wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Different types of scam Fraud

profile
04_Swapnil Bhalchakra
Mar 14, 2022
0 Likes
0 Discussions
38 Reads

We are living in digital world where technology develops day by day.Internet is affordable and devices are also,So criminals are also using digital platforms for criminal/illegal activities.

Types of Cybercrime -

Online Money ask - it is attempt to scam people by giving them false hope/promises

People who need employment are very easily fell into traps

Fraudster tell you to pay amount for interview or other things like enroll for next hiring

Lottery ,jackpot, direct money into account like this promises are scammers doing

Then they will block or didn’t gave you reply

Sextortion - 

It is blend of sex+extortion.It is similar to online blackmail

It is modern term and growing faster through social media

Basically teenagers and younger peoples are fell into this easily

Victim got dm/msg then asking for video call for revealing their private/sensitive information or exchange of naked images or videos.Then they store that data and blackmailing victim to pay extortion or do other activity

Phising - it is type of fraud that involves stealing personal information such as login id & password , credit/debit card information etc

Attacker will send mail/link that looks like similar as original website

Vishing - it is attempt where fraudsters try to seek personal information like id,password,atm pin,debit/credit card info or pin otp through call

Smishing - it is fraud that uses text msg/mail to lure victims into call innocent people,visiting harmful websites or downloading malicious content 

Ransomware - Ransomeware is type of computer malware that encrypt the files,storage mediaon devices like smartphones,computer,laptops etc. Victim is asked to pay demanded ransom for decryption of device

Data breach - In this Database information is leaked by anonymous/unauthorized person.

Domino's , Mobikwik,Air India's data breach is also done recently 


Comments ()


Sign in

Read Next

(Input/Output) in os

Blog banner

Tea, Coffee, Red Wine, and Teeth: A Stain Survival Guide

Blog banner

A BLOG ON MYSQL

Blog banner

Development Of Modern Operating System

Blog banner

How Do I Get Rid of My People-Pleasing Behaviour?

Blog banner

Interrupts in operating system.

Blog banner

Solving Problems with AI: The Power of Search Algorithms

Blog banner

What makes Nugget RC Racing Florida’s Most Exciting Racing Events?

Blog banner

Python as a tool for Data science task & project

Blog banner

What is Internet

Blog banner

OPERATING SYSTEM OBJECTIVES AND FAULT TOLERENCE.

Blog banner

Drawing tips for a beginner

Blog banner

Lifestyle of a photographer

Blog banner

Operating system evolution

Blog banner

Secure Hypertext transfer protocol

Blog banner

This Windows 11 encryption bug may cause data damage

Blog banner

Evolution of Operating system.

Blog banner

TEAMWORK

Blog banner

LiquidPlanner

Blog banner

Deadlock

Blog banner

Smitten Kitchen Keepers

Blog banner

Compromising Mobile Platforms

Blog banner

Cloud Computing: Threats and Vulnerabilities

Blog banner

Art and Culture of Rajasthan

Blog banner

The Art Of Getting What You Want In Life....

Blog banner

Cybersecurity Standards for Automotive

Blog banner

Review on Recovering Deleted Files

Blog banner

TOP 5 GAMING GADGETS (2024)

Blog banner

What Makes Patola the Queen of Silk?

Blog banner

HR Automation : Need of the hour

Blog banner

Types of Hackers.

Blog banner

Social Engineering Attacks

Blog banner

Office Lunch Problems in Mumbai and How Tiffin Services Solve Them

Blog banner

Cache memory

Blog banner

Beauty of indian railway

Blog banner

Hacking of web server and application

Blog banner

Article on IT development trends

Blog banner

Article on team management software

Blog banner

Mumbai local ......

Blog banner

EMAIL INVESTIGATION

Blog banner

Types of E-Commerce

Blog banner

CYBERPEACEKEEPING: NEW WAYS TO PREVENT AND MANAGE CYBERATTACKS

Blog banner