Site Logo
Safety Tips

Safety Tips

Updated: 01 January 2014

Thanks to the Internet, it has never been easier to buy or sell. The ability to upload and view photos and product descriptions, and contact buyers and sellers - all with a click - have transformed the business, and people's experience, of buying and selling.

However, the internet has also made it easier for dishonest buyers and sellers to defraud larger numbers of people, so there are a number of things you need to be aware of before going online to buy or sell products.

When buying, selling products or using services provided by Users/Members on KashADS.com website, you are accepting Terms of UsePrivacy PolicyCookies PolicyPosting Policy and other policies displayed on KashADS.com.

In this article KashADS.com providing the following advice and tips:

  • Selling: The Risk and Safety Selling Tips
  • Buying: The Risk and Safety Buying Tips
  • Skype and Internet Calls
  • Social Networking Sites
  • Computer Use in Public Places
  • Online Payments

1. Selling: The Risk and Selling Safety Tips

1.1.The Risk

1.1.1. Fraudulent buyers – thieves posing as potential purchasers – who offer the entire value paid via a PayPal or similar account created with false credit card details.

1.1.2. Fraudulent buying companies asking you to pay a ‘refundable’ deposit for completion of sale and collection of the goods.

1.1.3. Payment not being made or cleared until after you have released the goods, including payments via forged bankers’ cheques or fake escrow services.

1.1.4. Export scams – encouraging you to transfer ‘shipping fees’ to ‘buyers’ abroad.

1.1.5. Text messages expressing an interest in your goods, but providing excuses as to why they cannot call you. These may be part of a premium rate scam which will charge you large sums of money if you respond with a call or text.

1.1.6. Phishing emails requesting login and payment card details, claiming to be from selling and buying websites or from KashADS.com.

1.2.Selling Safety Tips

1.2.1. When selling a vehicle, make sure any test driver has a valid driving licence and suitable insurance cover. You could be liable for any accidents they may have.

1.2.2. Never hand over the goods or documentation until your bank has confirmed the full value of the goods has cleared into your bank account.

1.2.3. Never send money abroad.

1.2.4. Never pay a large deposit.

1.2.5. Don’t be pressured into releasing your goods – a genuine buyer will not mind waiting until the draft has cleared.

1.2.6. Be careful about how you take payment:

  • 1.2.6.1.Cash – ask for the cash to be handed to you in a bank, where the notes can be checked for forgeries and paid in immediately.
  • 1.2.6.2.Cheques – never let the buyer take your goods until the funds have cleared in your bank account.
  • 1.2.6.3.Bank drafts – are not as good as cash, so treat them in the way you would a personal cheque.
  • 1.2.6.4.Online bank transfer is one of the safest ways to pay as it avoids handling large amounts of cash and the problems associated with cheques.

1.2.7. Keep things local by meeting face-to-face with the buyer to exchange goods and money at the same time.

1.2.8. For your personal safety, meet in well lit public place and always take someone with you, or at least tell a friend where you are going and who you are meeting with.

2. Buying: The Risk and Safety Buying Tips

2.1.The Risk

2.1.1. Fraudulent advertisements placed by criminal gangs posing as sellers, often involving a hoax vehicle or goods at a bargain price, a faulty phone number and demands to transfer money into a payment protection service or abroad.

2.1.2. Buying stolen goods that have bogus documentation. If you are unfortunate enough to buy stolen goods, you may still be liable for finance agreement payments when it is returned to its rightful owner.

2.1.3. Buying a vehicle that has been ‘clocked’ (i.e. the mileage recorder has been wound back to make it appear that it has covered fewer miles).

2.1.4. Buying a cloned vehicle, this wears the stolen number plates from an identical model. This is not necessarily a stolen vehicle. If you buy a cloned vehicle, you will probably receive demands for parking and speeding fines, or be questioned about crimes in which the original vehicle is involved.

2.1.5. Phishing emails requesting login and payment card details, claiming to be from selling and buying websites or from KashADS.com.

2.2.Safety Buying Tips

2.2.1. Pay for the goods when you physically collect them from the seller. Never send money abroad or to a ‘payment protection’ service.

2.2.2. If the goods are being offered at a much cheaper price, it could be the sign of a scam. Always check the market value by getting a valuation or comparing the price on the internet or similar sites.

2.2.3. Physically check the goods (preferably in daylight) and its documentation. If purchasing a vehicle, check the ‘logbook’, service history and MOT certificates – before handing over any money.

2.2.4. Check – or have an expert check – that the goods are not replicas or counterfeits.

2.2.5. View the goods at the seller’s home or seller’s premises.

2.2.6. When buying a vehicle, get a car history check to find out whether the vehicle has been recorded as stolen, written off, scrapped or is subject to outstanding finance.

2.2.7. Keep things local by meeting face to face to see the item and exchange money. Make sure you are completely happy with the item before handing over any money. Although we do not recommend paying for an item you haven't seen, if you are planning to do this, please use a secure payment method.

2.2.8. Do not send money using transfer services such as Western Union or MoneyGram. If you use any of the transfer services, never give the tracking number/reference number to the seller before receiving the goods.

