Scammers Are Exposed On This Site


Thursday 6 February 2014

YOUR APPLE ID WAS USED TO SIGN IN TO ICLOUD ON AN IPHONE 5 - Apple

Dear customer, Your Apple ID was used to sign in to iCloud on an iPhone 4. Time: February 06, 2014 Operating System: iOS;6.0.1 If you recently signed in to this device, you can disregard this email. If you have not recently signed in to an iPhone with your Apple ID and believe someone may have accessed youraccount, please click here to confirm your details and change your password. Apple Support My Apple ... ..»

No comments :

Post a Comment

The Stages Of A Scam

1. Foundation Work: This is the preparations which are made before the scam is put in motion, including the elaboration of the plan, the employment of assistants and so forth.

2. Approach: Is the manner of getting in touch with the scammers victim — often most elaborately and carefully prepared.

3. Build Up: Rousing and sustaining the interest of the victim, rousing his emotions, showing him the chance of profit and filling him so full of anticipation and cupidity that his judgment is warped and his caution thrown away.

4. Pay-off or Convincer: An actual or apparent paying of money by the conspirators to convince the victim and settle doubts by a cash demonstration.

5. The Hurrah: This is like the dénouement in a play and no scam or con scheme is complete without it. It is a sudden crisis or unexpected development by which the victim is pushed over the last doubt or obstacle and forced to act. Once the hurrah is sprung the victim is clay in the scammer's hands or there is no game.

6. The In-and-In: This is the point in a scam act where the conspirator may put some of his money into the deal with that of the victim; first, to remove the last doubt that may tarry in the gull's mind.