Fraudsters use various techniques to commit cybercrimes such as phishing scams, online sales platform frauds, downloading malicious apps, ATM skimming, SIM swapping, lottery scams, fake job offers, screen sharing apps, QR code scanning, and juice jacking. Customers should be cautious of unsolicited links and calls, only download apps from official sources, protect their login credentials and financial information, and be wary of any requests to send money or provide personal details to prevent falling victim to these online fraud schemes.
Presentation given at Pantego Christian Academy by the PCA Technology Department to middle and high school students during their enrichment series. Principles covered include: Digital Golden Rule, Digital Consciousness, and Personal Security in the Global Village
The metaverse is a concept of a persistent, online, 3D universe that combines multiple different virtual spaces. You can think of it as a future iteration of the internet. The metaverse will allow users to work, meet, game, and socialize together in these 3D spaces.
Presentation given at Pantego Christian Academy by the PCA Technology Department to middle and high school students during their enrichment series. Principles covered include: Digital Golden Rule, Digital Consciousness, and Personal Security in the Global Village
The metaverse is a concept of a persistent, online, 3D universe that combines multiple different virtual spaces. You can think of it as a future iteration of the internet. The metaverse will allow users to work, meet, game, and socialize together in these 3D spaces.
The Covid-19 pandemic necessitated the payments industry undergo a facelift, sparked by novel approaches from new-age players, fostered by industry consolidation, and customers’ demand for end-to-end experience. Crossing the threshold, the industry is entering a new era – Payments 4.X, where payments are embedded and invisible, and an enabling function to provide frictionless customer experience. As customers make a permanent shift to next-gen payment methods, Digital IDs are critical for a seamless payment experience. The B2B payments segment is witnessing rapid digitization. BigTechs, PayTechs, and industry newcomers are ready to jump in with newfangled solutions to help underserved small to medium-sized businesses (SMBs).
As incumbents struggle with profits, new-age firms are forging ahead to take the lead in the Payments 4.X era by riding the success of non-card products and services. The new era demands collaboration, platformification, and firms can unleash full market potential only by embracing API-based business models and open ecosystems. Data prowess and enhanced payment processing capabilities are inevitable to thrive ahead. The clock is ticking for banks and traditional payments firms because the competitive advantage is not guaranteed forever. As industry players seek economies of scale, consolidations loom, and non-banks explore new territories to threaten incumbents’ market share. While all these 2022 trends are at play, central bank digital currency (CBDC) is emerging globally and might open a new chapter in the current payments landscape.
The commercial banking industry faces daunting challenges. Operational costs continue to rise. Corporate clients seek convenience and personalized products and services. Cybersecurity is a major concern as more and more bank processes become digitalized. Compliance with wide-ranging open banking regulations is mandatory. The entry of BigTechs and other players is heating up competitive pressure. Therefore, it is essential for banks to transform and adapt to the changing business environment.
Read our Top Trends in Commercial Banking: 2020 report for analyses of the initiatives, new solutions, and trends expected to shape the commercial banking ecosystem in 2020 and beyond.
The basic fundamental of cybersecurity and how can it be used for unethical purposes.
For this type of presentations (customised), you can contact me here : rishav.sadhu11@gmail.com
Given above is a PowerPoint Presentation on Artificial Intelligence (AI). Ideal for activities, school projects, essays etc. Hope it is accommodating.
Thank you.
You can also find out my other presentations on Technology.
The links are given below-
https://www.slideshare.net/GursheenKaurChawla/all-about-the-internetpptx and https://www.slideshare.net/GursheenKaurChawla/impact-of-online-gamespptx
This Presentation will give you an overview about Artificial Intelligence : definition, advantages , disadvantages , benefits , applications .
We hope it to be useful .
I was invited in Web Tech Talk Event as a Speaker. The event was organized by Tech Speakers Bangladesh. On that event, I gave a speech on Deep and Dark Web. I made this slide for that speech.
What is Social Engineering? An illustrated presentation.Pratum
Social engineering relies profoundly on human interaction and often involves the misleading of employees into violating their organization’s security procedures. Humans are naturally helpful, but when it comes to protecting an organization’s security, being helpful to an outsider can do more harm than good.
These slides discuss social engineering, the most common attack methods, and the best means for defending against a social engineering attack.
For more helpful cyber security blog articles, visit www.integritysrc.com/blog.
Short Presentation On Cyber Crime And Security which includes Cyber crime introduction and types , Hacking and its types, different Threats , and in last Prevention for Hacks and Threats.
