SlideShare a Scribd company logo
Fraud: What and How?
“Fraud and falsification are highly destructive to market capitalism and, more broadly, to the
underpinnings of our society. Our market-system depends critically on trust. Trust in the word of our
colleagues and trust in the word of those with whom we do businesses”----Alan Greenspan
According to the US Secret Service, hundreds of millions of dollars are lost annually and the losses
continue to escalate. Types of frauds are categorized under Corporate Fraud, Securities and
Commodities Fraud, Mortgage Fraud, Health Care Fraud and Money Laundering. Fraudsters carried out
these scams mostly through letter, email, text and telephone.
Let’s look at the top internet based frauds:
1. The Nigerian scam, also known as 419/ Advance fee fraud:
Consumer receives letter, fax or email asking for help in transferring money overseas. Recipient
offered slice for themselves for transferring money, usually 25-30%.
In every variation, the scammer is promising obscenely large payments for small unskilled tasks.
This scam, like most scams, is too good to be true. Yet people still fall for this money transfer
con game.
2. Fake foreign lotteries:
Letters, phone calls or emails tell of big win and ask recipients to send money to cover
administration or taxes.
3. Work at home and business opportunity scams:
Offers of quick way to make money without having qualifications or expertise. Money up front
demanded as registration fee or to buy goods for selling.
4. Sweepstake scams and misleading prize draws
Notification of a cash prize in return for up-front payments.
5. Psychic scams
Letters sent by so-called psychics or clairvoyants offer prediction or threaten dangers if no
payment received.
6. Pyramid schemes and chain letters
If enough members join, pyramid will grow. But in order for every member to make money
there has to be endless supply of newcomers.
7. Spoofing/Phishing fraud:
Spoofing is a type of fraud in which a fraudster masquerades as another person by using another
person’s identity to transact business and obtain vital information such as bank account
numbers, credit card numbers and associated passwords. Phishing is a form of spoofing in which
the web page of a particular entity can be duplicated and positioned with URL for the purpose of
luring people to divulge vital financial information.
8. Rebate Phone Call:
In this scam, consumers receive a phone call from someone identifying himself as an IRS
employee. The caller tells the targeted victim that he is eligible for a sizable rebate for filing his
taxes early. The caller then states that he needs the target’s bank account information for the
direct deposit of the rebate. If the target refuses, he is told that he cannot receive the rebate.
9. Ponzi Fraud:
This is a system of luring investors to invest in a scheme in which the investment firm promises
abnormally high returns, meanwhile the early investors shall be paid with investment capital
obtained from success investors. The payment chain would continue till the point of collapse.
Technological advancement is the backbone of an economy. However every positive side has a dark side
associated with it. It is important that when a common man uses internet to explore the world of
information he also is aware about the probable frauds floating around. He must be educated about the
pros and cons of using internet and awareness programs should be conducted against cyber crime. We
shall discuss how to avoid becoming a victim of cyber fraud in our next blog.
Avoid becoming a victim of cyber fraud: Do’s and don’ts
Cyber Fraud also known as International Mass Marketing Fraud is a crime that uses distance and
location as its primary means of success, making it more difficult for law enforcement to track and
prosecute the perpetrators. In part, this is due to jurisdictional authority of law enforcement agencies
throughout the world.
What to look for :
• Being asked for personal financial Information such as bank account information or credit card
numbers via the telephone or by email.
• Using high pressure sales tactics so as not to give you time to think about the information you
are providing.
• Being told you have won a foreign lottery or sweepstakes.
• Being asked to help transfer funds out of a foreign country for a share of the money.
• Being offered help in repairing credit scores for an advanced fee.
• Receiving a counterfeit casher’s check or money order for more than the cost of the item you
are selling.
Do’s and don’ts:
• Do not respond to unsolicited e-mail.
• Research any offers received over the Internet or telephone.
• Do not deposit any checks that are supposed winnings from a lottery or sweepstakes, especially
if you didn’t enter one.
• Keep in mind that online businesses, including banks and merchants, typically will not ask for
personal information, such as usernames and passwords, via e-mail. When in doubt either call
the company directly or open your computer’s Internet browser and type the known website’s
address. Don’t use the telephone number contained in the e-mail, which is likely to be
fraudulent as well.
• Be wary of individuals representing themselves as foreign government officials.
• Beware when asked to assist in placing large sums of money in overseas bank accounts.
• Avoid filling out forms in email messages that ask for personal information.
• Consult friends and family or a trusted advisor before making any major financial decision.
• If you have been a victim of Internet crime, please file a complaint at http://www.IC3.gov/.
Although the threat posed by cyber criminals is real, through the use of a few basic Internet security
practices and an awareness of the more common cyber criminal schemes, individuals can reduce their
risk of becoming a victim. Users should remain aware of the latest online fraud scam. However, if an
individual believes he has already been the victim of a cyber crime, he should notify the appropriate law
enforcement agency as soon as possible, and may file a complaint. Providing timely and thorough
information detailing the particulars of the scheme and identifying characteristics of the criminals helps
law enforcement develop an effective investigative strategy.

