A few moments ago, many thought to be internet savvy users if they ignored unsolicited emails. Usually they ask for help offering promises of inheritance with fantastic numbers.

However, even if you claim to internet savvy users, not a few are still deceived in the virtual world. It is due to the thinning boundary between the scam and the business from the truth. The trick is also more diverse.

Here are 7 ways of cyberspace where many users are caught in it:

1. Fake Email from Social Network
This kind of phishing scam starts a fake email that appears to come from a real social network. Email messages say that we receive new and important notifications or someone is trying to access our account so we need to immediately verify the information.

If we click on the link in the email then we are led to the fake website. If we sign in at the fake site, the culprits can hack into our real account. The scammer can then steal an identity, send junk messages (spam) to friends and family, or even use personal information to blackmail victims.

If there is a notification to view our social networking, then we should directly type the web address or use the application on the smart phone. Do not hit click on the link submitted. Apply two-step verification to our entire account. That way, when someone tries to sign in to an account through an unknown computer, we get notifications.

2. Attachment Unexpected
When performing this type of trickery, the scammer gets access to an e-mail account or social network belonging to one of his colleagues or relatives. The offender then sends fake emails or direct messages to all the contacts in the account owner list. E-mail and messages are accompanied by attachments or links to websites to download files.

If we download the file on the trap website, they deploy malware on the computer to lock and host all files in our device.

If we receive an attachment or link to the file sharing page of a person in our contacts, do not open. Instantly contact the person and preferably through other means. Ask the file and make sure that it actually sends it.

3. Friend Request
Perhaps we have received a friend request from someone in a social network, either anonymous or a friend who is already in our network. Once we receive a friend request, the scammer gets access to our personal information and can be used to hack the bank account. The information in question such as birthdays, parent's name, and pet's name. The perpetrator can also send a trap link or ask for money.

So, do not accept friendship from strangers. If we are friends with someone in the network, ask the friend about the 2nd account. Do not share personal information that can be used to penetrate bank account security questions online. If you're out of town, do not upload about it before we go home.

4. Free Wi-Fi
To commit a crime, the offender creates an open Wi-Fi hotspot access in a coffee shop or airport. The Wi-Fi network is connected to the perpetrator's laptop. If we join the free network, the offender grabs access to our computer and digs financial and personal data. Here are tips to avoid criminals using Wi-Fi:
  • Make sure the settings on our computer or phone do not automatically join the open Wi-Fi network without a password.
  • Enable the "Ask to join new networks." Turn off Wi-Fi of your device except when we do use it.
  • If you'd like to join a personal Wi-Fi business network, ask the real name of the network on the spot before joining.
  • If you visit a public place such as an airport, look for previous information to ensure the official name of the Wi-Fi network in that place.
  • Do not do financial transactions while linking to free networks.
  • If we travel frequently, bring yourself a hotspot with password protection.

5. Pop-up Scary
Maybe we've been using a computer, then pop-up display that warns us that our computers are infected with viruses and worms. The pop-up message suggests that we scan the device with certain antivirus software programs, then offer to clean out fake bugs at a low cost.

If we download the program offered, then the program is installing malware in our device, let alone the perpetrator then get credit card information when requesting payment cleaning bugs (computer trouble). To avoid this, do not click on any link via pop-up. Install a trusted antivirus program on your browser to prevent pop-up traps.

Keep copies of important files on external devices just in case.

6. Excessive Dating Profiles
The fraudsters create fake dating profiles using information that is completely fictitious or using stolen data from someone. He then lured us with messages, photographs and phone calls, but always refused to meet in person.

He asked for help to pay the monthly bills. If we send money, then the perpetrator is then never heard from again or, on the contrary, more often requests for remittances. Use common sense. If someone on a dating site constantly refuses to meet, then maybe he's just interested in our money. Never send money to people we meet online.

7. Requests Help
This one trickster is usually more thorough in committing a crime. He creates a fund-raising (crowd-funding) page or charity website that deals with topics that are on the news, such as a natural disaster or someone who needs help. Perpetrators convince people to spread the link through social media, then send emails to us about our share to the noble cause of charity.

If we click on links and donate money using a banking card, then the fraudsters can steal our banking information, then break into accounts or sell information to other criminals who will break.

To avoid this, do not click on links received through emails or suspicious website addresses posted on social media. To donate to people in need of help, contact the official site directly. Make sure that the site we visit is correct and secure, please note the site address begins with the words "https: //"

Post a Comment