wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Different types of scam Fraud

profile
04_Swapnil Bhalchakra
Mar 14, 2022
0 Likes
0 Discussions
38 Reads

We are living in digital world where technology develops day by day.Internet is affordable and devices are also,So criminals are also using digital platforms for criminal/illegal activities.

Types of Cybercrime -

Online Money ask - it is attempt to scam people by giving them false hope/promises

People who need employment are very easily fell into traps

Fraudster tell you to pay amount for interview or other things like enroll for next hiring

Lottery ,jackpot, direct money into account like this promises are scammers doing

Then they will block or didn’t gave you reply

Sextortion - 

It is blend of sex+extortion.It is similar to online blackmail

It is modern term and growing faster through social media

Basically teenagers and younger peoples are fell into this easily

Victim got dm/msg then asking for video call for revealing their private/sensitive information or exchange of naked images or videos.Then they store that data and blackmailing victim to pay extortion or do other activity

Phising - it is type of fraud that involves stealing personal information such as login id & password , credit/debit card information etc

Attacker will send mail/link that looks like similar as original website

Vishing - it is attempt where fraudsters try to seek personal information like id,password,atm pin,debit/credit card info or pin otp through call

Smishing - it is fraud that uses text msg/mail to lure victims into call innocent people,visiting harmful websites or downloading malicious content 

Ransomware - Ransomeware is type of computer malware that encrypt the files,storage mediaon devices like smartphones,computer,laptops etc. Victim is asked to pay demanded ransom for decryption of device

Data breach - In this Database information is leaked by anonymous/unauthorized person.

Domino's , Mobikwik,Air India's data breach is also done recently 


Comments ()


Sign in

Read Next

The Power of Forensic Watermarking in the Fight Against Content Piracy

Blog banner

MySQL

Blog banner

GIS in Disaster Management

Blog banner

PERT Overview

Blog banner

Mariana Trench: The deepest depths

Blog banner

Web browser forensics:Tools,Evidence collection and analysis

Blog banner

Direct Memory Access

Blog banner

Music is life

Blog banner

Access management

Blog banner

Microsoft Windows Overview

Blog banner

Article on IT development trends

Blog banner

Modern operating system

Blog banner

Game via listing method

Blog banner

JUSTICE FOR EVERY “BEZUBAAN ANIMAL”

Blog banner

Memory management

Blog banner

"Life as a Part-time Student"

Blog banner

Importance of Website

Blog banner

OPERATING SYSTEM OBJECTIVES AND FAULT TOLERENCE.

Blog banner

Paging

Blog banner

Biometric Authentication and Privacy: Balancing Ethical Concerns

Blog banner

How covid-19 impacted Social media ad spend forecast globally

Blog banner

What is Spyware? and examples of them.

Blog banner

Solving Problems with AI: The Power of Search Algorithms

Blog banner

Google classroom

Blog banner

SPAM

Blog banner

JIRA SOFTWARE

Blog banner

Linux Memory Management

Blog banner

Deadlock and starvation

Blog banner

SmartData Collective: Data Science aur Analytics ki Duniya

Blog banner

Digital Balance: Keeping Children Mindful in the Screen Age

Blog banner

How to invest in Indian Stock Market ? ~ Tutorial 1

Blog banner

GIS Topography

Blog banner

Mendeley (management software)

Blog banner

What is Anxiety? How to manage Anxiety?

Blog banner

semaphores

Blog banner

Deadlocks in Operating System

Blog banner

Virtual memory in windows

Blog banner

Network Forensics Tools and Techniques

Blog banner

Beautiful and stunning natural phenomena worth to see

Blog banner

M commerce

Blog banner

Old age lifestyle

Blog banner

Virtualization

Blog banner