Building your own metaverse, prepare your own contract with solidity and perform your first transaction in Web 3.0
#metaverse #vr #ar #virtualreality #augmentedreality #solidity #blockchain #nft #web3.0 #3D #threejs
Augmented Reality - General conclusions and recommendationsbanholzer76
Augmented realities as an emerging technology offer new opportunities due to several
shifting external conditions or changing forms of social interaction. In order to investigate
possible impacts, trends and relationships the employed method is based on an
environmental scanning and on several semi-structured interviews, conducted with several
technology experts, researchers and futurologists. The process aims to obtain valuable
information on competitors, markets, customers and suppliers as well as on macroeconomic
factors, such as social, economic, technological and political factors.
The main research findings afforded that AR can be seen as a new communication medium
or tool in an early stage level due to several major technical and social challenges and that it
goes along with the evolving information technology. These days one of the most promising
devices for AR applications is the mobile phone, which could open the floodgates for the
mass implementation of AR. With regard to the evolving ubiquity of information and
interactivity through smart things and sensors, AR will provide customized-, perceptional-,
and location-based information. Life and task enhancing services and applications are
assigned big potential in future solutions, which could occur in many areas and industries.
Due to an economical shift towards free business models, often financed by the
advertisement industry, the future development of AR will certainly be affected.
The Covid-19 pandemic necessitated the payments industry undergo a facelift, sparked by novel approaches from new-age players, fostered by industry consolidation, and customers’ demand for end-to-end experience. Crossing the threshold, the industry is entering a new era – Payments 4.X, where payments are embedded and invisible, and an enabling function to provide frictionless customer experience. As customers make a permanent shift to next-gen payment methods, Digital IDs are critical for a seamless payment experience. The B2B payments segment is witnessing rapid digitization. BigTechs, PayTechs, and industry newcomers are ready to jump in with newfangled solutions to help underserved small to medium-sized businesses (SMBs).
As incumbents struggle with profits, new-age firms are forging ahead to take the lead in the Payments 4.X era by riding the success of non-card products and services. The new era demands collaboration, platformification, and firms can unleash full market potential only by embracing API-based business models and open ecosystems. Data prowess and enhanced payment processing capabilities are inevitable to thrive ahead. The clock is ticking for banks and traditional payments firms because the competitive advantage is not guaranteed forever. As industry players seek economies of scale, consolidations loom, and non-banks explore new territories to threaten incumbents’ market share. While all these 2022 trends are at play, central bank digital currency (CBDC) is emerging globally and might open a new chapter in the current payments landscape.
The commercial banking industry faces daunting challenges. Operational costs continue to rise. Corporate clients seek convenience and personalized products and services. Cybersecurity is a major concern as more and more bank processes become digitalized. Compliance with wide-ranging open banking regulations is mandatory. The entry of BigTechs and other players is heating up competitive pressure. Therefore, it is essential for banks to transform and adapt to the changing business environment.
Read our Top Trends in Commercial Banking: 2020 report for analyses of the initiatives, new solutions, and trends expected to shape the commercial banking ecosystem in 2020 and beyond.
The basic fundamental of cybersecurity and how can it be used for unethical purposes.
For this type of presentations (customised), you can contact me here : rishav.sadhu11@gmail.com
Given above is a PowerPoint Presentation on Artificial Intelligence (AI). Ideal for activities, school projects, essays etc. Hope it is accommodating.
Thank you.
You can also find out my other presentations on Technology.
The links are given below-
https://www.slideshare.net/GursheenKaurChawla/all-about-the-internetpptx and https://www.slideshare.net/GursheenKaurChawla/impact-of-online-gamespptx
This Presentation will give you an overview about Artificial Intelligence : definition, advantages , disadvantages , benefits , applications .
We hope it to be useful .
I was invited in Web Tech Talk Event as a Speaker. The event was organized by Tech Speakers Bangladesh. On that event, I gave a speech on Deep and Dark Web. I made this slide for that speech.
What is Social Engineering? An illustrated presentation.Pratum
Social engineering relies profoundly on human interaction and often involves the misleading of employees into violating their organization’s security procedures. Humans are naturally helpful, but when it comes to protecting an organization’s security, being helpful to an outsider can do more harm than good.
These slides discuss social engineering, the most common attack methods, and the best means for defending against a social engineering attack.
For more helpful cyber security blog articles, visit www.integritysrc.com/blog.