3. Skype and Internet Calls

Voice over IP (VoIP) or internet telephony services are very inexpensive and convenient. They use Internet Protocol (IP) to transmit calls – in other words using your internet connection.

There are three main types of VoIP service: 

  • Basic, where you simply plug a standard phone handset, headset or microphone and speakers into your VoIP-configured wireless hub to make low-cost internet calls.
  • Managed, where a company provides you with a local telephone number and you can receive as well as make calls.
  • Skype, which also enables users to invite and form contacts, create profiles, make video calls and share files.
  • As is the case with other internet-based services, you need to take care with how you use VoIP.

3.1.The Risks

3.1.1. There is a slight risk of eavesdropping because VoIP works over public internet connections. However, the risk is lower than that of using a conventional landline, which can be easily snooped on.

3.1.2. If you are using VoIP for making calls between three or more people where the dialup and access details are pre-arranged, anybody who can access these details (for example by seeing the email) can also gain access to your call.

3.1.3. Fraudsters can request that you be their Skype contact in order to:

  • 3.1.3.1.Call or instant message you to perpetrate a scam or fraud, normally by getting you to visit a fraudulent website or download a malicious file containing a virus or spyware.
  • 3.1.3.2.Access personal details on your profile and use them dishonestly.
  • 3.1.3.3.Share files or direct you to websites containing inappropriate or offensive content.

3.2.Safe Using Skype

3.2.1. If accessing your VoIP/Skype service requires you to use a password, ensure you use strong passwords, and do not disclose them to anyone else.

3.2.2. If your service includes a public profile, don’t put any sensitive, private or confidential information in it.

3.2.3. When using Skype, be wary about whom you accept contact requests from. Set up your service to allow connections only from people you know.

3.2.4. Quickly block nuisance and fraudulent users from further contact with you and also report them for abuse.

3.2.5. If you think that you have been persuaded by anyone to part with payment details, contact your bank or card issuer immediately.

3.2.6. Check regularly with your VoIP website for updates or patches.

3.2.7. Ensure you have effective and updated antivirus/antispyware software and firewall running.

3.2.8. Always log out of your VoIP/Skype service when you have finished your call. Simply closing your browser may not automatically finish your session.

3.2.9. Be aware that VoIP use depends on having mains power. If there is a power cut or other problem with the equipment, you will not be able to make calls, including emergency calls. If accessing your VoIP service requires you to use a password, ensure you use strong passwords, and do not disclose them to anyone else.

4. Social Networking Sites

Social networking is a global revolution, enabling around a billion people worldwide to stay in touch with their friends, share experiences and photographs and exchange personal content. In many ways it has replaced the telephone and email. For many users, it has become a way of life.

Various social networking sites are also valuable tools used by many companies and individuals to extend their contacts and deliver marketing messages. The nature of social networking – having such a massive base of users who are unknown to you – means that using it carries a degree of risk including becoming a target for cyber-criminals.

4.1.The Risks

4.1.1. Disclosure of private information by either yourself or friends/contacts.

4.1.2. Bullying.

4.1.3. Cyber-stalking.

4.1.4. Access to age-inappropriate content.

4.1.5. Online grooming and child abuse.

4.1.6. Prosecution or recrimination from posting offensive or inappropriate comments.

4.1.7. Phishing emails allegedly from social networking sites, but actually encouraging you to visit fraudulent or inappropriate websites.

4.1.8. Friends’, other people’s and companies' posts encouraging you to link to fraudulent or inappropriate websites.

4.1.9. People hacking into or hijacking your account or page.

4.1.10. Viruses or spyware contained within message attachments or photographs.

4.2.Safe Social Networking

You can avoid these risks and enjoy using social networking sites by following a few sensible guidelines:

4.2.1. Do not let peer pressure or what other people are doing on these sites convince you to do something you are not comfortable with.

4.2.2. Be wary of publishing any identifying information about yourself – either in your profile or in your posts – such as phone numbers, pictures of your home, workplace or school, your address or birthday.

4.2.3. Pick a user name that does not include any personal information. For example, “joe_glasgow” or “jane_liverpool” would be bad choices.

4.2.4. Set up a separate email account to register and receive mail from the site. That way if you want to close down your account/page, you can simply stop using that mail account. Setting up a new email account is very simple and quick to do using such providers as Hotmail, Yahoo! Mail or Gmail.

4.2.5. Use strong passwords.

4.2.6. Keep your profile closed and allow only your friends to view your profile.

4.2.7. What goes online stays online. Do not say anything or publish pictures that might later cause you or someone else embarrassment.

4.2.8. Never post comments that are abusive or may cause offence to either individuals or groups of society.

4.2.9. Be aware of what friends post about you, or reply to your posts, particularly about your personal details and activities.

4.2.10. Remember that many companies routinely view current or prospective employees’ social networking pages, so be careful about what you say, what pictures you post and your profile.

4.2.11. Learn how to use the site properly. Use the privacy features to restrict strangers’ access to your profile. Be guarded about who you let join your network.

