wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Different types of scam frauds

profile
04_Swapnil Bhalchakra
Mar 14, 2022
0 Likes
0 Discussions
41 Reads

We are living in digital world where technology develops day by day.Internet is affordable and electronic devices are also not costly,so criminals are also using digital platforms for criminal/illegal activities.

 

Types of Cybercrime -

Online Money ask - it is attempt to scam people by giving them false hope/promises

People who need employment are very easily fell into traps

Fraudster tell you to pay amount for interview or other things like enroll for next hiring

Lottery ,jackpot, direct money into account like this promises are scammers doing

Then they will block or didn’t gave you reply

 

Sextortion - 

It is blend of sex+extortion.It is similar to online blackmail

It is modern term and growing faster through social media

Basically teenagers and younger peoples are fell into this easily

Victim got dm/msg then asking for video call for revealing their private/sensitive information or exchange of naked images or videos.Then they store that data and blackmailing victim to pay extortion or do other activity

Phising - it is type of fraud that involves stealing personal information such as login id & password , credit/debit card information etc

Attacker will send mail/link that looks like similar as original website

 

Vishing - it is attempt where fraudsters try to seek personal information like id,password,atm pin,debit/credit card info or pin otp through call

 

Smishing - it is fraud that uses text msg/mail to lure victims into call innocent people,visiting harmful websites or downloading malicious content 

 

Ransomware - Ransomeware is type of computer malware that encrypt the files,storage mediaon devices like smartphones,computer,laptops etc. Victim is asked to pay demanded ransom for decryption of device

 

Data breach - In this Database information is leaked by anonymous/unauthorized person.

Domino's , Mobikwik,Air India's data breach is also done recently 


Comments ()


Sign in

Read Next

Creating Digitally Signed Document

Blog banner

MEMORY MANAGEMENT FILE

Blog banner

THE LEGAL ISSUES OF COMPUTER FORENSICS IN INDIA

Blog banner

Not anti-social, but pro-solitude

Blog banner

Memory Management in Operating System

Blog banner

Introduction my self

Blog banner

Boxing

Blog banner

Threats To Computer System

Blog banner

memory managment

Blog banner

Android Flashlight Application

Blog banner

Python as a tool for Data science task & project

Blog banner

Operating system

Blog banner

Travelling blog

Blog banner

Deadlock in operating system

Blog banner

Decoding Confusion Matrix

Blog banner

Disk cache

Blog banner

QUANTUM COMPUTING IN SECURITY:A GAME CHANGER IN DIGITAL WORLD

Blog banner

Simple AI Symptom Diagnosis Using LISP – Rule-Based Expert System

Blog banner

The Impact of Tolerances and Wall Thickness on Pipeline Integrity

Blog banner

Evolution of Operating system.

Blog banner

Automating OSINT tasks for efficient Cyber Forensics Investigations

Blog banner

note taker app

Blog banner

virtual machine

Blog banner

Full Disk Encryption on Digital Forensics

Blog banner

To-Do List In LISP

Blog banner

The Future of Patola Weaving in a Sustainable Fashion World

Blog banner

Dr. Venkadavarahan

Blog banner

How covid-19 impacted Social media ad spend forecast globally

Blog banner

Importance Of Yoga.

Blog banner

An Overivew Of Cache Memory

Blog banner

c

Blog banner

Service Operation

Blog banner

Modern operating system

Blog banner

Memory Management

Blog banner

ROLE OF THE COMPUTER FORENSICS TOOLS AND TECHNIQUES

Blog banner

Traditional UNIX Scheduling

Blog banner

Modern Operating System

Blog banner

Cyber-crime Investigation and Future Directions

Blog banner

Goa Trip With Friends

Blog banner

Smart Homes | Zigbee Alliance

Blog banner

Explain Multiprocessors

Blog banner

Virtual memory

Blog banner