More Related Content

What's hot

Guidance on Beneficial Ownership
Guidance on  Beneficial OwnershipGuidance on  Beneficial Ownership
Guidance on Beneficial Ownership
Ziaullah Mirza
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
Jayant Raj
 
Frauds in banking
Frauds in banking Frauds in banking
Frauds in banking
Vinayak Halapeti
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
Mahabubur Rahman
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
Md. Atiqur Rahman
 
Scams and-fraud-presentation
Scams and-fraud-presentationScams and-fraud-presentation
Scams and-fraud-presentation
Roel Palmaers
 
Cybercrime
CybercrimeCybercrime
Cybercrime
Komal003
 
Social engineering
Social engineering Social engineering
Social engineering
Vîñàý Pãtêl
 
7 Cyber Crimes on Social Media Against Women [India]
7 Cyber Crimes on Social Media Against Women [India]7 Cyber Crimes on Social Media Against Women [India]
7 Cyber Crimes on Social Media Against Women [India]
Sorav Jain
 
Credit card frauds
Credit card fraudsCredit card frauds
Credit card frauds
Jeetendra Khilnani
 
Money laundering by Imad Feneir
Money laundering by Imad FeneirMoney laundering by Imad Feneir
Money laundering by Imad Feneir
Imad Mohamed Feneir
 
Fraud forgery and scams powerpoint
Fraud forgery and scams powerpointFraud forgery and scams powerpoint
Fraud forgery and scams powerpoint
mortgagerateutah
 
Presentation on cyber crime
Presentation on cyber crimePresentation on cyber crime
Presentation on cyber crime
PsychoticBanda
 
Cyber Terrorism
Cyber TerrorismCyber Terrorism
Cyber Terrorism
Shivam Lohiya
 
Introduction to cyber law.
Introduction to cyber law. Introduction to cyber law.
Introduction to cyber law.
PROF. PUTTU GURU PRASAD
 
Cyber crime ✔
Cyber  crime  ✔Cyber  crime  ✔
Cyber crime ✔
hubbysoni
 
Essentials of a Highly Effective Employee Fraud Awareness Program
Essentials of a Highly Effective Employee Fraud Awareness ProgramEssentials of a Highly Effective Employee Fraud Awareness Program
Essentials of a Highly Effective Employee Fraud Awareness Program
FraudBusters
 
Cyber Crime & Precautions
Cyber Crime & PrecautionsCyber Crime & Precautions
Cyber Crime & Precautions
Talwant Singh
 
Credit Card Fraud
Credit Card Fraud Credit Card Fraud
Credit Card Fraud
Mikael Wagner
 
Identity theft
Identity theftIdentity theft
Identity theft
Eqhball Ghazizadeh
 

What's hot (20)

