Fraudsters use various techniques to commit cybercrimes such as phishing scams, online sales platform frauds, downloading malicious apps, ATM skimming, SIM swapping, lottery scams, fake job offers, screen sharing apps, QR code scanning, and juice jacking. Customers should be cautious of unsolicited links and calls, only use verified apps, check for skimming devices on ATMs, avoid sharing personal details, ignore lottery offers that ask for money, verify job offers are legitimate, get tech support through official numbers only, do not scan unknown QR codes, and avoid public charging ports.
SIM swapping occurs when a fraudster, using social engineering techniques, takes control over your mobile phone SIM card using your stolen personal data.
As India braces for a future of digital payments, how secure is your account from payment frauds? Here is a list of such frauds that you must watch out for!
How to Stay Safe While Using Digital Payment AppsSafeDeposit
For maximum safety, make sure your digital payment app is always up-to-date. To patch security holes and add new protections, developers frequently release updates. Ensure you always have the most recent security fixes by enabling automatic updates or often checking for new program versions.
SIM swapping occurs when a fraudster, using social engineering techniques, takes control over your mobile phone SIM card using your stolen personal data.
As India braces for a future of digital payments, how secure is your account from payment frauds? Here is a list of such frauds that you must watch out for!
How to Stay Safe While Using Digital Payment AppsSafeDeposit
For maximum safety, make sure your digital payment app is always up-to-date. To patch security holes and add new protections, developers frequently release updates. Ensure you always have the most recent security fixes by enabling automatic updates or often checking for new program versions.
This paper presents the awareness of Sim Swap attack among people and prevention of this attack, where the fraud person will Gain the personal information of person from different ways like fake call , sms ,Email, link, social media etc. mobile number is linked with bank and adhaar card the fraud person will gain the access of Bank account, credit card number and other personal information easily by trying various methods like MNC, Phone call, Hacking .It is difficult to undo the damage occurs. Snehal Manohar Awale | Dr. Praveen Gupta ""Awareness of Sim Swap Attack"" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-4 , June 2019, URL: https://www.ijtsrd.com/papers/ijtsrd23982.pdf
Paper URL: https://www.ijtsrd.com/management/other/23982/awareness-of-sim-swap-attack/snehal-manohar-awale
A Real Person will travel, on your behalf, to validate an item, property or person's existence by completing a personalized report including current photos, videos and more. Includes preventative measures that will assist you in being informed prior to entering into transactions over
the Internet.
I had amde this ppt for my college presentation. It doesnt cover the various faruds in minute detail but this presentation is a very good overview! Enjoy!
Small Businesses: Tips to Avoiding Fraudulent Chargebacks- Mark - Fullbright
Compiled and designed by Mark Fullbright , Certified Identity Theft Risk Management Specialist™ (CITRMS) as a free guide for merchants to protect themselves online & POS and to reduce their exposure to chargebacks and losses due to fraud.
• Company names mentioned herein are the property of, and may be trademarks of, their respective owners and are for educational purposes only.
Credit card fraud is an escalating issue in the digital age. Criminals employ diverse tactics,
such as phishing and data breaches, to access sensitive information, leading to unauthorized
purchases and identity theft. Both individuals and businesses suffer financial losses and
reputation damage.
Be alert for two recent scams revolving around the payment of utility bills. This alert from David Lerner Associates has the details of what to watch for.
This paper presents the awareness of Sim Swap attack among people and prevention of this attack, where the fraud person will Gain the personal information of person from different ways like fake call , sms ,Email, link, social media etc. mobile number is linked with bank and adhaar card the fraud person will gain the access of Bank account, credit card number and other personal information easily by trying various methods like MNC, Phone call, Hacking .It is difficult to undo the damage occurs. Snehal Manohar Awale | Dr. Praveen Gupta ""Awareness of Sim Swap Attack"" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-4 , June 2019, URL: https://www.ijtsrd.com/papers/ijtsrd23982.pdf
Paper URL: https://www.ijtsrd.com/management/other/23982/awareness-of-sim-swap-attack/snehal-manohar-awale
A Real Person will travel, on your behalf, to validate an item, property or person's existence by completing a personalized report including current photos, videos and more. Includes preventative measures that will assist you in being informed prior to entering into transactions over
the Internet.
I had amde this ppt for my college presentation. It doesnt cover the various faruds in minute detail but this presentation is a very good overview! Enjoy!
Small Businesses: Tips to Avoiding Fraudulent Chargebacks- Mark - Fullbright
Compiled and designed by Mark Fullbright , Certified Identity Theft Risk Management Specialist™ (CITRMS) as a free guide for merchants to protect themselves online & POS and to reduce their exposure to chargebacks and losses due to fraud.