Short Presentation On Cyber Crime And Security which includes Cyber crime introduction and types , Hacking and its types, different Threats , and in last Prevention for Hacks and Threats.
Building your own metaverse, prepare your own contract with solidity and perform your first transaction in Web 3.0
#metaverse #vr #ar #virtualreality #augmentedreality #solidity #blockchain #nft #web3.0 #3D #threejs
Augmented Reality - General conclusions and recommendationsbanholzer76
Augmented realities as an emerging technology offer new opportunities due to several
shifting external conditions or changing forms of social interaction. In order to investigate
possible impacts, trends and relationships the employed method is based on an
environmental scanning and on several semi-structured interviews, conducted with several
technology experts, researchers and futurologists. The process aims to obtain valuable
information on competitors, markets, customers and suppliers as well as on macroeconomic
factors, such as social, economic, technological and political factors.
The main research findings afforded that AR can be seen as a new communication medium
or tool in an early stage level due to several major technical and social challenges and that it
goes along with the evolving information technology. These days one of the most promising
devices for AR applications is the mobile phone, which could open the floodgates for the
mass implementation of AR. With regard to the evolving ubiquity of information and
interactivity through smart things and sensors, AR will provide customized-, perceptional-,
and location-based information. Life and task enhancing services and applications are
assigned big potential in future solutions, which could occur in many areas and industries.
Due to an economical shift towards free business models, often financed by the
advertisement industry, the future development of AR will certainly be affected.
SIM swapping occurs when a fraudster, using social engineering techniques, takes control over your mobile phone SIM card using your stolen personal data.
As India braces for a future of digital payments, how secure is your account from payment frauds? Here is a list of such frauds that you must watch out for!
How to Stay Safe While Using Digital Payment AppsSafeDeposit
For maximum safety, make sure your digital payment app is always up-to-date. To patch security holes and add new protections, developers frequently release updates. Ensure you always have the most recent security fixes by enabling automatic updates or often checking for new program versions.
This paper presents the awareness of Sim Swap attack among people and prevention of this attack, where the fraud person will Gain the personal information of person from different ways like fake call , sms ,Email, link, social media etc. mobile number is linked with bank and adhaar card the fraud person will gain the access of Bank account, credit card number and other personal information easily by trying various methods like MNC, Phone call, Hacking .It is difficult to undo the damage occurs. Snehal Manohar Awale | Dr. Praveen Gupta ""Awareness of Sim Swap Attack"" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-4 , June 2019, URL: https://www.ijtsrd.com/papers/ijtsrd23982.pdf
Paper URL: https://www.ijtsrd.com/management/other/23982/awareness-of-sim-swap-attack/snehal-manohar-awale
A Real Person will travel, on your behalf, to validate an item, property or person's existence by completing a personalized report including current photos, videos and more. Includes preventative measures that will assist you in being informed prior to entering into transactions over
the Internet.
I had amde this ppt for my college presentation. It doesnt cover the various faruds in minute detail but this presentation is a very good overview! Enjoy!
Small Businesses: Tips to Avoiding Fraudulent Chargebacks- Mark - Fullbright
Compiled and designed by Mark Fullbright , Certified Identity Theft Risk Management Specialist™ (CITRMS) as a free guide for merchants to protect themselves online & POS and to reduce their exposure to chargebacks and losses due to fraud.
• Company names mentioned herein are the property of, and may be trademarks of, their respective owners and are for educational purposes only.
EASY TUTORIAL OF HOW TO USE G-TEAMS BY: FEBLESS HERNANEFebless Hernane
Using Google Teams (G-Teams) is simple. Start by opening the Google Teams app on your phone or visiting the G-Teams website on your computer. Sign in with your Google account. To join a meeting, click on the link shared by the organizer or enter the meeting code in the "Join a Meeting" section. To start a meeting, click on "New Meeting" and share the link with others. You can use the chat feature to send messages and the video button to turn your camera on or off. G-Teams makes it easy to connect and collaborate with others!
Multilingual SEO Services | Multilingual Keyword Research | Filosemadisonsmith478075
Multilingual SEO services are essential for businesses aiming to expand their global presence. They involve optimizing a website for search engines in multiple languages, enhancing visibility, and reaching diverse audiences. Filose offers comprehensive multilingual SEO services designed to help businesses optimize their websites for search engines in various languages, enhancing their global reach and market presence. These services ensure that your content is not only translated but also culturally and contextually adapted to resonate with local audiences.
