Feeds

UK regulator warns targets over share scam sucker list

Turning up the heat on boiler room fraudsters

Top 5 reasons to deploy VMware with Tegile

A UK regulator is taking the unusual step of contacting 38,000 potential share fraud targets after recovering a "suckers list" used by boiler room fraudsters.

The Financial Services Authority plans to write to the thousands of people on the list (which contains phone numbers, names and addresses) warning them that their details are circulating among boiler room share fraud scammers. Boiler rooms normally operate outside the UK, outside the reach of regulators and compensation schemes. Fraudsters use high-pressure sales techniques to sell non-tradeable, overpriced or non-existent shares.

Target lists maintained by the fraudsters sometimes feature notes on an intended mark's interests and list of blue-chip shares they already hold. The list is thought to be in active use.

Jonathan Phelan, the FSA's head of unauthorised business, explained: "This is the biggest list we've ever recovered and by acting quickly and contacting every single person on it we're hoping we can stop people losing money. Boiler room fraudsters often sound professional so it's easy to be drawn in by their overblown claims and give them money to invest. The reality is however that the shares are worthless or don't exist and the money is lost forever."

An FSA statement provides a list of tips to avoid getting scammed. Potential investors should regard cold calls with skepticism. Checking the FSA Register to make sure they are dealing with an authorised dealer is also good advice.

The regulator estimates that boiler room fraud fleeces UK investors of around £200m per year. Victims lose an average of £20K. The FSA received 1,000 complaints about the type of scam last year, a sizeable chunk of the 3,500 gripes it tackles every 12 months. ®

Beginner's guide to SSL certificates

Whitepapers

Go beyond APM with real-time IT operations analytics
How IT operations teams can harness the wealth of wire data already flowing through their environment for real-time operational intelligence.
5 critical considerations for enterprise cloud backup
Key considerations when evaluating cloud backup solutions to ensure adequate protection security and availability of enterprise data.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Simplify SSL certificate management across the enterprise
Simple steps to take control of SSL across the enterprise, and recommendations for a management platform for full visibility and single-point of control for these Certificates.