• Company names mentioned herein are the property of, and may be trademarks of, their respective owners and are for educational purposes only.
Credit card fraud is an escalating issue in the digital age. Criminals employ diverse tactics,
such as phishing and data breaches, to access sensitive information, leading to unauthorized
purchases and identity theft. Both individuals and businesses suffer financial losses and
reputation damage.
Be alert for two recent scams revolving around the payment of utility bills. This alert from David Lerner Associates has the details of what to watch for.
A Strategic Approach: GenAI in EducationPeter Windle
Artificial Intelligence (AI) technologies such as Generative AI, Image Generators and Large Language Models have had a dramatic impact on teaching, learning and assessment over the past 18 months. The most immediate threat AI posed was to Academic Integrity with Higher Education Institutes (HEIs) focusing their efforts on combating the use of GenAI in assessment. Guidelines were developed for staff and students, policies put in place too. Innovative educators have forged paths in the use of Generative AI for teaching, learning and assessments leading to pockets of transformation springing up across HEIs, often with little or no top-down guidance, support or direction.
This Gasta posits a strategic approach to integrating AI into HEIs to prepare staff, students and the curriculum for an evolving world and workplace. We will highlight the advantages of working with these technologies beyond the realm of teaching, learning and assessment by considering prompt engineering skills, industry impact, curriculum changes, and the need for staff upskilling. In contrast, not engaging strategically with Generative AI poses risks, including falling behind peers, missed opportunities and failing to ensure our graduates remain employable. The rapid evolution of AI technologies necessitates a proactive and strategic approach if we are to remain relevant.
Biological screening of herbal drugs: Introduction and Need for
Phyto-Pharmacological Screening, New Strategies for evaluating
Natural Products, In vitro evaluation techniques for Antioxidants, Antimicrobial and Anticancer drugs. In vivo evaluation techniques
for Anti-inflammatory, Antiulcer, Anticancer, Wound healing, Antidiabetic, Hepatoprotective, Cardio protective, Diuretics and
Antifertility, Toxicity studies as per OECD guidelines
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...Levi Shapiro
Letter from the Congress of the United States regarding Anti-Semitism sent June 3rd to MIT President Sally Kornbluth, MIT Corp Chair, Mark Gorenberg
Dear Dr. Kornbluth and Mr. Gorenberg,
The US House of Representatives is deeply concerned by ongoing and pervasive acts of antisemitic
harassment and intimidation at the Massachusetts Institute of Technology (MIT). Failing to act decisively to ensure a safe learning environment for all students would be a grave dereliction of your responsibilities as President of MIT and Chair of the MIT Corporation.
This Congress will not stand idly by and allow an environment hostile to Jewish students to persist. The House believes that your institution is in violation of Title VI of the Civil Rights Act, and the inability or
unwillingness to rectify this violation through action requires accountability.
Postsecondary education is a unique opportunity for students to learn and have their ideas and beliefs challenged. However, universities receiving hundreds of millions of federal funds annually have denied
students that opportunity and have been hijacked to become venues for the promotion of terrorism, antisemitic harassment and intimidation, unlawful encampments, and in some cases, assaults and riots.
The House of Representatives will not countenance the use of federal funds to indoctrinate students into hateful, antisemitic, anti-American supporters of terrorism. Investigations into campus antisemitism by the Committee on Education and the Workforce and the Committee on Ways and Means have been expanded into a Congress-wide probe across all relevant jurisdictions to address this national crisis. The undersigned Committees will conduct oversight into the use of federal funds at MIT and its learning environment under authorities granted to each Committee.
• The Committee on Education and the Workforce has been investigating your institution since December 7, 2023. The Committee has broad jurisdiction over postsecondary education, including its compliance with Title VI of the Civil Rights Act, campus safety concerns over disruptions to the learning environment, and the awarding of federal student aid under the Higher Education Act.
• The Committee on Oversight and Accountability is investigating the sources of funding and other support flowing to groups espousing pro-Hamas propaganda and engaged in antisemitic harassment and intimidation of students. The Committee on Oversight and Accountability is the principal oversight committee of the US House of Representatives and has broad authority to investigate “any matter” at “any time” under House Rule X.
• The Committee on Ways and Means has been investigating several universities since November 15, 2023, when the Committee held a hearing entitled From Ivory Towers to Dark Corners: Investigating the Nexus Between Antisemitism, Tax-Exempt Universities, and Terror Financing. The Committee followed the hearing with letters to those institutions on January 10, 202
Operation “Blue Star” is the only event in the history of Independent India where the state went into war with its own people. Even after about 40 years it is not clear if it was culmination of states anger over people of the region, a political game of power or start of dictatorial chapter in the democratic setup.
