SlideShare uma empresa Scribd logo
1 de 32
TABLE OFCONTENTS
• What is cyber crime?
• Types of cyber crime ?
What is Cyber Crime ?
• Cybercrime is criminal activity that either
targets or uses a computer,
a computer network or a networked device.
Most, but not all, cybercrime is committed
by cybercriminals or hackers who want to
make money. Cybercrime is carried out by
individuals or organizations.
Types of cyber crime
FINANCIAL FRAUDS
CVV/OTPFRAUD
UPIFRAUD
REMOTE ACCESSING APPS FRAUD
ONLINE SHOPPING FRAUD
LOTTERY FRAUD
MATRIMONIAL SITES FRAUD
PHISHING/VISHING/SMISHING FRAUD
ONLINE JOB FRAUD
SOCIAL MEDIAFRAUD
CYBER STALKING
CYBER BULLYING
IDENTITY THEFT
HACKING/ACCOUNT TAKEOVER
SEXTORTION
OTHERCYBERCRIMES
 RANSOMWARE
 MALWARE /RAT/MALICIOUS APPS
 KEYLOGGERS
 PUBLIC WI-FI AND HOTSPOTS
 SERVICE CENTERS
FINANCIAL FRAUD
01-CVV / OTP FRAUDS
 One-time password (OTP), a two-factor authentication, is
effective deterrent against cyber criminals trying to steal
money from victim’s bank account through online
transaction. This OTP is valid for one transaction only and
has time limit. In OTP Fraud, cyber criminals dupe bank
customers into revealing OTP and siphon off money from
bank account online.
 Common pretext used by Fraudster to Cheat/Dupe
Victims are:
 Renewing debit or credit cards
 Updating KYC
 Reward points or cash backs
KYC Verification
• The Bank official will never call you for
KYC verification
• If some one called and informed to
verify KYC other wise your account
will be Blocked – never do it.
• Never click any links shared for
verification of KYC
• Never give access /install app like
Anydesk or quick support apps.. These
apps steal your information
• You loose your amount from your bank
02-UPIFRAUDS
In UPI Fraud, UPI mobile app installed on
Fraudster’s mobile get linked to victim’s
bank account when victim sends some code
to another number. Once the victims
account gets linked with the frauds UPI app,
money will be siphoned off from the
victims account.
CustomerCare
• Never search for customer care
number through google.
• If you search you get plenty of
fraud customer care numbers
• The payment wallets/App have Help
desk inside the app.
• Connect the customer care support
from the app
03-REMOTEACCESSINGAPPSFRAUDS
(TEAMVIEWER,ANYDESKETC)
 Fraudsters trick the victim to install app to allow
remote access on the device. The fraudster gain
access to all OTP based transactions and siphons off
all the fund.
 Remote Accessing Mobile App: AnyDesk,
Teamviewer ETC.
Screen SharingApps
• Never download and install “anydesk”
or “quicksupport”
• If you install these applications, your
mobile screen can be viewed by some
one at other end.
• They can take out your UPI PIN and
other important financial passwords
• Most of the customer care frauds are
happened through this.. You may
loose money
04-ONLINE SHOPPINGFRAUDS
 Classified ads are one of the prominent sources for different
kind of scammers to find potential victims where frauds pose
both as buyers and sellers. In these type of fraud, scammers
posing as sellers, ask for pre-payment for delivery of items and
DOES NOT deliver it.
 While posing as buyers, scammers send Money request of UPI
Mobile App with instruction to type in MPIN to receive the money.
As soon as victim, enters MPIN amount is transferred to
fraudster’s account.
QR Code Fraud - Fewtricks
used by fraudsters
• Fraudster will share QR code
for payment of goods you
purchased online .
• When you scan and start
transaction, it ask for your PIN.
• Remember – When you are
receiving money, you never give
your PIN
• Never share your QR code to any
one. It contains all your bank
account details in it.
• Be careful while your scanning
and paying amount at shops.
05.LOTTERYFRAUD
 The fraud in which, victims receive phone calls,
emails, SMS’s, WhatsApp messages, or letters etc.
telling them that they have won a lottery or an
expensive gift. Victims are subsequently requested
to deposit money in a bank account as processing
fee or tax.
06-MATRIMONIALSITESFRAUDS
 Fraudsters befriend men/women after creating an
impressive online profile on a matrimonial site,
posing as prospective bride/bridegroom. After
gaining confidence, the fraudsters ask to transfer
money into their bank accounts stating various
emergencies. Once the money has been transferred
the fraudster cuts all the contacts with the victim
and disappear without a trace.
07-PHISHING / VISHING/ SMISHING
 Phishing: It is one of the well-known forms of social
engineering technique of sending a link via email or text or
embedding a link on a website or downloads malware onto the
user’s device.
 Vishing (or voice phishing) in which Scammers will call
targets from a phone (or spoofed) phone number, typically