4.2.12. Be on your guard against phishing scams, including fake friend requests and posts from individuals or companies inviting you to visit other pages or sites.

4.2.13. If you do get caught up in a scam, make sure you remove any corresponding likes and app permissions from your account.

4.2.14. Ensure you have effective and updated antivirus/antispyware software and firewall running before you go online.

5. Computer Use in Public Places

Using computers, smartphones or tablets in public places is now as commonplace as using them at home or in the office. Whether using your own device – or computers found in internet cafés and libraries – there can be a number of risks if you do not take proper care.

5.1.The Risks

5.1.1. People gaining access to your online activity if you are using an unsecured or illicit wireless network.

5.1.2. 'Shoulder surfing’ – someone’s viewing your screen.

5.1.3. Loss or theft of your computer, smartphone or tablet.

5.1.4. Malware, including spyware, on public computers.

5.1.5. Theft of personal information from, or access to browsing history on public computers.

5.2.Protect Yourself

5.2.1. Your Own Computer/Smartphone/Tablet:

  • 5.2.1.1.The main security risk associated with using your own device in a public place, is that the Wi-Fi may not be secured, enabling unauthorised people to intercept anything you are doing online. This could include capturing your passwords and reading private emails. This can happen if the connection between your device and the Wi-Fi is not encrypted, or if someone creates a spoof hotspot which fools you into thinking that it is the legitimate one.
  • 5.2.1.2.With an encrypted connection, you will be required to enter a ‘key’, which may look something like: 1A648C9FE2.
  • 5.2.1.3.Alternatively, you may simply be prompted to log in to enable internet access. This will tell the operator that you are online in their café, hotel or pub. There is almost certainly no security through encryption.

5.2.2. Safe Public Wi-Fi

  • 5.2.2.1. Unless you are using a secure web page, do not send or receive private information when using public Wi-Fi.
  • 5.2.2.2.Wherever possible, use well-known, commercial hotspot providers.
  • 5.2.2.3.Businesspeople wishing to access their corporate network should use a secure, encrypted Virtual Private Network (VPN).
  • 5.2.2.4.Ensure you have effective and updated antivirus/antispyware software and firewall running before you use public Wi-Fi.
  • 5.2.2.5.As an alternative, you could use your own dongle or similar device, which will provide you with a secure connection.
  • 5.2.2.6.Don’t leave your computer, smartphone or tablet unattended.
  • 5.2.2.7.Be aware of who is around you and may be watching what you are doing online.

5.3.Public Computers

5.3.1. Avoid financial transactions that might reveal valuable passwords or personal information such as credit card numbers.

5.3.2. If you can, use a trusted web-based spyware detection program to scan for spyware before using an untrusted public computer.

5.3.3. If you have been using the internet, ensure you use the browser tools to delete files and cookies and clear your browsing history.

5.3.4. Protect any passwords you are going to use by using the browser’s internet options menu. If in doubt, select the browser help option.

5.3.5. Consider changing any passwords you may have used on a public computer once you get back home.

5.3.6. If you use a webmail account such as Gmail, Hotmail or Yahoo! to read your email, be sure that it uses a secure web link.

5.3.7. Be careful who is watching over your shoulder.

6. Online Payments

Using the internet to make payments to utility, phone, credit card, insurance and other companies saves considerable time and effort. It is also a simple and convenient way to contribute to charity either directly or sponsoring participants in money-raising activities. There are, however, risks associated with online payments and you need to take care when making them.

6.1.The Risks

6.1.1. Fraud resulting from making payments over unsecured web pages.

6.1.2. Emails directing you to fake websites set up to collect your payment card details.

6.2.Safe payments

Online payments are normally part of your arrangement with a service provider as an alternative to payment by Direct Debit or cheque. In most cases, therefore, the payee will be familiar to you, but you must take care to ensure that you are on the provider’s genuine site.

6.2.1. Remember that paying by credit card offers greater protection against fraud than with other methods.

6.2.2. Double check all details of your payment before confirming.

6.2.3. Before entering payment details on a website, ensure that the link is secure, in three ways:

  • 6.2.3.1.There should be a padlock symbol in the browser window frame, which appears when you attempt to log in or register. Be sure that the padlock is not on the page itself ... this will probably indicate a fraudulent site.
  • 6.2.3.2.The web address should begin with ‘https://’. The ‘s’ stands for ‘secure’.
  • 6.2.3.3.If using the latest version of your browser, the address bar or the name of the site owner will turn green.

6.2.4. ​When making a payment to an individual use a secure payment site such as PayPal – never transfer the money directly into their bank account.

6.2.5. Check the website’s privacy policy.

6.2.6. Always log out of sites into which you have logged in or registered details. Simply closing your browser is not enough to ensure privacy.

6.2.7. Keep receipts – electronic or otherwise.

6.2.8. Check credit card and bank statements carefully after payment to ensure that the correct amount has been debited, and also that no fraud has taken place as a result of the transaction.

6.2.9. Ensure you have effective and updated antivirus/antispyware software and firewall running before you go online.