Guidance on Beneficial Ownership
Guidance on  Beneficial OwnershipGuidance on  Beneficial Ownership
Guidance on Beneficial Ownership
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 
Frauds in banking
Frauds in banking Frauds in banking
Frauds in banking
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Scams and-fraud-presentation
Scams and-fraud-presentationScams and-fraud-presentation
Scams and-fraud-presentation
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Social engineering
Social engineering Social engineering
Social engineering
 
7 Cyber Crimes on Social Media Against Women [India]
7 Cyber Crimes on Social Media Against Women [India]7 Cyber Crimes on Social Media Against Women [India]
7 Cyber Crimes on Social Media Against Women [India]
 
Credit card frauds
Credit card fraudsCredit card frauds
Credit card frauds
 
Money laundering by Imad Feneir
Money laundering by Imad FeneirMoney laundering by Imad Feneir
Money laundering by Imad Feneir
 
Fraud forgery and scams powerpoint
Fraud forgery and scams powerpointFraud forgery and scams powerpoint
Fraud forgery and scams powerpoint
 
Presentation on cyber crime
Presentation on cyber crimePresentation on cyber crime
Presentation on cyber crime
 
Cyber Terrorism
Cyber TerrorismCyber Terrorism
Cyber Terrorism
 
Introduction to cyber law.
Introduction to cyber law. Introduction to cyber law.
Introduction to cyber law.
 
Cyber crime ✔
Cyber  crime  ✔Cyber  crime  ✔
Cyber crime ✔
 
Essentials of a Highly Effective Employee Fraud Awareness Program
Essentials of a Highly Effective Employee Fraud Awareness ProgramEssentials of a Highly Effective Employee Fraud Awareness Program
Essentials of a Highly Effective Employee Fraud Awareness Program
 
Cyber Crime & Precautions
Cyber Crime & PrecautionsCyber Crime & Precautions
Cyber Crime & Precautions
 
Credit Card Fraud
Credit Card Fraud Credit Card Fraud
Credit Card Fraud
 
Identity theft
Identity theftIdentity theft
Identity theft
 

Viewers also liked

Provident fund ppt
Provident fund pptProvident fund ppt
Provident fund ppt
Dixita S
 
Annual Budget
Annual Budget Annual Budget
Annual Budget
Dixita S
 
Increase in pf contribution
Increase in pf contributionIncrease in pf contribution
Increase in pf contribution
thesanyamjain
 
Ppt on epf act 1952
Ppt on epf act 1952Ppt on epf act 1952
Ppt on epf act 1952
renkey
 
PPT on "Provident Fund & MP Act 1952" of India.
PPT on "Provident Fund & MP Act 1952" of India.PPT on "Provident Fund & MP Act 1952" of India.
PPT on "Provident Fund & MP Act 1952" of India.
Anshu Shekhar Singh
 
Employees’ provident funds and Miscellaneous Provisions Act, 1952
Employees’ provident funds and Miscellaneous Provisions Act, 1952Employees’ provident funds and Miscellaneous Provisions Act, 1952
Employees’ provident funds and Miscellaneous Provisions Act, 1952
kushnabh chhabra
 
Sukanya Samriddhi Account
Sukanya Samriddhi Account Sukanya Samriddhi Account
Sukanya Samriddhi Account thesanyamjain
 
Employee separation
Employee separation Employee separation
Employee separation
Muhammad Akmal Hossain
 
Writing effective emails
Writing effective emailsWriting effective emails
Writing effective emails
Dixita S
 
Retirement Planning
Retirement PlanningRetirement Planning
Retirement Planning
John Daniel
 
Employees deposit linked insurance scheme 1976
Employees  deposit linked insurance scheme 1976Employees  deposit linked insurance scheme 1976
Employees deposit linked insurance scheme 1976
Rachna vats
 

Viewers also liked (11)

Provident fund ppt
Provident fund pptProvident fund ppt
Provident fund ppt
 
Annual Budget
Annual Budget Annual Budget
Annual Budget
 
Increase in pf contribution
Increase in pf contributionIncrease in pf contribution
Increase in pf contribution
 
Ppt on epf act 1952
Ppt on epf act 1952Ppt on epf act 1952
Ppt on epf act 1952
 
PPT on "Provident Fund & MP Act 1952" of India.
PPT on "Provident Fund & MP Act 1952" of India.PPT on "Provident Fund & MP Act 1952" of India.
PPT on "Provident Fund & MP Act 1952" of India.
 
