contact contact contact
  Articles | Editorials | Reviews | InfoSec Directory | News | Press Releases
Online auctions – you’d better check the price you paid
Author: Alex T. Sky, Staff Writer
Monday, 08 November 2004, 08:25 GMT
Reader Comments | Add your opinion

AP reported today that eight eBay sellers were ordered in three different cases to pay nearly $90,000 in restitution and fines after admitting they bid up products online to inflate the prices.

The idea behind the fraud is simple – a dishonest seller simply submits phony bids under a fake identity for his own merchandise thus driving the prices higher by 10-20 or even 50 percent. One doesn’t need a degree in psychology to figure out that some potential buyers see online auctions as yet another exciting computer game and there is a good chance that they would go far beyond any reasonable limits in order to win.

As the three NY cases show virtually everything – from trucks to fine arts – can become a subject for price manipulation. Although it is hard to estimate the number of phony bids without conducting an industry-wide investigation the participants of online auctions should assume that the practice is much more widespread than it seems. And they’d better check the prices they paid in the past.

How to avoid paying artificially inflated prices? First, do at least some market research and get a rough idea of a fair price for the item you’re planning to buy. Second, decide on the price limit, write it on a piece of paper and put it in front of you before placing the first bid. Third, never ever bid above that limit! Online auctions may look like a game but the bucks you pay are real.



Reader Comments:

No comments. Post your comment here

SecurityWatch - 24x7 advisory and vulnerability automated monitoring service.

GFI LANguard Network Security Scanner - Network-wide security vulnerability scanning & fixing - Free version available.

Network Security Software - Sponsored by GFI Network Security.

InfoSec Directory
» Smart-Phone Attacks and Defenses
» Preventing Spyware Infestation
» Preliminary study: Bluetooth Security
» An initiative extending SMTP to include email sender identity and reputation
» Identity Assurance in a Virtual World
Latest Press Releases
» Kavado Announces Defiance Risk Management System (RMS) to Support Compliance Reporting for Web Applications Security
» The Middleburgh Telephone Company Chooses Motorola’s Multi-Service Access Platform to Deliver Next Generation Triple-Play Services
» Keynesis Ltd. Announces the Release of Lockngo Professional Version 3.0
» net.com Customises SHOUT Family to Deliver VoIP Migration Appliance (VMA)
» Free Vulnerability Scan Now Available for SANS Top 20 Quarterly Update
» WiFi Manager Integrates Support For DLINK, SMC, LINKSYS and Nomadix Wireless devic
More Articles
» Understanding Rich Internet Applications
» Voice and Data Convergence - a Vendor’s Perspective
» Making Firewall Do the Work: Stateful Packet Inspection
» Four Things You Must Know Before Deploying Wireless LANs
» Put spyware on the security map
 Copyright © 2000 - 2005 eBCVG IT Security Affiliates :: RSS feeds :: Privacy 
Site Meter