claiming to be representatives of banks or financial
organizations.
 Smishing: It is SMS phishing attack in which attacker ask
target to download an app or open a link. Individuals are
more often the victims of smishing exploits.
08-ONLINE JOB FRAUD
 Cyber criminals advertise fake job offers using
various online platforms. Victim, in search of a
job, goes through these offers and contacts the
cybercriminal. Upon contacting cyber criminals,
victim is asked to pay registration fee or make an
advance payment (which they claim is refundable)
to avail their services for getting a job. Victim
transfers the money and follows the guidelines of
the fraudster and falls prey to the cyber-crime.
SOCIAL MEDIA FRAUD
01-CYBERSTALKING
 Cyber stalking is a crime in which the stalker
targets the victim with threatening/abusive
messages and/or follows them/their activities in
the real world. Cyber stalkers usually use digital
platforms like email, instant messages, phone
calls, and other communication modes to stalk
you. Cyber stalking can be a sexual harassment,
inappropriate contact or an unwelcome attention
in your life and your family’s activities.
02-CYBERBULLYING
 Cyber bullying is sharing personal or private
information about someone else with an intention
to cause embarrassment or humiliation, over
digital communication, such as e-mail, instant
messaging (IM), messages posted on a website or
a discussion group. It includes sending, posting, or
sharing negative, harmful, false, or abusive
content about other persons over social media or
other digital platforms.
03-HACKING/ACCOUNT TAKEOVER
 Hacking is the unauthorized access to or control
over computer network or digital devices for
some illicit purpose like data deletion, data loss or
stealing of sensitive data such as financial
information or company/personal secrets. The
genuine account of a person when accessed
through illicit means and gained control of the
same, by another person, for the purpose of
committing fraud is called Account takeover. We
have seen a rapid increase in segments such as
social media, e-commerce in recent years.
04-IDENTITYTHEFT
 Identity theft is the crime of obtaining the
personal or financial information of another
person to use their identity to commit a crime.
Identity Theft takes place whenever a criminal
gets hold of a piece of your information, and then
uses that information for their own personal gain.
05-SEXTORTION
 Sextortion is extorting money or sexual favors from
people by threatening to reveal evidence of their
sexual activity.
OTHER CYBER CRIME
01-RANSOMWARE
 Ransomware is as vicious malware that locks users
out of their devices or blocks access to files until a
sum of money or ransom is paid. Ransomware
attacks cause downtime, data loss, possible
intellectual property theft, and in certain
industries an attack is considered a data breach.
02-MALWARE/ RAT/ MALICIOUS APPS
 Malware, or malicious software, is any program or file that is
harmful to a computer user. Types of malware can include
computer viruses, worms, Trojan horses and spyware. These
applications may have viruses which pass sensitive information or
give control of your phone/device to some outside agent, who
gets access to your contacts, passwords, financial data etc.
 RAT- A Remote Access Trojan (RAT) is a type of malware that
allows covert surveillance, a backdoor for administrative control
and unfettered and unauthorized remote access to a victim's
machine or mobile.
03-KEYLOGGERS
 A Key logger is a hardware or software device
which monitors every keystroke, screen shots,
chats etc. typed on computer. Key loggers are used
as a tools by attacker to steel user’s usernames
and passwords in e-commerce, social network,
Mail service etc. There are two type of key
loggers- software-based and hardware based.
04-PUBLIC WI-FI AND HOTSPOTS
 Public WI-FI :- Using a public Wi-Fi network poses
danger to the users as the data over this type of open
connections are often unencrypted and unsecured,
leaving the users vulnerable to a man-in-the-middle
(MITM) attack. A cybercriminal exploits a security
flaw in the network to intercept data transmitting
through the network. This gives a hacker access to
sniff out any information that passes between you
and the websites you visit — details of browsing
activities, account logins, and purchase transactions.
Your sensitive information, such as passwords and
financial data, are then vulnerable to identity theft.
05-SERVICECENTERS
Smart phones are bound to get damaged
which have full of personal and important
data. There is a chance of the repair person
can access your data and may misuse it.
They can steal your data, photos, camera
module, speakers or microphone
depending upon smart phone models.
Thank You

