Skip to main content

Cyber Crimes


As we know The technology is moving so fast and from that internet scams or online frauds are having competition with Internet Security. From here we will know about the online frauds one by one so to protect ourselves from these type of attacks and to educate other people. Online frauds or internet scams means tricking a person with the intention to get money , credentials , property ,etc.

They are as listed below : -

  • Social Media Fraud
  • Free Job Fraud
  • Gift Voucher Fraud 
  • Fake emails and messages about Money 
  • Vehicles Fraud
And now we have listed all the frauds that can be done by attackers on victims so now we are knowing that how these can be performed by attackers 

  • Social Media Fraud : Nowadays everyone are using social media and kept the information within the social media so attackers can easily get the information about the target. When an attacker is ready he uses his knowledge to attack such as " A person has met with an accident and lost lot of blood so he need to have operation to survive so he is fighting for his life. If you think it is fake just call this number (A bot will be talking or attacker will be taking with voice changer ). So with kindness the other person sends money and the job is done". So understand which is fake and which is true.
  • Free Job Fraud : In this type of fraud people will get fooled by fake jobs such as " Bob is giving job to Alice .As we know , From the details giving to job most of the details will be present and which are much useful for the attacker. And attacker might keep some fake credentials page to keep his account links and he easily can get links of social media or some other accounts etc"
  • Gift Voucher Fraud : Here Attacker try to convince the victim using the gift voucher scams from famous websites like amazon , flipkart , ebay etc , So then when victim believes that he got a gift voucher and he will be displayed with the credentials page like username and password page of amazon or flipkart etc ....When the victim enters the details then attacker can fully access his accounts. So being careful is better in these types of links and anonymous links.
  • Fake Emails and Messages of Money As the name suggests an attacker try to send the fake SMS or Email to victim as he got the prize money of one Lakh rupee and just to click on this number so he can get it. But victim doesn't what is going on in the background when he click the links . For example ,Always attacker will be trying to attack you ,So just think before you click on a anonymous link.
  • Vehicle Fraud  : This is mostly like the fake sms and emails about money for instance an Attacker try to convince the victim that a car is available for less price so imitating like to get the offer and convincing the person and person gives his credentials to get the offer so attack happens without his presence .

THE END

Popular posts from this blog

Skills needed to become hacker!

It is not easy to become a hacker , and it will take years to learn about the hacking and to do real world attacks And if anyone said you in the youtube that you can learn hacking within days and months then believe it is completely fake . There are several things to become a hacker .They are : The Fundamental Skills   :  Basic Computer Skills : Networking Skills : Linux Skills Wireshark or TCPdump  Virtualization Security Concepts & Technologies Wireless Technologies Scripting Database skills Web Applications Forensics Advanced IP/TCP Cryptography Reverse Engineering Creative Thinking Problem Solving Skills Persistance

Protecting Ourselves From Cyber Crimes

As we know Cyber crimes can cause harm to data , money and reputation. So we need to know how to protect ourselves effecting from these.  So Government came up with the plan to make the country without any cyber crimes but it is impossible someone will find some vulnerability and someone is gonna patch it up. So everyone are trying to regulate the cyber crimes      We need below things to protect our sensitive information or any another information  Getting all the equipment related to cyber security : Every time it is easy to think , plan and explain but It is not easy to execute the cyber security team until we have a perfect plan and it will take years to make security to the nation so the Cyber security should have valid permissions from the government, related tools for accessing everything digital asset when the need is present and related permissions from the end users. Gathering people who are talented among the cyber security   : This is the most ...