SlideShare a Scribd company logo
TABLE OFCONTENTS
• What is cyber crime?
• Types of cyber crime ?
What is Cyber Crime ?
• Cybercrime is criminal activity that either
targets or uses a computer,
a computer network or a networked device.
Most, but not all, cybercrime is committed
by cybercriminals or hackers who want to
make money. Cybercrime is carried out by
individuals or organizations.
Types of cyber crime
FINANCIAL FRAUDS
CVV/OTPFRAUD
UPIFRAUD
REMOTE ACCESSING APPS FRAUD
ONLINE SHOPPING FRAUD
LOTTERY FRAUD
MATRIMONIAL SITES FRAUD
PHISHING/VISHING/SMISHING FRAUD
ONLINE JOB FRAUD
SOCIAL MEDIAFRAUD
CYBER STALKING
CYBER BULLYING
IDENTITY THEFT
HACKING/ACCOUNT TAKEOVER
SEXTORTION
OTHERCYBERCRIMES
 RANSOMWARE
 MALWARE /RAT/MALICIOUS APPS
 KEYLOGGERS
 PUBLIC WI-FI AND HOTSPOTS
 SERVICE CENTERS
FINANCIAL FRAUD
01-CVV / OTP FRAUDS
 One-time password (OTP), a two-factor authentication, is
effective deterrent against cyber criminals trying to steal
money from victim’s bank account through online
transaction. This OTP is valid for one transaction only and
has time limit. In OTP Fraud, cyber criminals dupe bank
customers into revealing OTP and siphon off money from
bank account online.
 Common pretext used by Fraudster to Cheat/Dupe
Victims are:
 Renewing debit or credit cards
 Updating KYC
 Reward points or cash backs
KYC Verification
• The Bank official will never call you for
KYC verification
• If some one called and informed to
verify KYC other wise your account
will be Blocked – never do it.
• Never click any links shared for
verification of KYC
• Never give access /install app like
Anydesk or quick support apps.. These
apps steal your information
• You loose your amount from your bank
02-UPIFRAUDS
In UPI Fraud, UPI mobile app installed on
Fraudster’s mobile get linked to victim’s
bank account when victim sends some code
to another number. Once the victims
account gets linked with the frauds UPI app,
money will be siphoned off from the
victims account.
CustomerCare
• Never search for customer care
number through google.
• If you search you get plenty of
fraud customer care numbers
• The payment wallets/App have Help
desk inside the app.
• Connect the customer care support
from the app
03-REMOTEACCESSINGAPPSFRAUDS
(TEAMVIEWER,ANYDESKETC)
 Fraudsters trick the victim to install app to allow
remote access on the device. The fraudster gain
access to all OTP based transactions and siphons off
all the fund.
 Remote Accessing Mobile App: AnyDesk,
Teamviewer ETC.
Screen SharingApps
• Never download and install “anydesk”
or “quicksupport”
• If you install these applications, your
mobile screen can be viewed by some
one at other end.
• They can take out your UPI PIN and
other important financial passwords
• Most of the customer care frauds are
happened through this.. You may
loose money
04-ONLINE SHOPPINGFRAUDS
 Classified ads are one of the prominent sources for different
kind of scammers to find potential victims where frauds pose
both as buyers and sellers. In these type of fraud, scammers
posing as sellers, ask for pre-payment for delivery of items and
DOES NOT deliver it.
 While posing as buyers, scammers send Money request of UPI
Mobile App with instruction to type in MPIN to receive the money.
As soon as victim, enters MPIN amount is transferred to
fraudster’s account.
QR Code Fraud - Fewtricks
used by fraudsters
• Fraudster will share QR code
for payment of goods you
purchased online .
• When you scan and start
transaction, it ask for your PIN.
• Remember – When you are
receiving money, you never give
your PIN
• Never share your QR code to any
one. It contains all your bank
account details in it.
• Be careful while your scanning
and paying amount at shops.
05.LOTTERYFRAUD
 The fraud in which, victims receive phone calls,
emails, SMS’s, WhatsApp messages, or letters etc.
telling them that they have won a lottery or an
expensive gift. Victims are subsequently requested
to deposit money in a bank account as processing
fee or tax.
06-MATRIMONIALSITESFRAUDS
 Fraudsters befriend men/women after creating an
impressive online profile on a matrimonial site,
posing as prospective bride/bridegroom. After
gaining confidence, the fraudsters ask to transfer
money into their bank accounts stating various
emergencies. Once the money has been transferred
the fraudster cuts all the contacts with the victim
and disappear without a trace.
07-PHISHING / VISHING/ SMISHING
 Phishing: It is one of the well-known forms of social
engineering technique of sending a link via email or text or
embedding a link on a website or downloads malware onto the
user’s device.
 Vishing (or voice phishing) in which Scammers will call
targets from a phone (or spoofed) phone number, typically
claiming to be representatives of banks or financial
organizations.
 Smishing: It is SMS phishing attack in which attacker ask
target to download an app or open a link. Individuals are
more often the victims of smishing exploits.
08-ONLINE JOB FRAUD
 Cyber criminals advertise fake job offers using
various online platforms. Victim, in search of a