Employees’ provident funds and Miscellaneous Provisions Act, 1952
Employees’ provident funds and Miscellaneous Provisions Act, 1952Employees’ provident funds and Miscellaneous Provisions Act, 1952
Employees’ provident funds and Miscellaneous Provisions Act, 1952
 
Sukanya Samriddhi Account
Sukanya Samriddhi Account Sukanya Samriddhi Account
Sukanya Samriddhi Account
 
Employee separation
Employee separation Employee separation
Employee separation
 
Writing effective emails
Writing effective emailsWriting effective emails
Writing effective emails
 
Retirement Planning
Retirement PlanningRetirement Planning
Retirement Planning
 
Employees deposit linked insurance scheme 1976
Employees  deposit linked insurance scheme 1976Employees  deposit linked insurance scheme 1976
Employees deposit linked insurance scheme 1976
 

Similar to Cyber Fraud

Unit 2- Economic Offences Types of Frauds
Unit 2- Economic Offences Types of FraudsUnit 2- Economic Offences Types of Frauds
Unit 2- Economic Offences Types of Frauds
Kumarasamy Dr.PK
 
Louise hunt.com-faceless fraudsters 5 helpful tips (1)
Louise hunt.com-faceless fraudsters  5 helpful tips (1)Louise hunt.com-faceless fraudsters  5 helpful tips (1)
Louise hunt.com-faceless fraudsters 5 helpful tips (1)
Louise Hunt
 
You Have the Power to Stop Identity Theft
You Have the Power to Stop Identity TheftYou Have the Power to Stop Identity Theft
You Have the Power to Stop Identity Theft
- Mark - Fullbright
 
You Can Fight Identity Theft
You Can Fight Identity TheftYou Can Fight Identity Theft
You Can Fight Identity Theft
- Mark - Fullbright
 
cian A lottery scam
cian A lottery scamcian A lottery scam
cian A lottery scam
pussyclaat
 
IB Fraud
IB FraudIB Fraud
Frauds and scams
Frauds and scamsFrauds and scams
Frauds and scams
Harold Stallard
 
Internet Fraud
Internet FraudInternet Fraud
Internet Fraud
Elijah Ezendu
 
My #1 Complaint – My Clients Don’t Protect Themselves from Fraud and Cyber Crim
My #1 Complaint – My Clients Don’t Protect Themselves from Fraud and Cyber CrimMy #1 Complaint – My Clients Don’t Protect Themselves from Fraud and Cyber Crim
My #1 Complaint – My Clients Don’t Protect Themselves from Fraud and Cyber Crim
Anthony Semadeni
 
Scams and Frauds: Seniors, beware.
Scams and Frauds: Seniors, beware.Scams and Frauds: Seniors, beware.
Scams and Frauds: Seniors, beware.
MagicKitchen.com
 
Identity theft 10 mar15
Identity theft 10 mar15Identity theft 10 mar15
Identity theft 10 mar15
Naval OPSEC
 
Identity Theft - Canada
Identity Theft - CanadaIdentity Theft - Canada
Identity Theft - Canada
- Mark - Fullbright
 
New Utility Scam: Alert from David Lerner Associates
New Utility Scam: Alert from David Lerner AssociatesNew Utility Scam: Alert from David Lerner Associates
New Utility Scam: Alert from David Lerner Associates
David Lerner Associates
 
Preventing Nonprofit Banking Fraud and the Tools You Can Use!
Preventing Nonprofit Banking Fraud and the Tools You Can Use!Preventing Nonprofit Banking Fraud and the Tools You Can Use!
Preventing Nonprofit Banking Fraud and the Tools You Can Use!
tomciolkosz
 
