wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Different types of scam frauds

profile
04_Swapnil Bhalchakra
Mar 14, 2022
0 Likes
0 Discussions
41 Reads

We are living in digital world where technology develops day by day.Internet is affordable and electronic devices are also not costly,so criminals are also using digital platforms for criminal/illegal activities.

 

Types of Cybercrime -

Online Money ask - it is attempt to scam people by giving them false hope/promises

People who need employment are very easily fell into traps

Fraudster tell you to pay amount for interview or other things like enroll for next hiring

Lottery ,jackpot, direct money into account like this promises are scammers doing

Then they will block or didn’t gave you reply

 

Sextortion - 

It is blend of sex+extortion.It is similar to online blackmail

It is modern term and growing faster through social media

Basically teenagers and younger peoples are fell into this easily

Victim got dm/msg then asking for video call for revealing their private/sensitive information or exchange of naked images or videos.Then they store that data and blackmailing victim to pay extortion or do other activity

Phising - it is type of fraud that involves stealing personal information such as login id & password , credit/debit card information etc

Attacker will send mail/link that looks like similar as original website

 

Vishing - it is attempt where fraudsters try to seek personal information like id,password,atm pin,debit/credit card info or pin otp through call

 

Smishing - it is fraud that uses text msg/mail to lure victims into call innocent people,visiting harmful websites or downloading malicious content 

 

Ransomware - Ransomeware is type of computer malware that encrypt the files,storage mediaon devices like smartphones,computer,laptops etc. Victim is asked to pay demanded ransom for decryption of device

 

Data breach - In this Database information is leaked by anonymous/unauthorized person.

Domino's , Mobikwik,Air India's data breach is also done recently 


Comments ()


Sign in

Read Next

FASHION

Blog banner

Embaded operating system

Blog banner

Cyber Bullying - Neeta Vonkamuti

Blog banner

Know your Processors!

Blog banner

History of ITIL

Blog banner

Define Instagram.

Blog banner

GIS in Mapping and landslide alert in Bangladesh

Blog banner

Sensory Play for Toddlers: Boosting Curiosity Through Touch, Sound, and Colour

Blog banner

Denial-of-Service and Distributed Denial-of-Service Attack Techniques

Blog banner

VIRUS

Blog banner

Types Of scheduling

Blog banner

Ethical Hacking

Blog banner

5 Common Faults In Construction Tenders

Blog banner

INTERNET SECURITY

Blog banner

Virtual Memory - Explaination, Working, Steps

Blog banner

Operating system

Blog banner

What is Influencer Marketing and its Trends

Blog banner

Emerging threats in cyber Forensics

Blog banner

Types of Hackers

Blog banner

OS Assignment 3 Deadlock

Blog banner

ProofHub

Blog banner

HOW CAN SOCIAL MEDIA MAKE YOU HAPPIER?

Blog banner

What is online marketing and why do you need to know about it ?

Blog banner

Decrypting Cryptocurrency: Tracing Transactions in Cyber Investigations

Blog banner

BITCOIN WALLET

Blog banner

Operating system and overviews

Blog banner

AI and Data Science: Revolutionizing Industries

Blog banner

Twisted world

Blog banner

GIS info about Bermuda Triangle

Blog banner

File management

Blog banner

R Programming

Blog banner

Smitten Kitchen Keepers

Blog banner

MPL and how its effects?

Blog banner

GIS

Blog banner

Deadlock in operating system

Blog banner

Memory Management of Operating System(OS)

Blog banner

MOVEMBER

Blog banner

What is Internet

Blog banner

John Titor: The Time Traveler

Blog banner

BEAUTY IS IN THE EYE OF THE BEHOLDER

Blog banner

Concurrency:Deadlock and Starvation

Blog banner

10 Signs your Computer has Virus

Blog banner