wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Different types of scam Fraud

profile
04_Swapnil Bhalchakra
Mar 14, 2022
0 Likes
0 Discussions
38 Reads

We are living in digital world where technology develops day by day.Internet is affordable and devices are also,So criminals are also using digital platforms for criminal/illegal activities.

Types of Cybercrime -

Online Money ask - it is attempt to scam people by giving them false hope/promises

People who need employment are very easily fell into traps

Fraudster tell you to pay amount for interview or other things like enroll for next hiring

Lottery ,jackpot, direct money into account like this promises are scammers doing

Then they will block or didn’t gave you reply

Sextortion - 

It is blend of sex+extortion.It is similar to online blackmail

It is modern term and growing faster through social media

Basically teenagers and younger peoples are fell into this easily

Victim got dm/msg then asking for video call for revealing their private/sensitive information or exchange of naked images or videos.Then they store that data and blackmailing victim to pay extortion or do other activity

Phising - it is type of fraud that involves stealing personal information such as login id & password , credit/debit card information etc

Attacker will send mail/link that looks like similar as original website

Vishing - it is attempt where fraudsters try to seek personal information like id,password,atm pin,debit/credit card info or pin otp through call

Smishing - it is fraud that uses text msg/mail to lure victims into call innocent people,visiting harmful websites or downloading malicious content 

Ransomware - Ransomeware is type of computer malware that encrypt the files,storage mediaon devices like smartphones,computer,laptops etc. Victim is asked to pay demanded ransom for decryption of device

Data breach - In this Database information is leaked by anonymous/unauthorized person.

Domino's , Mobikwik,Air India's data breach is also done recently 


Comments ()


Sign in

Read Next

Biometric Authentication and Privacy: Balancing Ethical Concerns

Blog banner

Dekkers Algorithm : Ensuring Safe Process Synchronization

Blog banner

Natural Language Processing(NLP)

Blog banner

Development Of Modern Operating System

Blog banner

Go Daddy

Blog banner

GIS Bharat Maps

Blog banner

Deadlock and Starvation

Blog banner

Top Career Paths After a B.Com Degree in Mumbai: What’s Next for You?

Blog banner

Khau Galli – Vile Parle

Blog banner

memory managment

Blog banner

Is Pursuing a Dance Career in India Worth it?

Blog banner

The launch of UniMap by HERE

Blog banner

SWEET SHREDDED MANGO CHUNDA (MANGO CHUNDA)

Blog banner

Cyber Security in Data Breaching

Blog banner

E-learning in today's world

Blog banner

Virtual Machine's

Blog banner

Digital Forensics Challenges and Tools

Blog banner

Social Media Sentiment Analysis

Blog banner

Everything You Need for a Perfect Stay in Arcadia, Florida, USA.

Blog banner

Esri India launches Policy Maps.

Blog banner

ARTICAL ON MANAGEMENT SYSTEM

Blog banner

HOW A CENTRAL PROCESSING UNIT (CPU) WORKS?

Blog banner

Cyber Forensics

Blog banner

Concurrency and Deadlocks

Blog banner

File management In Operating System

Blog banner

TRAIN TRAVELING

Blog banner

Memory Management

Blog banner

Virtual memory

Blog banner

Getting to Kashmir: Alternative to the Jammu-Srinagar highway

Blog banner

Importance of education

Blog banner

Electronic Funds Transfer

Blog banner

Fault Tolerance

Blog banner

Trello ( management software)

Blog banner

Understanding - Proof of Work!

Blog banner

E-Governance

Blog banner

Man VS Nature

Blog banner

Starvation

Blog banner

Deadlock in operating system

Blog banner

OPERATING SYSTEM

Blog banner

Twisted world

Blog banner

Define Instagram.

Blog banner

Raising Emotionally Intelligent Students: The Classroom Beyond Academics

Blog banner