The people of Punjab felt alienated from main stream due to denial of their just demands during a long democratic struggle since independence. As it happen all over the word, it led to militant struggle with great loss of lives of military, police and civilian personnel. Killing of Indira Gandhi and massacre of innocent Sikhs in Delhi and other India cities was also associated with this movement.
2024.06.01 Introducing a competency framework for languag learning materials ...Sandy Millin
http://sandymillin.wordpress.com/iateflwebinar2024
Published classroom materials form the basis of syllabuses, drive teacher professional development, and have a potentially huge influence on learners, teachers and education systems. All teachers also create their own materials, whether a few sentences on a blackboard, a highly-structured fully-realised online course, or anything in between. Despite this, the knowledge and skills needed to create effective language learning materials are rarely part of teacher training, and are mostly learnt by trial and error.
Knowledge and skills frameworks, generally called competency frameworks, for ELT teachers, trainers and managers have existed for a few years now. However, until I created one for my MA dissertation, there wasn’t one drawing together what we need to know and do to be able to effectively produce language learning materials.
This webinar will introduce you to my framework, highlighting the key competencies I identified from my research. It will also show how anybody involved in language teaching (any language, not just English!), teacher training, managing schools or developing language learning materials can benefit from using the framework.
Unit 8 - Information and Communication Technology (Paper I).pdfThiyagu K
This slides describes the basic concepts of ICT, basics of Email, Emerging Technology and Digital Initiatives in Education. This presentations aligns with the UGC Paper I syllabus.
4. A cybercrime is a crime that involves a computer or a computer network.
The computer may have been used in committing the crime, or it may be the
target. Cybercrime may harm someone's security or finances.
5. TYPES OF ONLINE FRAUD
SL NO. SUBJECT
1 Phishing links
2 Frauds using online sales platforms
3 Unverified mobile apps
4 ATM card skimming
5 SIM swap
6 Lottery frauds
7 Online job frauds
8 Frauds using screen sharing app
9 Scam through QR code scan
10 Juice jacking
6. Fraudsters create a third-party phishing website which looks like an existing genuine website,
such as - a bank’s website or an e-commerce website or a search engine, ETC.
Links to these websites are circulated by fraudsters through Short Message Service (SMS) / social
media / email / Instant Messenger, etc.
Many customers click on the link without checking the detailed Uniform Resource Locator (URL)
and enter secure credentials such as Personal Identification Number (PIN), One Time Password
(OTP), Password, etc., which are captured and used by the fraudsters.
Do not click on unknown / unverified links and immediately delete such SMS / email sent by
unknown sender to avoid accessing them by mistake in future
Unsubscribe the mails providing links to a bank / e-commerce / search engine website and block
the sender’s e-mail ID, before deleting such emails.
Always go to the official website of your bank / service provider. Carefully verify the website
details especially where it requires entering financial credentials. Check for the secure sign
(https with a padlock symbol) on the website before entering secure credentials.
7. Fraudsters pretend to be buyers on online sales platforms and show an interest in seller’s product/s.
Many fraudsters pretend to be defence personnel posted in remote locations to gain confidence.
Instead of paying money to the seller, they use the “request money” option through the Unified
Payments Interface (UPI) app and insist that the seller approve the request by entering UPI PIN. Once
the seller enters the PIN, money is transferred to the fraudster’s account.
Always be careful when you are buying or selling products using online sales platforms.
Always remember that there is no need to enter PIN / password anywhere to receive money.
If UPI or any other app requires you to enter PIN to complete a transaction, it means you will be
sending money instead of receiving it.
8. Fraudsters circulate through SMS / email / social media / Instant Messenger, etc., certain app
links, masked to appear similar to the existing apps of authorised entities.
Fraudsters trick the customer to click on such links which results in downloading of unknown /
unverified apps on the customer’s mobile / laptop / desktop, etc.,
Once the malicious application is downloaded, the fraudster gains complete access to the
customer’s device. These include confidential details stored on the device and messages / OTPs
received before / after installation of such apps.
Never download an application from any unverified / unknown sources or on being asked/
guided by an unknown person.
As a prudent practice before downloading, check on the publishers / owners of the app being
downloaded as well as its user ratings etc.
While downloading an application, check the permission/s and the access to your data it seeks,
such as contacts, photographs, etc. Only give those permissions which are absolutely required to
use the desired application.
9. Fraudsters install skimming devices in ATM machines and steal data from the customer’s card.
Fraudsters may also install a dummy keypad or a small / pinhole camera, well-hidden from plain sight
to capture ATM PIN.