Mais conteúdo relacionado

Semelhante a cyber_crim.pptx

December 2019 Part 10
December 2019 Part 10December 2019 Part 10
December 2019 Part 10
seadeloitte
 
cybercrime survival guide
cybercrime survival guidecybercrime survival guide
cybercrime survival guide
Gary Gray, MCSE
 

Semelhante a cyber_crim.pptx (20)

Cyber crime
Cyber crimeCyber crime
Cyber crime
 
cyber crime.pptx
cyber crime.pptxcyber crime.pptx
cyber crime.pptx
 
Cybercrimes
CybercrimesCybercrimes
Cybercrimes
 
CYBER.pptx
CYBER.pptxCYBER.pptx
CYBER.pptx
 
The Major Types of Cybercrime
The Major Types of CybercrimeThe Major Types of Cybercrime
The Major Types of Cybercrime
 
Internet related frauds
Internet related fraudsInternet related frauds
Internet related frauds
 
December 2019 Part 10
December 2019 Part 10December 2019 Part 10
December 2019 Part 10
 
Cyber crime and its types
Cyber crime and its  typesCyber crime and its  types
Cyber crime and its types
 
cybercrimeandtypes-19101817340 2.pdf
cybercrimeandtypes-19101817340      2.pdfcybercrimeandtypes-19101817340      2.pdf
cybercrimeandtypes-19101817340 2.pdf
 
Cyber Crime and Security ppt by Neeraj Ahirwar
Cyber Crime and Security ppt by Neeraj AhirwarCyber Crime and Security ppt by Neeraj Ahirwar
Cyber Crime and Security ppt by Neeraj Ahirwar
 
Cyber Laws.ppt
Cyber Laws.pptCyber Laws.ppt
Cyber Laws.ppt
 
ccs12-18022310494mghmgmyy3 (1).pdf
ccs12-18022310494mghmgmyy3 (1).pdfccs12-18022310494mghmgmyy3 (1).pdf
ccs12-18022310494mghmgmyy3 (1).pdf
 
Name parul
Name parulName parul
Name parul
 
Name parul
Name parulName parul
Name parul
 
Computer and internet Cybercrime Reports
Computer and internet Cybercrime ReportsComputer and internet Cybercrime Reports
Computer and internet Cybercrime Reports
 
Phishing.pdf
Phishing.pdfPhishing.pdf
Phishing.pdf
 
cybercrime survival guide
cybercrime survival guidecybercrime survival guide
cybercrime survival guide
 
Cyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptCyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.ppt
 
Cyber crime in pakistan by zubair
Cyber crime in pakistan by zubairCyber crime in pakistan by zubair
Cyber crime in pakistan by zubair
 
My presentation
My presentationMy presentation
My presentation
 

Último

CALL ON ➥8923113531 🔝Call Girls Takrohi Lucknow best Female service 👖
CALL ON ➥8923113531 🔝Call Girls Takrohi Lucknow best Female service  👖CALL ON ➥8923113531 🔝Call Girls Takrohi Lucknow best Female service  👖
CALL ON ➥8923113531 🔝Call Girls Takrohi Lucknow best Female service 👖
anilsa9823
 
