wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Different types of scam Fraud

profile
04_Swapnil Bhalchakra
Mar 14, 2022
0 Likes
0 Discussions
38 Reads

We are living in digital world where technology develops day by day.Internet is affordable and devices are also,So criminals are also using digital platforms for criminal/illegal activities.

Types of Cybercrime -

Online Money ask - it is attempt to scam people by giving them false hope/promises

People who need employment are very easily fell into traps

Fraudster tell you to pay amount for interview or other things like enroll for next hiring

Lottery ,jackpot, direct money into account like this promises are scammers doing

Then they will block or didn’t gave you reply

Sextortion - 

It is blend of sex+extortion.It is similar to online blackmail

It is modern term and growing faster through social media

Basically teenagers and younger peoples are fell into this easily

Victim got dm/msg then asking for video call for revealing their private/sensitive information or exchange of naked images or videos.Then they store that data and blackmailing victim to pay extortion or do other activity

Phising - it is type of fraud that involves stealing personal information such as login id & password , credit/debit card information etc

Attacker will send mail/link that looks like similar as original website

Vishing - it is attempt where fraudsters try to seek personal information like id,password,atm pin,debit/credit card info or pin otp through call

Smishing - it is fraud that uses text msg/mail to lure victims into call innocent people,visiting harmful websites or downloading malicious content 

Ransomware - Ransomeware is type of computer malware that encrypt the files,storage mediaon devices like smartphones,computer,laptops etc. Victim is asked to pay demanded ransom for decryption of device

Data breach - In this Database information is leaked by anonymous/unauthorized person.

Domino's , Mobikwik,Air India's data breach is also done recently 


Comments ()


Sign in

Read Next

operating system

Blog banner

Real Time Scheduling

Blog banner

Social Media.

Blog banner

Privacy in Social Media and Online Services

Blog banner

MEMORY HIERARCHY

Blog banner

10 Amazing facts about Tokyo Ghoul

Blog banner

The Everyday Parenting Dilemma: Safety Vs Independence

Blog banner

Paid Email

Blog banner

Operating system evolution

Blog banner

Top 5 Places To Stay And Visit In Berlin, Germany

Blog banner

Landslide Hazard

Blog banner

File sharing

Blog banner

Affiliate Marketing V/S Influencer Marketing

Blog banner

How social media affect

Blog banner

Data Science in Mental Health Prediction

Blog banner

The Benefits of Practical Life Activities in Preschool

Blog banner

A Happier Workplace Starts with Healthy Lunches by Meal Maharaj

Blog banner

Processes: Process Description and Control.

Blog banner

Virtual Memory

Blog banner

SQL Injection Techniques

Blog banner

Cyber-crime Investigation and Future Directions

Blog banner

Have You Explored India Yet?

Blog banner

Embedded Operating System

Blog banner

Smartsheet

Blog banner

Modern operating systems (OS)

Blog banner

Never give up

Blog banner

OS Assignment 3 Deadlock

Blog banner

NETWORK SECURITY RISKS

Blog banner

Understanding Gen Z: A Generation Facing Crisis and Potential

Blog banner

Best password managers: Reviews of the top products

Blog banner

Internet: The Vast Ocean Of Knowledge.

Blog banner

Health and fitness

Blog banner

Operating system

Blog banner

The Essential Guide to Dynamic Arrays vs. Linked Lists: Which to Use and When ?

Blog banner

What are Virtual Machines

Blog banner

A-B-C of Networking: Part-2 (Components)

Blog banner

Power of words

Blog banner

HR Automation : Need of the hour

Blog banner

Linux Memory Management

Blog banner

Uniprocessor scheduling

Blog banner

Monday. com App

Blog banner

note taker app

Blog banner