Sometimes, fraudsters pretending to be other customer standing near-by gain access to the PIN when
the customer enters it in an ATM machine.
This data is then used to create a duplicate card and withdraw money from the customer’s account.
Always check that there is no extra device attached, near the card insertion slot or keypad of the ATM
machine, before making a transaction.
Cover the keypad with your other hand while entering the PIN.
NEVER write the PIN on your ATM card.
Do NOT enter the PIN in the presence of any other / unknown person standing close to you.
Do NOT give your ATM card to anyone for withdrawal of cash.
10. Fraudsters gain access to the customer’s Subscriber Identity Module (SIM) card or may obtain a
duplicate SIM card (including electronic-SIM) for the registered mobile number connected to the
customer’s bank account.
Fraudsters use the OTP received on such duplicate SIM to carry out unauthorised transactions.
Fraudsters generally collect the personal / identity details from the customer by posing as a
telephone / mobile network staff and request the customer details in the name of offers such as
- to provide free upgrade of SIM card from 3G to 4G or to provide additional benefits on the SIM
card.
Never share identity credentials pertaining to your SIM card.
Be watchful regarding mobile network access in your phone. If there is no mobile network in
your phone for a considerable amount of time in a regular environment, immediately contact
the mobile operator to ensure that no duplicate SIM is being / has been issued for your mobile
number.
11. Fraudsters send emails or make phone calls that a customer has won a huge lottery. However, in order
to receive the money, the fraudsters ask the customers to confirm their identity by entering their
bank account / credit card details on a website from which data is captured by the fraudsters.
Fraudsters also ask the customers to pay taxes/ forex charges / upfront or pay the shipping charges,
processing / handling fee, etc., to receive the lottery / product.
Fraudsters in some cases, may also pose as a representative of RBI or a foreign bank / company /
international financial institution and ask the customer to transfer a relatively small amount in order
to receive a larger amount in foreign currency from that institution.
Beware of such unbelievable lottery or offers - nobody gives free money, especially such huge amounts
of money.
Do not make payments or share secure credentials in response to any lottery calls / emails.
RBI never opens accounts of members of public or takes deposits from them. Such messages are
fraudulent.
RBI never asks for personal / bank details of members of public. Beware of fake RBI logos and
messages
12. Fraudsters create fake job search websites and when the job seekers share secure credentials of
their bank account / credit card / debit card on these websites during registration, their
accounts are compromised.
Fraudsters also pose as officials of reputed company(s) and offer employment after conducting
fake interviews. The job seeker is then induced to transfer funds for registration, mandatory
training program, laptop, etc.
For any job offer, including from overseas entities, first confirm the identity and contact details
of the employing company / its representative.
Always remember that a genuine company offering a job will never ask for money for offering
the job.
Do not make payments on unknown job search websites.
13. Fraudsters trick the customer to download a screen sharing app.
Using such app, the fraudsters can watch / control the customer’s mobile / laptop and gain
access to the financial credentials of the customer.
Fraudsters use this information to carry out unauthorised transfer of funds or make payments
using the customer’s Internet banking / payment apps.
If your device faces any technical glitch and you need to download any screen sharing app,
deactivate / log out of all payment related apps from your device.
Download such apps only when you are advised through the official Toll-free number of the
company as appearing in its official website. Do not download such apps in case an executive of
the company contacts you through his / her personal contact number.
As soon as the work is completed, ensure that the screen sharing app is removed from your
device.
14. Fraudsters often contact customers under various pretexts and trick them into scanning Quick
Response (QR) codes using the apps on the customers’ phone.
By scanning such QR codes, customers may unknowingly authorise the fraudsters to withdraw
money from their account.
Be cautious while scanning QR code/s using any payment app. QR codes have account details
embedded in them to transfer money to a particular account.
Never scan any QR code to receive money. Transactions involving receipt of money do not
require scanning barcodes / QR codes or entering mobile banking PIN (m-PIN), passwords, etc.
15. The charging port of a mobile, can also be used to transfer files / data.
Fraudsters use public charging ports to transfer malware to customer phones
connected there and take control / access / steal data sensitive data such as
emails, SMS, saved passwords, etc. from the customers’ mobile phones (Juice
Jacking).
Avoid using public / unknown charging ports / cables.
16. 14% 19%
28% 25%
38% 28%
25% 27%
48% 54% 46% 48%
0%
20%
40%
60%
80%
100%
120%
2018 2019 2020 2021
AXIS
TITLE
AXIS TITLE
Series 1 Series 2 Series 3