Visit us at -https://www.filose.com/
Your LinkedIn Success Starts Here.......SocioCosmos
In order to make a lasting impression on your sector, SocioCosmos provides customized solutions to improve your LinkedIn profile.
https://www.sociocosmos.com/product-category/linkedin/
Project Serenity is an innovative initiative aimed at transforming urban environments into sustainable, self-sufficient communities. By integrating green architecture, renewable energy, smart technology, sustainable transportation, and urban farming, Project Serenity seeks to minimize the ecological footprint of cities while enhancing residents' quality of life. Key components include energy-efficient buildings, IoT-enabled resource management, electric and autonomous transportation options, green spaces, and robust waste management systems. Emphasizing community engagement and social equity, Project Serenity aspires to serve as a global model for creating eco-friendly, livable urban spaces that harmonize modern conveniences with environmental stewardship.
Grow Your Reddit Community Fast.........SocioCosmos
Sociocosmos helps you gain Reddit followers quickly and easily. Build your community and expand your influence.
https://www.sociocosmos.com/product-category/reddit/
Your Path to YouTube Stardom Starts HereSocioCosmos
Skyrocket your YouTube presence with Sociocosmos' proven methods. Gain real engagement and build a loyal audience. Join us now.
https://www.sociocosmos.com/product-category/youtube/
Exploring The Dimensions and Dynamics of Felt Obligation: A Bibliometric Anal...AJHSSR Journal
ABSTARCT: This study presents, to our knowledge, the first bibliometric analysis focusing on the concept of
"felt obligation," examining 120 articles published between 1986 and 2024. The aim of the study is to deepen our
understanding of the existing knowledge in the field of "felt obligation" and to provide guidance for further
research. The analysis is centered around the authors, countries, institutions, and keywords of the articles. The
findings highlight prominent researchers in this field, leading universities, and influential journals. Particularly,
it is identified that China plays a leading role in "felt obligation" research. The analysis of keywords emphasizes
the thematic focuses of these studies and provides a roadmap for future research. Finally, various
recommendations are presented to deepen the knowledge in this area and promote applied research. This study
serves as a foundation to expand and advance the understanding of "felt obligation" in the field.
KEYWORDS: Felt Obligation, Bibliometric Analysis, Research Trends
Enhance your social media strategy with the best digital marketing agency in Kolkata. This PPT covers 7 essential tips for effective social media marketing, offering practical advice and actionable insights to help you boost engagement, reach your target audience, and grow your online presence.
Telegram is a messaging platform that ushers in a new era of communication. Available for Android, Windows, Mac, and Linux, Telegram offers simplicity, privacy, synchronization across devices, speed, and powerful features. It allows users to create their own stickers with a user-friendly editor. With robust encryption, Telegram ensures message security and even offers self-destructing messages. The platform is open, with an API and source code accessible to everyone, making it a secure and social environment where groups can accommodate up to 200,000 members. Customize your messenger experience with Telegram's expressive features.
Surat Digital Marketing School is created to offer a complete course that is specifically designed as per the current industry trends. Years of experience has helped us identify and understand the graduate-employee skills gap in the industry. At our school, we keep up with the pace of the industry and impart a holistic education that encompasses all the latest concepts of the Digital world so that our graduates can effortlessly integrate into the assigned roles.
This is the place where you become a Digital Marketing Expert.
The Evolution of SEO: Insights from a Leading Digital Marketing AgencyDigital Marketing Lab
Explore the latest trends in Search Engine Optimization (SEO) and discover how modern practices are transforming business visibility. This document delves into the shift from keyword optimization to user intent, highlighting key trends such as voice search optimization, artificial intelligence, mobile-first indexing, and the importance of E-A-T principles. Enhance your online presence with expert insights from Digital Marketing Lab, your partner in maximizing SEO performance.
This tutorial presentation provides a step-by-step guide on how to use Facebook, the popular social media platform. In simple and easy-to-understand language, this presentation explains how to create a Facebook account, connect with friends and family, post updates, share photos and videos, join groups, and manage privacy settings. Whether you're new to Facebook or just need a refresher, this presentation will help you navigate the features and make the most of your Facebook experience.