FHRBOC Preventing NFP Banking Fraud
FHRBOC Preventing NFP Banking FraudFHRBOC Preventing NFP Banking Fraud
FHRBOC Preventing NFP Banking Fraud
tomciolkosz
 
Identity Theft Prevention
Identity Theft PreventionIdentity Theft Prevention
Identity Theft Prevention
Springboard
 
4 Most Common Financial Crimes To Protect Against
4 Most Common Financial Crimes To Protect Against4 Most Common Financial Crimes To Protect Against
4 Most Common Financial Crimes To Protect Against
Veriti Consulting LLC
 
Lloyds Bank fraud guidance
Lloyds Bank fraud guidanceLloyds Bank fraud guidance
Lloyds Bank fraud guidance
David Atkinson
 
Fraud Awareness Guide for Individuals
Fraud Awareness Guide for IndividualsFraud Awareness Guide for Individuals
Fraud Awareness Guide for Individuals
Shred Station
 
ID Theft
ID TheftID Theft
ID Theft
Willhack
 

Similar to Cyber Fraud (20)

Unit 2- Economic Offences Types of Frauds
Unit 2- Economic Offences Types of FraudsUnit 2- Economic Offences Types of Frauds
Unit 2- Economic Offences Types of Frauds
 
Louise hunt.com-faceless fraudsters 5 helpful tips (1)
Louise hunt.com-faceless fraudsters  5 helpful tips (1)Louise hunt.com-faceless fraudsters  5 helpful tips (1)
Louise hunt.com-faceless fraudsters 5 helpful tips (1)
 
You Have the Power to Stop Identity Theft
You Have the Power to Stop Identity TheftYou Have the Power to Stop Identity Theft
You Have the Power to Stop Identity Theft
 
You Can Fight Identity Theft
You Can Fight Identity TheftYou Can Fight Identity Theft
You Can Fight Identity Theft
 
cian A lottery scam
cian A lottery scamcian A lottery scam
cian A lottery scam
 
IB Fraud
IB FraudIB Fraud
IB Fraud
 
Frauds and scams
Frauds and scamsFrauds and scams
Frauds and scams
 
Internet Fraud
Internet FraudInternet Fraud
Internet Fraud
 
My #1 Complaint – My Clients Don’t Protect Themselves from Fraud and Cyber Crim
My #1 Complaint – My Clients Don’t Protect Themselves from Fraud and Cyber CrimMy #1 Complaint – My Clients Don’t Protect Themselves from Fraud and Cyber Crim
My #1 Complaint – My Clients Don’t Protect Themselves from Fraud and Cyber Crim
 
Scams and Frauds: Seniors, beware.
Scams and Frauds: Seniors, beware.Scams and Frauds: Seniors, beware.
Scams and Frauds: Seniors, beware.
 
Identity theft 10 mar15
Identity theft 10 mar15Identity theft 10 mar15
Identity theft 10 mar15
 
Identity Theft - Canada
Identity Theft - CanadaIdentity Theft - Canada
Identity Theft - Canada
 
New Utility Scam: Alert from David Lerner Associates
New Utility Scam: Alert from David Lerner AssociatesNew Utility Scam: Alert from David Lerner Associates
New Utility Scam: Alert from David Lerner Associates
 
Preventing Nonprofit Banking Fraud and the Tools You Can Use!
Preventing Nonprofit Banking Fraud and the Tools You Can Use!Preventing Nonprofit Banking Fraud and the Tools You Can Use!
Preventing Nonprofit Banking Fraud and the Tools You Can Use!
 
