3. Charity Fraud
The scammer poses as a
charitable organization
soliciting donations to
help the victims of a
natural disaster, terrorist
attack, regional conflict,
or epidemic.
4. Online Gift Card Fraud
A voucher or gift card scam
takes place when
unsuspecting victims are
approached by fraudsters
and persuaded to pay bills,
fees or debts using iTunes
gift cards or other
vouchers.
Other popular ones?
5. Social Media Fraud
People tend to disclose more personal
information about themselves (e.g.
birthday, e-mail, hometown) in their
social networking profiles. This
personally identifiable information
could be used by fraudsters to steal
users' identities, and posting this
information on social media makes it a
lot easier for fraudsters to take control
of it.
6. Phishing
A phishing website is a domain similar in
name and appearance to an official
website.
They're made in order to fool someone into
believing it is legitimate.
Other names similar
are smishing,
spoofing,
whaling,spearphishin
g
7.
8.
9.
10.
11.
12.
13.
14. Safety Measures
1. Keep Financial Data Separate
For business users in particular, use a dedicated work station to
perform all company banking activity. Use other computers to
access the Internet and conduct non-banking business.
2. Know Who’s Asking
As a general rule of thumb, banks don’t send emails or text messages
that ask for personal information such as account and/or social
security numbers. Banks will also not require you to verify account
information in this manner.
15. Safety Measures
3. Keep Your Passwords Secret
Use strong, unique passwords. Don't use name of family member, pets or
anything close.
⭐ Rather, pick a sahaba or 2, encrypt their name(s) with symbols and special
character
🔥 Use different password for your email
🏆 Have pairs of password for different purposes
4. No Phishing Allowed
Beware of phishing emails. These emails are designed to prompt you to click
links provided within the email to verify or change your account in some way.