Buy Pinterest Followers, Reactions & Repins Go Viral on Pinterest with Socio...SocioCosmos
Get more Pinterest followers, reactions, and repins with Sociocosmos, the leading platform to buy all kinds of Pinterest presence. Boost your profile and reach a wider audience.
https://www.sociocosmos.com/product-category/pinterest/
Improving Workplace Safety Performance in Malaysian SMEs: The Role of Safety ...AJHSSR Journal
ABSTRACT: In the Malaysian context, small and medium enterprises (SMEs) experience a significant
burden of workplace accidents. A consensus among scholars attributes a substantial portion of these incidents to
human factors, particularly unsafe behaviors. This study, conducted in Malaysia's northern region, specifically
targeted Safety and Health/Human Resource professionals within the manufacturing sector of SMEs. We
gathered a robust dataset comprising 107 responses through a meticulously designed self-administered
questionnaire. Employing advanced partial least squares-structural equation modeling (PLS-SEM) techniques
with SmartPLS 3.2.9, we rigorously analyzed the data to scrutinize the intricate relationship between safety
behavior and safety performance. The research findings unequivocally underscore the palpable and
consequential impact of safety behavior variables, namely safety compliance and safety participation, on
improving safety performance indicators such as accidents, injuries, and property damages. These results
strongly validate research hypotheses. Consequently, this study highlights the pivotal significance of cultivating
safety behavior among employees, particularly in resource-constrained SME settings, as an essential step toward
enhancing workplace safety performance.
KEYWORDS :Safety compliance, safety participation, safety performance, SME
Unlock TikTok Success with Sociocosmos..SocioCosmos
Discover how Sociocosmos can boost your TikTok presence with real followers and engagement. Achieve your social media goals today!
https://www.sociocosmos.com/product-category/tiktok/
4. A cybercrime is a crime that involves a computer or a computer network.
The computer may have been used in committing the crime, or it may be the
target. Cybercrime may harm someone's security or finances.
5. TYPES OF ONLINE FRAUD
SL NO. SUBJECT
1 Phishing links
2 Frauds using online sales platforms
3 Unverified mobile apps
4 ATM card skimming
5 SIM swap
6 Lottery frauds
7 Online job frauds
8 Frauds using screen sharing app
9 Scam through QR code scan
10 Juice jacking
6. Fraudsters create a third-party phishing website which looks like an existing genuine website,
such as - a bank’s website or an e-commerce website or a search engine, ETC.
Links to these websites are circulated by fraudsters through Short Message Service (SMS) / social
media / email / Instant Messenger, etc.
Many customers click on the link without checking the detailed Uniform Resource Locator (URL)
and enter secure credentials such as Personal Identification Number (PIN), One Time Password
(OTP), Password, etc., which are captured and used by the fraudsters.
Do not click on unknown / unverified links and immediately delete such SMS / email sent by
unknown sender to avoid accessing them by mistake in future
Unsubscribe the mails providing links to a bank / e-commerce / search engine website and block
the sender’s e-mail ID, before deleting such emails.
Always go to the official website of your bank / service provider. Carefully verify the website
details especially where it requires entering financial credentials. Check for the secure sign
(https with a padlock symbol) on the website before entering secure credentials.
7. Fraudsters pretend to be buyers on online sales platforms and show an interest in seller’s product/s.
Many fraudsters pretend to be defence personnel posted in remote locations to gain confidence.
Instead of paying money to the seller, they use the “request money” option through the Unified
Payments Interface (UPI) app and insist that the seller approve the request by entering UPI PIN. Once
the seller enters the PIN, money is transferred to the fraudster’s account.
Always be careful when you are buying or selling products using online sales platforms.
Always remember that there is no need to enter PIN / password anywhere to receive money.
If UPI or any other app requires you to enter PIN to complete a transaction, it means you will be
sending money instead of receiving it.
8. Fraudsters circulate through SMS / email / social media / Instant Messenger, etc., certain app
links, masked to appear similar to the existing apps of authorised entities.
Fraudsters trick the customer to click on such links which results in downloading of unknown /
unverified apps on the customer’s mobile / laptop / desktop, etc.,
Once the malicious application is downloaded, the fraudster gains complete access to the
customer’s device. These include confidential details stored on the device and messages / OTPs
received before / after installation of such apps.
Never download an application from any unverified / unknown sources or on being asked/
guided by an unknown person.
As a prudent practice before downloading, check on the publishers / owners of the app being
downloaded as well as its user ratings etc.
While downloading an application, check the permission/s and the access to your data it seeks,
such as contacts, photographs, etc. Only give those permissions which are absolutely required to
use the desired application.
9. Fraudsters install skimming devices in ATM machines and steal data from the customer’s card.
Fraudsters may also install a dummy keypad or a small / pinhole camera, well-hidden from plain sight
to capture ATM PIN.