Russian Call Girls Rohini Sector 37 💓 Delhi 9999965857 @Sabina Modi VVIP MODE...
Russian Call Girls Rohini Sector 37 💓 Delhi 9999965857 @Sabina Modi VVIP MODE...Russian Call Girls Rohini Sector 37 💓 Delhi 9999965857 @Sabina Modi VVIP MODE...
Russian Call Girls Rohini Sector 37 💓 Delhi 9999965857 @Sabina Modi VVIP MODE...
Call Girls In Delhi Whatsup 9873940964 Enjoy Unlimited Pleasure
 
Russian Call Girls Rohini Sector 35 💓 Delhi 9999965857 @Sabina Modi VVIP MODE...
Russian Call Girls Rohini Sector 35 💓 Delhi 9999965857 @Sabina Modi VVIP MODE...Russian Call Girls Rohini Sector 35 💓 Delhi 9999965857 @Sabina Modi VVIP MODE...
Russian Call Girls Rohini Sector 35 💓 Delhi 9999965857 @Sabina Modi VVIP MODE...
Call Girls In Delhi Whatsup 9873940964 Enjoy Unlimited Pleasure
 
Top Call Girls In Charbagh ( Lucknow ) 🔝 8923113531 🔝 Cash Payment
Top Call Girls In Charbagh ( Lucknow  ) 🔝 8923113531 🔝  Cash PaymentTop Call Girls In Charbagh ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment
Top Call Girls In Charbagh ( Lucknow ) 🔝 8923113531 🔝 Cash Payment
anilsa9823
 
Factors-on-Authenticity-and-Validity-of-Evidences-and-Information.pptx
Factors-on-Authenticity-and-Validity-of-Evidences-and-Information.pptxFactors-on-Authenticity-and-Validity-of-Evidences-and-Information.pptx
Factors-on-Authenticity-and-Validity-of-Evidences-and-Information.pptx
vemusae
 

Último (20)

Film show pre-production powerpoint for site
Film show pre-production powerpoint for siteFilm show pre-production powerpoint for site
Film show pre-production powerpoint for site
 
Night 7k Call Girls Noida Sector 120 Call Me: 8448380779
Night 7k Call Girls Noida Sector 120 Call Me: 8448380779Night 7k Call Girls Noida Sector 120 Call Me: 8448380779
Night 7k Call Girls Noida Sector 120 Call Me: 8448380779
 
CALL ON ➥8923113531 🔝Call Girls Takrohi Lucknow best Female service 👖
CALL ON ➥8923113531 🔝Call Girls Takrohi Lucknow best Female service  👖CALL ON ➥8923113531 🔝Call Girls Takrohi Lucknow best Female service  👖
CALL ON ➥8923113531 🔝Call Girls Takrohi Lucknow best Female service 👖
 
Enjoy Night⚡Call Girls Palam Vihar Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Palam Vihar Gurgaon >༒8448380779 Escort ServiceEnjoy Night⚡Call Girls Palam Vihar Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Palam Vihar Gurgaon >༒8448380779 Escort Service
 
Stunning ➥8448380779▻ Call Girls In Paharganj Delhi NCR
Stunning ➥8448380779▻ Call Girls In Paharganj Delhi NCRStunning ➥8448380779▻ Call Girls In Paharganj Delhi NCR
Stunning ➥8448380779▻ Call Girls In Paharganj Delhi NCR
 
Ignite Your Online Influence: Sociocosmos - Where Social Media Magic Happens
Ignite Your Online Influence: Sociocosmos - Where Social Media Magic HappensIgnite Your Online Influence: Sociocosmos - Where Social Media Magic Happens
Ignite Your Online Influence: Sociocosmos - Where Social Media Magic Happens
 
Elite Class ➥8448380779▻ Call Girls In Nizammuddin Delhi NCR
Elite Class ➥8448380779▻ Call Girls In Nizammuddin Delhi NCRElite Class ➥8448380779▻ Call Girls In Nizammuddin Delhi NCR
Elite Class ➥8448380779▻ Call Girls In Nizammuddin Delhi NCR
 
Film show investigation powerpoint for the site
Film show investigation powerpoint for the siteFilm show investigation powerpoint for the site
Film show investigation powerpoint for the site
 
Russian Call Girls Rohini Sector 37 💓 Delhi 9999965857 @Sabina Modi VVIP MODE...
Russian Call Girls Rohini Sector 37 💓 Delhi 9999965857 @Sabina Modi VVIP MODE...Russian Call Girls Rohini Sector 37 💓 Delhi 9999965857 @Sabina Modi VVIP MODE...
Russian Call Girls Rohini Sector 37 💓 Delhi 9999965857 @Sabina Modi VVIP MODE...
 
