The fraudsters targeted victims worldwide using cold calls and pressure sale tactics to sell bogus share investment schemes 骗徒以电话游说世界各地的受害人参与虚假的股票投资计划。
How does it work ? this scams usually involves two to four culprits . the victims are all elderly or poorly educated females 这种骗案大多涉及二至四名骗徒,而受害人全是长者或教育程度低的女性。
This second factor should be difficult to be stolen together with the customers login id and password by fraudsters over the internet 骗徒很难可以在网上连同客户的登入名称及密码一起盗取这项工具。
Eventually , the victim finds the mobile phone is faked and the contact telephone number left behind by the culprit is also false 后来,受害人才发现手提电话是假货,而骗徒留下的联络电话也是假的。
The swindlers failed to persuade the victims to surrender the property and were arrested by officers ambushing in the vicinity 骗徒未能成功骗取受害人的金钱和财物,于附近埋伏的探员随即上前将他们拘捕。
Scammers use the same techniques as legitimate companies , but hide behind the anonymity of the internet to deceive their victims 骗徒在网上匿藏身分,使用如同合法公司的策略,每年企图讹骗成千上万的人。
How to avoid scams from international fraudsters exploiting the loopholes in " constructive delivery " as specified in article 4 如何防止国际骗徒利用第4条单据上之推定运送这慨念的漏洞耒骗取信用证金额?
One form of trojan horse programme is able to capture keystrokes typed by the user and then transmit them covertly to the fraudster 其中一种特洛伊木马程式能记录用户在个人电脑所按的键,并将取得的资料秘密地传送给骗徒。
" is it not a beautiful piece of cloth ? " asked the two swindlers , showing and explaining the magnificent pattern , which , however , did not exist "这不是一个美丽的一块布" ?问两个骗徒,显示并解释宏伟格局,其中,但并不存在。