Protecting Privacy With Ted’s Privacy Code 2.0 Report

Beware the “Nigerian prince” offering riches.

I think we’ve all seen the poorly worded email that promises to pay out millions of dollars if we would just send some vital information and/or cash to help.

The Nigerian prince was one of the earliest scams to start hitting our inboxes when email was born.

Luckily, the scammers didn’t invest in proper English grammar and punctuation, until more recently, making those scam emails much easier to spot and delete then.

But over the past couple of years, the fake emails have become harder to spot and a lot more insidious.

And surprisingly, the scammers have gone back to an old-school method: snail mail.

Is there a new threat waiting in your mailbox?

A New Target and a New Price

Affluent areas of Washington, D.C., and Northern Virginia had letters hitting mailboxes this summer that demanded a payoff of several thousand dollars in bitcoin, if the receiver didn’t want certain incriminating evidence revealed to his wife, family and neighbors.

In late July, the Jacksonville, Florida, division of the FBI warned residents of a blackmail scam claiming to have evidence of adultery. If the person receiving the letter didn’t pay a bitcoin ransom, then the information would be revealed to the recipient’s family or spouse.

Scammers have shifted gears to demanding bitcoin payments due to its anonymity and difficulty to track.

The FBI’s Internet Crime Complaint Center has seen a rise in reports of extortion attempts in the form of both email and letters. The adultery scam letter has been reported across the country.

Take Control of Your Privacy

Protecting your privacy has become a nonstop battle. Scammers are constantly looking for ways to steal your information and your wealth.

The FBI warns that it is critical to regularly update your usernames and passwords.

But there is more you can do to protect your identity and money from theft.

Ted Bauman, editor of The Bauman Letter, has created a special privacy report that details steps you can take to guard against hackers and scammers.

He shows you how to encrypt your computer and come up with a password that even the best computers couldn’t crack.

Whether the attack comes through email, malware on your computer or an old-fashioned letter in the mail, there are critical steps you need to take now to not only protect yourself from being a target but from falling victim to a scam.

Be sure to check out Ted’s Privacy Code 2.0 report. Get the knowledge and tools you need now.

Regards,

Jocelynn Smith

Senior Managing Editor, Banyan Hill Publishing

Leave a Reply