FHRBOC Preventing NFP Banking Fraud
FHRBOC Preventing NFP Banking FraudFHRBOC Preventing NFP Banking Fraud
FHRBOC Preventing NFP Banking Fraud
 
Identity Theft Prevention
Identity Theft PreventionIdentity Theft Prevention
Identity Theft Prevention
 
4 Most Common Financial Crimes To Protect Against
4 Most Common Financial Crimes To Protect Against4 Most Common Financial Crimes To Protect Against
4 Most Common Financial Crimes To Protect Against
 
Lloyds Bank fraud guidance
Lloyds Bank fraud guidanceLloyds Bank fraud guidance
Lloyds Bank fraud guidance
 
Fraud Awareness Guide for Individuals
Fraud Awareness Guide for IndividualsFraud Awareness Guide for Individuals
Fraud Awareness Guide for Individuals
 
ID Theft
ID TheftID Theft
ID Theft
 

Recently uploaded

Discover the benefits of outsourcing SEO to India
Discover the benefits of outsourcing SEO to IndiaDiscover the benefits of outsourcing SEO to India
Discover the benefits of outsourcing SEO to India
davidjhones387
 
制作原版1:1(Monash毕业证)莫纳什大学毕业证成绩单办理假
制作原版1:1(Monash毕业证)莫纳什大学毕业证成绩单办理假制作原版1:1(Monash毕业证)莫纳什大学毕业证成绩单办理假
制作原版1:1(Monash毕业证)莫纳什大学毕业证成绩单办理假
ukwwuq
 
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
cuobya
 
[HUN][hackersuli] Red Teaming alapok 2024
[HUN][hackersuli] Red Teaming alapok 2024[HUN][hackersuli] Red Teaming alapok 2024
[HUN][hackersuli] Red Teaming alapok 2024
hackersuli
 
Explore-Insanony: Watch Instagram Stories Secretly
Explore-Insanony: Watch Instagram Stories SecretlyExplore-Insanony: Watch Instagram Stories Secretly
Explore-Insanony: Watch Instagram Stories Secretly
Trending Blogers
 
学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作
学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作
学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作
zyfovom
 
manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaalmanuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
wolfsoftcompanyco
 
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdfMeet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
Florence Consulting
 
Understanding User Behavior with Google Analytics.pdf
Understanding User Behavior with Google Analytics.pdfUnderstanding User Behavior with Google Analytics.pdf
Understanding User Behavior with Google Analytics.pdf
SEO Article Boost
 
国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
zoowe
 
Design Thinking NETFLIX using all techniques.pptx
Design Thinking NETFLIX using all techniques.pptxDesign Thinking NETFLIX using all techniques.pptx
Design Thinking NETFLIX using all techniques.pptx
saathvikreddy2003
 
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
vmemo1
 
7 Best Cloud Hosting Services to Try Out in 2024
7 Best Cloud Hosting Services to Try Out in 20247 Best Cloud Hosting Services to Try Out in 2024
7 Best Cloud Hosting Services to Try Out in 2024
Danica Gill
 
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
ysasp1
 
Search Result Showing My Post is Now Buried
Search Result Showing My Post is Now BuriedSearch Result Showing My Post is Now Buried
Search Result Showing My Post is Now Buried
Trish Parr
 
留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
uehowe
 
Gen Z and the marketplaces - let's translate their needs
Gen Z and the marketplaces - let's translate their needsGen Z and the marketplaces - let's translate their needs
Gen Z and the marketplaces - let's translate their needs
Laura Szabó
 
Should Repositories Participate in the Fediverse?
Should Repositories Participate in the Fediverse?Should Repositories Participate in the Fediverse?
Should Repositories Participate in the Fediverse?
Paul Walk
 
Azure EA Sponsorship - Customer Guide.pdf
Azure EA Sponsorship - Customer Guide.pdfAzure EA Sponsorship - Customer Guide.pdf
Azure EA Sponsorship - Customer Guide.pdf
AanSulistiyo
 
留学学历(UoA毕业证)奥克兰大学毕业证成绩单官方原版办理
留学学历(UoA毕业证)奥克兰大学毕业证成绩单官方原版办理留学学历(UoA毕业证)奥克兰大学毕业证成绩单官方原版办理
留学学历(UoA毕业证)奥克兰大学毕业证成绩单官方原版办理
bseovas
 

Recently uploaded (20)