Sometimes, fraudsters pretending to be other customer standing near-by gain access to the PIN when
the customer enters it in an ATM machine.
This data is then used to create a duplicate card and withdraw money from the customer’s account.
Always check that there is no extra device attached, near the card insertion slot or keypad of the ATM
machine, before making a transaction.
Cover the keypad with your other hand while entering the PIN.
NEVER write the PIN on your ATM card.
Do NOT enter the PIN in the presence of any other / unknown person standing close to you.
Do NOT give your ATM card to anyone for withdrawal of cash.
10. Fraudsters gain access to the customer’s Subscriber Identity Module (SIM) card or may obtain a
duplicate SIM card (including electronic-SIM) for the registered mobile number connected to the
customer’s bank account.
Fraudsters use the OTP received on such duplicate SIM to carry out unauthorised transactions.
Fraudsters generally collect the personal / identity details from the customer by posing as a
telephone / mobile network staff and request the customer details in the name of offers such as
- to provide free upgrade of SIM card from 3G to 4G or to provide additional benefits on the SIM
card.
Never share identity credentials pertaining to your SIM card.
Be watchful regarding mobile network access in your phone. If there is no mobile network in
your phone for a considerable amount of time in a regular environment, immediately contact
the mobile operator to ensure that no duplicate SIM is being / has been issued for your mobile
number.
11. Fraudsters send emails or make phone calls that a customer has won a huge lottery. However, in order
to receive the money, the fraudsters ask the customers to confirm their identity by entering their
bank account / credit card details on a website from which data is captured by the fraudsters.
Fraudsters also ask the customers to pay taxes/ forex charges / upfront or pay the shipping charges,
processing / handling fee, etc., to receive the lottery / product.
Fraudsters in some cases, may also pose as a representative of RBI or a foreign bank / company /
international financial institution and ask the customer to transfer a relatively small amount in order
to receive a larger amount in foreign currency from that institution.
Beware of such unbelievable lottery or offers - nobody gives free money, especially such huge amounts
of money.
Do not make payments or share secure credentials in response to any lottery calls / emails.
RBI never opens accounts of members of public or takes deposits from them. Such messages are
fraudulent.
RBI never asks for personal / bank details of members of public. Beware of fake RBI logos and
messages
12. Fraudsters create fake job search websites and when the job seekers share secure credentials of
their bank account / credit card / debit card on these websites during registration, their
accounts are compromised.
Fraudsters also pose as officials of reputed company(s) and offer employment after conducting
fake interviews. The job seeker is then induced to transfer funds for registration, mandatory
training program, laptop, etc.
For any job offer, including from overseas entities, first confirm the identity and contact details
of the employing company / its representative.
Always remember that a genuine company offering a job will never ask for money for offering
the job.
Do not make payments on unknown job search websites.
13. Fraudsters trick the customer to download a screen sharing app.
Using such app, the fraudsters can watch / control the customer’s mobile / laptop and gain
access to the financial credentials of the customer.
Fraudsters use this information to carry out unauthorised transfer of funds or make payments
using the customer’s Internet banking / payment apps.
If your device faces any technical glitch and you need to download any screen sharing app,
deactivate / log out of all payment related apps from your device.
Download such apps only when you are advised through the official Toll-free number of the
company as appearing in its official website. Do not download such apps in case an executive of
the company contacts you through his / her personal contact number.
As soon as the work is completed, ensure that the screen sharing app is removed from your
device.
14. Fraudsters often contact customers under various pretexts and trick them into scanning Quick
Response (QR) codes using the apps on the customers’ phone.
By scanning such QR codes, customers may unknowingly authorise the fraudsters to withdraw
money from their account.
Be cautious while scanning QR code/s using any payment app. QR codes have account details
embedded in them to transfer money to a particular account.
Never scan any QR code to receive money. Transactions involving receipt of money do not
require scanning barcodes / QR codes or entering mobile banking PIN (m-PIN), passwords, etc.
15. The charging port of a mobile, can also be used to transfer files / data.
Fraudsters use public charging ports to transfer malware to customer phones
connected there and take control / access / steal data sensitive data such as
emails, SMS, saved passwords, etc. from the customers’ mobile phones (Juice
Jacking).
Avoid using public / unknown charging ports / cables.
16. 14% 19%
28% 25%
38% 28%
25% 27%
48% 54% 46% 48%
0%
20%
40%
60%
80%
100%
120%
2018 2019 2020 2021
AXIS
TITLE
AXIS TITLE
Series 1 Series 2 Series 3