenges and requirements. That’s where a Protection Storage Architecture comes in. This whitepaper details how transformational architecture enables backup teams to solve immediate tactical challenges, while helping to evolve IT teams.