Discover the benefits of outsourcing SEO to India
Discover the benefits of outsourcing SEO to IndiaDiscover the benefits of outsourcing SEO to India
Discover the benefits of outsourcing SEO to India
 
制作原版1:1(Monash毕业证)莫纳什大学毕业证成绩单办理假
制作原版1:1(Monash毕业证)莫纳什大学毕业证成绩单办理假制作原版1:1(Monash毕业证)莫纳什大学毕业证成绩单办理假
制作原版1:1(Monash毕业证)莫纳什大学毕业证成绩单办理假
 
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
 
[HUN][hackersuli] Red Teaming alapok 2024
[HUN][hackersuli] Red Teaming alapok 2024[HUN][hackersuli] Red Teaming alapok 2024
[HUN][hackersuli] Red Teaming alapok 2024
 
Explore-Insanony: Watch Instagram Stories Secretly
Explore-Insanony: Watch Instagram Stories SecretlyExplore-Insanony: Watch Instagram Stories Secretly
Explore-Insanony: Watch Instagram Stories Secretly
 
学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作
学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作
学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作
 
manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaalmanuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
 
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdfMeet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
 
Understanding User Behavior with Google Analytics.pdf
Understanding User Behavior with Google Analytics.pdfUnderstanding User Behavior with Google Analytics.pdf
Understanding User Behavior with Google Analytics.pdf
 
国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
 
Design Thinking NETFLIX using all techniques.pptx
Design Thinking NETFLIX using all techniques.pptxDesign Thinking NETFLIX using all techniques.pptx
Design Thinking NETFLIX using all techniques.pptx
 
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
 
7 Best Cloud Hosting Services to Try Out in 2024
7 Best Cloud Hosting Services to Try Out in 20247 Best Cloud Hosting Services to Try Out in 2024
7 Best Cloud Hosting Services to Try Out in 2024
 
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
 
Search Result Showing My Post is Now Buried
Search Result Showing My Post is Now BuriedSearch Result Showing My Post is Now Buried
Search Result Showing My Post is Now Buried
 
留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
 
Gen Z and the marketplaces - let's translate their needs
Gen Z and the marketplaces - let's translate their needsGen Z and the marketplaces - let's translate their needs
Gen Z and the marketplaces - let's translate their needs
 
Should Repositories Participate in the Fediverse?
Should Repositories Participate in the Fediverse?Should Repositories Participate in the Fediverse?
Should Repositories Participate in the Fediverse?
 
Azure EA Sponsorship - Customer Guide.pdf
Azure EA Sponsorship - Customer Guide.pdfAzure EA Sponsorship - Customer Guide.pdf
Azure EA Sponsorship - Customer Guide.pdf
 
留学学历(UoA毕业证)奥克兰大学毕业证成绩单官方原版办理
留学学历(UoA毕业证)奥克兰大学毕业证成绩单官方原版办理留学学历(UoA毕业证)奥克兰大学毕业证成绩单官方原版办理
留学学历(UoA毕业证)奥克兰大学毕业证成绩单官方原版办理
 