Your LinkedIn Makeover: Sociocosmos Presence Package
Your LinkedIn Makeover: Sociocosmos Presence PackageYour LinkedIn Makeover: Sociocosmos Presence Package
Your LinkedIn Makeover: Sociocosmos Presence Package
 
Pondicherry Call Girls Book Now 8617697112 Top Class Pondicherry Escort Servi...
Pondicherry Call Girls Book Now 8617697112 Top Class Pondicherry Escort Servi...Pondicherry Call Girls Book Now 8617697112 Top Class Pondicherry Escort Servi...
Pondicherry Call Girls Book Now 8617697112 Top Class Pondicherry Escort Servi...
 
Film show evaluation powerpoint for site
Film show evaluation powerpoint for siteFilm show evaluation powerpoint for site
Film show evaluation powerpoint for site
 
Vellore Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort Service
Vellore Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort ServiceVellore Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort Service
Vellore Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort Service
 
SELECTING A SOCIAL MEDIA MARKETING COMPANY
SELECTING A SOCIAL MEDIA MARKETING COMPANYSELECTING A SOCIAL MEDIA MARKETING COMPANY
SELECTING A SOCIAL MEDIA MARKETING COMPANY
 
BDSM⚡Call Girls in Sector 76 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 76 Noida Escorts >༒8448380779 Escort ServiceBDSM⚡Call Girls in Sector 76 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 76 Noida Escorts >༒8448380779 Escort Service
 
Russian Call Girls Rohini Sector 35 💓 Delhi 9999965857 @Sabina Modi VVIP MODE...
Russian Call Girls Rohini Sector 35 💓 Delhi 9999965857 @Sabina Modi VVIP MODE...Russian Call Girls Rohini Sector 35 💓 Delhi 9999965857 @Sabina Modi VVIP MODE...
Russian Call Girls Rohini Sector 35 💓 Delhi 9999965857 @Sabina Modi VVIP MODE...
 
Film show post-production powerpoint for site
Film show post-production powerpoint for siteFilm show post-production powerpoint for site
Film show post-production powerpoint for site
 
Top Call Girls In Charbagh ( Lucknow ) 🔝 8923113531 🔝 Cash Payment
Top Call Girls In Charbagh ( Lucknow  ) 🔝 8923113531 🔝  Cash PaymentTop Call Girls In Charbagh ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment
Top Call Girls In Charbagh ( Lucknow ) 🔝 8923113531 🔝 Cash Payment
 
Factors-on-Authenticity-and-Validity-of-Evidences-and-Information.pptx
Factors-on-Authenticity-and-Validity-of-Evidences-and-Information.pptxFactors-on-Authenticity-and-Validity-of-Evidences-and-Information.pptx
Factors-on-Authenticity-and-Validity-of-Evidences-and-Information.pptx
 
Lucknow 💋 Dating Call Girls Lucknow | Whatsapp No 8923113531 VIP Escorts Serv...
Lucknow 💋 Dating Call Girls Lucknow | Whatsapp No 8923113531 VIP Escorts Serv...Lucknow 💋 Dating Call Girls Lucknow | Whatsapp No 8923113531 VIP Escorts Serv...
Lucknow 💋 Dating Call Girls Lucknow | Whatsapp No 8923113531 VIP Escorts Serv...
 

