wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Different types of scam frauds

profile
04_Swapnil Bhalchakra
Mar 14, 2022
0 Likes
0 Discussions
41 Reads

We are living in digital world where technology develops day by day.Internet is affordable and electronic devices are also not costly,so criminals are also using digital platforms for criminal/illegal activities.

 

Types of Cybercrime -

Online Money ask - it is attempt to scam people by giving them false hope/promises

People who need employment are very easily fell into traps

Fraudster tell you to pay amount for interview or other things like enroll for next hiring

Lottery ,jackpot, direct money into account like this promises are scammers doing

Then they will block or didn’t gave you reply

 

Sextortion - 

It is blend of sex+extortion.It is similar to online blackmail

It is modern term and growing faster through social media

Basically teenagers and younger peoples are fell into this easily

Victim got dm/msg then asking for video call for revealing their private/sensitive information or exchange of naked images or videos.Then they store that data and blackmailing victim to pay extortion or do other activity

Phising - it is type of fraud that involves stealing personal information such as login id & password , credit/debit card information etc

Attacker will send mail/link that looks like similar as original website

 

Vishing - it is attempt where fraudsters try to seek personal information like id,password,atm pin,debit/credit card info or pin otp through call

 

Smishing - it is fraud that uses text msg/mail to lure victims into call innocent people,visiting harmful websites or downloading malicious content 

 

Ransomware - Ransomeware is type of computer malware that encrypt the files,storage mediaon devices like smartphones,computer,laptops etc. Victim is asked to pay demanded ransom for decryption of device

 

Data breach - In this Database information is leaked by anonymous/unauthorized person.

Domino's , Mobikwik,Air India's data breach is also done recently 


Comments ()


Sign in

Read Next

Spyware

Blog banner

Memory Management in Operating System

Blog banner

Linux -V Server Virtual Machine

Blog banner

Celebrate Diwali the Delicious Way with Meal Maharaj Catering

Blog banner

The Right way of cooking

Blog banner

Annual Day Preparation for Toddlers: What Helps and What to Avoid

Blog banner

memory management

Blog banner

Social Media Marketing Trends 2022

Blog banner

How the mobile IP is used in GSM architecture.

Blog banner

Deadlock

Blog banner

Self-love: Being the reason of your own smile

Blog banner

Direct Memory Access

Blog banner

Deadlocks in Operating Systems

Blog banner

Why Are So Many Adults Getting Diagnosed with ADHD?

Blog banner

Characteristics of Etherum

Blog banner

Importance of education

Blog banner

How Puppet Shows and Role Play Teach Empathy to Preschoolers

Blog banner

TRIGGERS IN DATABASE

Blog banner

Hello World

Blog banner

Krishna Rao SAP ID--53003230076

Blog banner

How International Schools Build Global-Minded Students through Curriculum & Activities

Blog banner

Importance Of Education.

Blog banner

Fitness

Blog banner

Cyber Security Control

Blog banner

Skills An Ethical Hacker Must Have

Blog banner

Intrusion Detection System

Blog banner

Exploring Human Factors in Cyber Forensics Investigations.

Blog banner

Predictive Analytics: How Data Science Predicts Trends(Weather ,Stock Market,Sales Forecasting ).

Blog banner

c

Blog banner

What is semaphore in operating system?

Blog banner

How Schools Can Reduce Exam Stress in Students?

Blog banner

GraphQL

Blog banner

Digital Marketing

Blog banner

CyberSecurity Color Wheel

Blog banner

Scheduling in Operating Systems

Blog banner

Deadlock and Starvation

Blog banner

Types of Threads

Blog banner

Risk factors in service transistion

Blog banner

Philadelphia Experiment : Was it real?

Blog banner

Introduction my self

Blog banner

E-security systems | CCTV

Blog banner

Embracing the power of Modern Machine UNIX

Blog banner