wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Different types of scam Fraud

profile
04_Swapnil Bhalchakra
Mar 14, 2022
0 Likes
0 Discussions
38 Reads

We are living in digital world where technology develops day by day.Internet is affordable and devices are also,So criminals are also using digital platforms for criminal/illegal activities.

Types of Cybercrime -

Online Money ask - it is attempt to scam people by giving them false hope/promises

People who need employment are very easily fell into traps

Fraudster tell you to pay amount for interview or other things like enroll for next hiring

Lottery ,jackpot, direct money into account like this promises are scammers doing

Then they will block or didn’t gave you reply

Sextortion - 

It is blend of sex+extortion.It is similar to online blackmail

It is modern term and growing faster through social media

Basically teenagers and younger peoples are fell into this easily

Victim got dm/msg then asking for video call for revealing their private/sensitive information or exchange of naked images or videos.Then they store that data and blackmailing victim to pay extortion or do other activity

Phising - it is type of fraud that involves stealing personal information such as login id & password , credit/debit card information etc

Attacker will send mail/link that looks like similar as original website

Vishing - it is attempt where fraudsters try to seek personal information like id,password,atm pin,debit/credit card info or pin otp through call

Smishing - it is fraud that uses text msg/mail to lure victims into call innocent people,visiting harmful websites or downloading malicious content 

Ransomware - Ransomeware is type of computer malware that encrypt the files,storage mediaon devices like smartphones,computer,laptops etc. Victim is asked to pay demanded ransom for decryption of device

Data breach - In this Database information is leaked by anonymous/unauthorized person.

Domino's , Mobikwik,Air India's data breach is also done recently 


Comments ()


Sign in

Read Next

Multiprocessor and Multicore Organization

Blog banner

Deadlock

Blog banner

Memory Management

Blog banner

Article on IT development trends

Blog banner

What is a Dumpster Diving Attack?

Blog banner

Career v/s Job : Choose your passion

Blog banner

Zero-Day Attack

Blog banner

ProofHub

Blog banner

Article on different management system

Blog banner

Zero Trust Security Model: Revolutionizing Cybersecurity in the Digital Age

Blog banner

How Laughing Gas Makes Your Dental Visit So Much Easier

Blog banner

Elements and Principles of Photography

Blog banner

LTE Technology

Blog banner

NETWORK SECURITY RISKS

Blog banner

How to tie a Tie

Blog banner

ART AND CULTURE OF VRINDAVAN

Blog banner

Internet of Things

Blog banner

The Art of Slow Fashion: Why Patola Defines Sustainable Luxury

Blog banner

BIRYANI ! The history you never knew about

Blog banner

SNAPCHAT

Blog banner

Threat management

Blog banner

Concept and definition of m-commerce

Blog banner

Wiretapping

Blog banner

Models of Information Security.

Blog banner

Simple AI Symptom Diagnosis Using LISP – Rule-Based Expert System

Blog banner

Depression

Blog banner

Benefits and drawback of web security.

Blog banner

6 Digital Marketing Trends You Must Watch Out For In 2022

Blog banner

What is online marketing and why do you need to know about it ?

Blog banner

Top 10 Logos and their meanings

Blog banner

Heart Fulness Meditation

Blog banner

Crypto tax evasion

Blog banner

FREE VERSION OF G-MAIL

Blog banner

AI and Data Science: Revolutionizing Industries

Blog banner

Explain website hacking issues

Blog banner

Telegram and it's features

Blog banner

Kernel Memory Allocation In Linux.

Blog banner

Memory Hierarchy

Blog banner

Session Hijacking Techniques

Blog banner

Challenges and risks in service operations

Blog banner

gis substation

Blog banner

What are NFT s?

Blog banner