cyber_crim.pptx

  • 1. TABLE OFCONTENTS • What is cyber crime? • Types of cyber crime ?
  • 2. What is Cyber Crime ? • Cybercrime is criminal activity that either targets or uses a computer, a computer network or a networked device. Most, but not all, cybercrime is committed by cybercriminals or hackers who want to make money. Cybercrime is carried out by individuals or organizations.
  • 4. FINANCIAL FRAUDS CVV/OTPFRAUD UPIFRAUD REMOTE ACCESSING APPS FRAUD ONLINE SHOPPING FRAUD LOTTERY FRAUD MATRIMONIAL SITES FRAUD PHISHING/VISHING/SMISHING FRAUD ONLINE JOB FRAUD
  • 5. SOCIAL MEDIAFRAUD CYBER STALKING CYBER BULLYING IDENTITY THEFT HACKING/ACCOUNT TAKEOVER SEXTORTION
  • 6. OTHERCYBERCRIMES  RANSOMWARE  MALWARE /RAT/MALICIOUS APPS  KEYLOGGERS  PUBLIC WI-FI AND HOTSPOTS  SERVICE CENTERS
  • 8. 01-CVV / OTP FRAUDS  One-time password (OTP), a two-factor authentication, is effective deterrent against cyber criminals trying to steal money from victim’s bank account through online transaction. This OTP is valid for one transaction only and has time limit. In OTP Fraud, cyber criminals dupe bank customers into revealing OTP and siphon off money from bank account online.  Common pretext used by Fraudster to Cheat/Dupe Victims are:  Renewing debit or credit cards  Updating KYC  Reward points or cash backs
  • 9. KYC Verification • The Bank official will never call you for KYC verification • If some one called and informed to verify KYC other wise your account will be Blocked – never do it. • Never click any links shared for verification of KYC • Never give access /install app like Anydesk or quick support apps.. These apps steal your information • You loose your amount from your bank
  • 10. 02-UPIFRAUDS In UPI Fraud, UPI mobile app installed on Fraudster’s mobile get linked to victim’s bank account when victim sends some code to another number. Once the victims account gets linked with the frauds UPI app, money will be siphoned off from the victims account.
  • 11. CustomerCare • Never search for customer care number through google. • If you search you get plenty of fraud customer care numbers • The payment wallets/App have Help desk inside the app. • Connect the customer care support from the app
  • 12. 03-REMOTEACCESSINGAPPSFRAUDS (TEAMVIEWER,ANYDESKETC)  Fraudsters trick the victim to install app to allow remote access on the device. The fraudster gain access to all OTP based transactions and siphons off all the fund.  Remote Accessing Mobile App: AnyDesk, Teamviewer ETC.
  • 13. Screen SharingApps • Never download and install “anydesk” or “quicksupport” • If you install these applications, your mobile screen can be viewed by some one at other end. • They can take out your UPI PIN and other important financial passwords • Most of the customer care frauds are happened through this.. You may loose money
  • 14. 04-ONLINE SHOPPINGFRAUDS  Classified ads are one of the prominent sources for different kind of scammers to find potential victims where frauds pose both as buyers and sellers. In these type of fraud, scammers posing as sellers, ask for pre-payment for delivery of items and DOES NOT deliver it.  While posing as buyers, scammers send Money request of UPI Mobile App with instruction to type in MPIN to receive the money. As soon as victim, enters MPIN amount is transferred to fraudster’s account.
  • 15. QR Code Fraud - Fewtricks used by fraudsters • Fraudster will share QR code for payment of goods you purchased online . • When you scan and start transaction, it ask for your PIN. • Remember – When you are receiving money, you never give your PIN • Never share your QR code to any one. It contains all your bank account details in it. • Be careful while your scanning and paying amount at shops.
  • 16. 05.LOTTERYFRAUD  The fraud in which, victims receive phone calls, emails, SMS’s, WhatsApp messages, or letters etc. telling them that they have won a lottery or an expensive gift. Victims are subsequently requested to deposit money in a bank account as processing fee or tax.
  • 17. 06-MATRIMONIALSITESFRAUDS  Fraudsters befriend men/women after creating an impressive online profile on a matrimonial site, posing as prospective bride/bridegroom. After gaining confidence, the fraudsters ask to transfer money into their bank accounts stating various emergencies. Once the money has been transferred the fraudster cuts all the contacts with the victim and disappear without a trace.
  • 18. 07-PHISHING / VISHING/ SMISHING  Phishing: It is one of the well-known forms of social engineering technique of sending a link via email or text or embedding a link on a website or downloads malware onto the user’s device.  Vishing (or voice phishing) in which Scammers will call targets from a phone (or spoofed) phone number, typically claiming to be representatives of banks or financial organizations.  Smishing: It is SMS phishing attack in which attacker ask target to download an app or open a link. Individuals are more often the victims of smishing exploits.