Cyber Fraud

  • 1. Fraud: What and How? “Fraud and falsification are highly destructive to market capitalism and, more broadly, to the underpinnings of our society. Our market-system depends critically on trust. Trust in the word of our colleagues and trust in the word of those with whom we do businesses”----Alan Greenspan According to the US Secret Service, hundreds of millions of dollars are lost annually and the losses continue to escalate. Types of frauds are categorized under Corporate Fraud, Securities and Commodities Fraud, Mortgage Fraud, Health Care Fraud and Money Laundering. Fraudsters carried out these scams mostly through letter, email, text and telephone. Let’s look at the top internet based frauds: 1. The Nigerian scam, also known as 419/ Advance fee fraud: Consumer receives letter, fax or email asking for help in transferring money overseas. Recipient offered slice for themselves for transferring money, usually 25-30%. In every variation, the scammer is promising obscenely large payments for small unskilled tasks. This scam, like most scams, is too good to be true. Yet people still fall for this money transfer con game. 2. Fake foreign lotteries: Letters, phone calls or emails tell of big win and ask recipients to send money to cover administration or taxes. 3. Work at home and business opportunity scams: Offers of quick way to make money without having qualifications or expertise. Money up front demanded as registration fee or to buy goods for selling. 4. Sweepstake scams and misleading prize draws Notification of a cash prize in return for up-front payments. 5. Psychic scams Letters sent by so-called psychics or clairvoyants offer prediction or threaten dangers if no payment received. 6. Pyramid schemes and chain letters If enough members join, pyramid will grow. But in order for every member to make money there has to be endless supply of newcomers. 7. Spoofing/Phishing fraud: Spoofing is a type of fraud in which a fraudster masquerades as another person by using another person’s identity to transact business and obtain vital information such as bank account numbers, credit card numbers and associated passwords. Phishing is a form of spoofing in which
  • 2. the web page of a particular entity can be duplicated and positioned with URL for the purpose of luring people to divulge vital financial information. 8. Rebate Phone Call: In this scam, consumers receive a phone call from someone identifying himself as an IRS employee. The caller tells the targeted victim that he is eligible for a sizable rebate for filing his taxes early. The caller then states that he needs the target’s bank account information for the direct deposit of the rebate. If the target refuses, he is told that he cannot receive the rebate. 9. Ponzi Fraud: This is a system of luring investors to invest in a scheme in which the investment firm promises abnormally high returns, meanwhile the early investors shall be paid with investment capital obtained from success investors. The payment chain would continue till the point of collapse. Technological advancement is the backbone of an economy. However every positive side has a dark side associated with it. It is important that when a common man uses internet to explore the world of information he also is aware about the probable frauds floating around. He must be educated about the pros and cons of using internet and awareness programs should be conducted against cyber crime. We shall discuss how to avoid becoming a victim of cyber fraud in our next blog. Avoid becoming a victim of cyber fraud: Do’s and don’ts
  • 3. Cyber Fraud also known as International Mass Marketing Fraud is a crime that uses distance and location as its primary means of success, making it more difficult for law enforcement to track and prosecute the perpetrators. In part, this is due to jurisdictional authority of law enforcement agencies throughout the world. What to look for : • Being asked for personal financial Information such as bank account information or credit card numbers via the telephone or by email. • Using high pressure sales tactics so as not to give you time to think about the information you are providing. • Being told you have won a foreign lottery or sweepstakes. • Being asked to help transfer funds out of a foreign country for a share of the money. • Being offered help in repairing credit scores for an advanced fee. • Receiving a counterfeit casher’s check or money order for more than the cost of the item you are selling. Do’s and don’ts: • Do not respond to unsolicited e-mail. • Research any offers received over the Internet or telephone. • Do not deposit any checks that are supposed winnings from a lottery or sweepstakes, especially if you didn’t enter one. • Keep in mind that online businesses, including banks and merchants, typically will not ask for personal information, such as usernames and passwords, via e-mail. When in doubt either call the company directly or open your computer’s Internet browser and type the known website’s address. Don’t use the telephone number contained in the e-mail, which is likely to be fraudulent as well. • Be wary of individuals representing themselves as foreign government officials. • Beware when asked to assist in placing large sums of money in overseas bank accounts. • Avoid filling out forms in email messages that ask for personal information. • Consult friends and family or a trusted advisor before making any major financial decision. • If you have been a victim of Internet crime, please file a complaint at http://www.IC3.gov/. Although the threat posed by cyber criminals is real, through the use of a few basic Internet security practices and an awareness of the more common cyber criminal schemes, individuals can reduce their risk of becoming a victim. Users should remain aware of the latest online fraud scam. However, if an individual believes he has already been the victim of a cyber crime, he should notify the appropriate law enforcement agency as soon as possible, and may file a complaint. Providing timely and thorough information detailing the particulars of the scheme and identifying characteristics of the criminals helps law enforcement develop an effective investigative strategy.