wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Different types of scam frauds

profile
04_Swapnil Bhalchakra
Mar 14, 2022
0 Likes
0 Discussions
41 Reads

We are living in digital world where technology develops day by day.Internet is affordable and electronic devices are also not costly,so criminals are also using digital platforms for criminal/illegal activities.

 

Types of Cybercrime -

Online Money ask - it is attempt to scam people by giving them false hope/promises

People who need employment are very easily fell into traps

Fraudster tell you to pay amount for interview or other things like enroll for next hiring

Lottery ,jackpot, direct money into account like this promises are scammers doing

Then they will block or didn’t gave you reply

 

Sextortion - 

It is blend of sex+extortion.It is similar to online blackmail

It is modern term and growing faster through social media

Basically teenagers and younger peoples are fell into this easily

Victim got dm/msg then asking for video call for revealing their private/sensitive information or exchange of naked images or videos.Then they store that data and blackmailing victim to pay extortion or do other activity

Phising - it is type of fraud that involves stealing personal information such as login id & password , credit/debit card information etc

Attacker will send mail/link that looks like similar as original website

 

Vishing - it is attempt where fraudsters try to seek personal information like id,password,atm pin,debit/credit card info or pin otp through call

 

Smishing - it is fraud that uses text msg/mail to lure victims into call innocent people,visiting harmful websites or downloading malicious content 

 

Ransomware - Ransomeware is type of computer malware that encrypt the files,storage mediaon devices like smartphones,computer,laptops etc. Victim is asked to pay demanded ransom for decryption of device

 

Data breach - In this Database information is leaked by anonymous/unauthorized person.

Domino's , Mobikwik,Air India's data breach is also done recently 


Comments ()


Sign in

Read Next

Virtual memory

Blog banner

From Model Mistakes to Metrics

Blog banner

Animal’s have my heart

Blog banner

How Does SSO Works

Blog banner

Privacy-Enhancing Computation Techniques

Blog banner

Cybersecurity Standards for Automotive

Blog banner

To travel is to live

Blog banner

Man In The Middle Attack

Blog banner

Different types of e-commerce platforms or advantages and disadvantages

Blog banner

OS Assignment 3 Deadlock

Blog banner

How to Encrypt and Decrypt Using GNU PGP

Blog banner

What is Data, Information and Knowledge?

Blog banner

Solving Problems with AI: The Power of Search Algorithms

Blog banner

Risk factors in service transistion

Blog banner

Virtual memory in Operating System

Blog banner

You Get Everyone, But No One Gets You: The Lonely Side of High Emotional Intelligence

Blog banner

Office Lunch Problems in Mumbai and How Tiffin Services Solve Them

Blog banner

How to write a cover letter

Blog banner

Deadlock

Blog banner

What is Password Cracking ? and it's Techniques.

Blog banner

Importance Of Blockchain

Blog banner

memory cache

Blog banner

Threads

Blog banner

MY FIRST BLOG?

Blog banner

ACHIEVEMENTS IN OPERATING SYSTEMS

Blog banner

Health and fitness

Blog banner

Ubiquitous Computing

Blog banner

Social media

Blog banner

I/O Management and Disk Scheduling

Blog banner

Memory

Blog banner

Sagar Parikrama

Blog banner

Advanced Persistent Threats (APTs)

Blog banner

Threading

Blog banner

A Weekend at Oak Tree Hotel: The Best Hotel Experience in Arcadia, Florida

Blog banner

Mendeley (management software)

Blog banner

I/O Management and Disk Scheduling

Blog banner

Cache Memory(142)

Blog banner

Im Photographer

Blog banner

virtual machines and virtualization

Blog banner

Consumer to consumer Business model

Blog banner

E-learning

Blog banner

TRIGGERS IN DATABASE

Blog banner