  • 19. 08-ONLINE JOB FRAUD  Cyber criminals advertise fake job offers using various online platforms. Victim, in search of a job, goes through these offers and contacts the cybercriminal. Upon contacting cyber criminals, victim is asked to pay registration fee or make an advance payment (which they claim is refundable) to avail their services for getting a job. Victim transfers the money and follows the guidelines of the fraudster and falls prey to the cyber-crime.
  • 21. 01-CYBERSTALKING  Cyber stalking is a crime in which the stalker targets the victim with threatening/abusive messages and/or follows them/their activities in the real world. Cyber stalkers usually use digital platforms like email, instant messages, phone calls, and other communication modes to stalk you. Cyber stalking can be a sexual harassment, inappropriate contact or an unwelcome attention in your life and your family’s activities.
  • 22. 02-CYBERBULLYING  Cyber bullying is sharing personal or private information about someone else with an intention to cause embarrassment or humiliation, over digital communication, such as e-mail, instant messaging (IM), messages posted on a website or a discussion group. It includes sending, posting, or sharing negative, harmful, false, or abusive content about other persons over social media or other digital platforms.
  • 23. 03-HACKING/ACCOUNT TAKEOVER  Hacking is the unauthorized access to or control over computer network or digital devices for some illicit purpose like data deletion, data loss or stealing of sensitive data such as financial information or company/personal secrets. The genuine account of a person when accessed through illicit means and gained control of the same, by another person, for the purpose of committing fraud is called Account takeover. We have seen a rapid increase in segments such as social media, e-commerce in recent years.
  • 24. 04-IDENTITYTHEFT  Identity theft is the crime of obtaining the personal or financial information of another person to use their identity to commit a crime. Identity Theft takes place whenever a criminal gets hold of a piece of your information, and then uses that information for their own personal gain.
  • 25. 05-SEXTORTION  Sextortion is extorting money or sexual favors from people by threatening to reveal evidence of their sexual activity.
  • 27. 01-RANSOMWARE  Ransomware is as vicious malware that locks users out of their devices or blocks access to files until a sum of money or ransom is paid. Ransomware attacks cause downtime, data loss, possible intellectual property theft, and in certain industries an attack is considered a data breach.
  • 28. 02-MALWARE/ RAT/ MALICIOUS APPS  Malware, or malicious software, is any program or file that is harmful to a computer user. Types of malware can include computer viruses, worms, Trojan horses and spyware. These applications may have viruses which pass sensitive information or give control of your phone/device to some outside agent, who gets access to your contacts, passwords, financial data etc.  RAT- A Remote Access Trojan (RAT) is a type of malware that allows covert surveillance, a backdoor for administrative control and unfettered and unauthorized remote access to a victim's machine or mobile.
  • 29. 03-KEYLOGGERS  A Key logger is a hardware or software device which monitors every keystroke, screen shots, chats etc. typed on computer. Key loggers are used as a tools by attacker to steel user’s usernames and passwords in e-commerce, social network, Mail service etc. There are two type of key loggers- software-based and hardware based.
  • 30. 04-PUBLIC WI-FI AND HOTSPOTS  Public WI-FI :- Using a public Wi-Fi network poses danger to the users as the data over this type of open connections are often unencrypted and unsecured, leaving the users vulnerable to a man-in-the-middle (MITM) attack. A cybercriminal exploits a security flaw in the network to intercept data transmitting through the network. This gives a hacker access to sniff out any information that passes between you and the websites you visit — details of browsing activities, account logins, and purchase transactions. Your sensitive information, such as passwords and financial data, are then vulnerable to identity theft.
  • 31. 05-SERVICECENTERS Smart phones are bound to get damaged which have full of personal and important data. There is a chance of the repair person can access your data and may misuse it. They can steal your data, photos, camera module, speakers or microphone depending upon smart phone models.