job, goes through these offers and contacts the
cybercriminal. Upon contacting cyber criminals,
victim is asked to pay registration fee or make an
advance payment (which they claim is refundable)
to avail their services for getting a job. Victim
transfers the money and follows the guidelines of
the fraudster and falls prey to the cyber-crime.
SOCIAL MEDIA FRAUD
01-CYBERSTALKING
 Cyber stalking is a crime in which the stalker
targets the victim with threatening/abusive
messages and/or follows them/their activities in
the real world. Cyber stalkers usually use digital
platforms like email, instant messages, phone
calls, and other communication modes to stalk
you. Cyber stalking can be a sexual harassment,
inappropriate contact or an unwelcome attention
in your life and your family’s activities.
02-CYBERBULLYING
 Cyber bullying is sharing personal or private
information about someone else with an intention
to cause embarrassment or humiliation, over
digital communication, such as e-mail, instant
messaging (IM), messages posted on a website or
a discussion group. It includes sending, posting, or
sharing negative, harmful, false, or abusive
content about other persons over social media or
other digital platforms.
03-HACKING/ACCOUNT TAKEOVER
 Hacking is the unauthorized access to or control
over computer network or digital devices for
some illicit purpose like data deletion, data loss or
stealing of sensitive data such as financial
information or company/personal secrets. The
genuine account of a person when accessed
through illicit means and gained control of the
same, by another person, for the purpose of
committing fraud is called Account takeover. We
have seen a rapid increase in segments such as
social media, e-commerce in recent years.
04-IDENTITYTHEFT
 Identity theft is the crime of obtaining the
personal or financial information of another
person to use their identity to commit a crime.
Identity Theft takes place whenever a criminal
gets hold of a piece of your information, and then
uses that information for their own personal gain.
05-SEXTORTION
 Sextortion is extorting money or sexual favors from
people by threatening to reveal evidence of their
sexual activity.
OTHER CYBER CRIME
01-RANSOMWARE
 Ransomware is as vicious malware that locks users
out of their devices or blocks access to files until a
sum of money or ransom is paid. Ransomware
attacks cause downtime, data loss, possible
intellectual property theft, and in certain
industries an attack is considered a data breach.
02-MALWARE/ RAT/ MALICIOUS APPS
 Malware, or malicious software, is any program or file that is
harmful to a computer user. Types of malware can include
computer viruses, worms, Trojan horses and spyware. These
applications may have viruses which pass sensitive information or
give control of your phone/device to some outside agent, who
gets access to your contacts, passwords, financial data etc.
 RAT- A Remote Access Trojan (RAT) is a type of malware that
allows covert surveillance, a backdoor for administrative control
and unfettered and unauthorized remote access to a victim's
machine or mobile.
03-KEYLOGGERS
 A Key logger is a hardware or software device
which monitors every keystroke, screen shots,
chats etc. typed on computer. Key loggers are used
as a tools by attacker to steel user’s usernames
and passwords in e-commerce, social network,
Mail service etc. There are two type of key
loggers- software-based and hardware based.
04-PUBLIC WI-FI AND HOTSPOTS
 Public WI-FI :- Using a public Wi-Fi network poses
danger to the users as the data over this type of open
connections are often unencrypted and unsecured,
leaving the users vulnerable to a man-in-the-middle
(MITM) attack. A cybercriminal exploits a security
flaw in the network to intercept data transmitting
through the network. This gives a hacker access to
sniff out any information that passes between you
and the websites you visit — details of browsing
activities, account logins, and purchase transactions.
Your sensitive information, such as passwords and
financial data, are then vulnerable to identity theft.
05-SERVICECENTERS
Smart phones are bound to get damaged
which have full of personal and important
data. There is a chance of the repair person
can access your data and may misuse it.
They can steal your data, photos, camera
module, speakers or microphone
depending upon smart phone models.
Thank You

More Related Content

Similar to cyber_crim.pptx

Top Cyber Security institute in India - Gicseh.pdf
Top Cyber Security institute in India - Gicseh.pdfTop Cyber Security institute in India - Gicseh.pdf
Top Cyber Security institute in India - Gicseh.pdf
GICSEH
 
Top Cyber Security institute in India - Gicseh.pdf
Top Cyber Security institute in India - Gicseh.pdfTop Cyber Security institute in India - Gicseh.pdf
Top Cyber Security institute in India - Gicseh.pdf
GICSEH
 
cyber crime.pptx
cyber crime.pptxcyber crime.pptx
cyber crime.pptx
OmprakashRaut
 
Cybercrimes
CybercrimesCybercrimes
Cybercrimes
Fit Tri
 
THE IMPORTANCE OF CYBERSECURITY TO MANKIND
THE IMPORTANCE OF CYBERSECURITY TO MANKINDTHE IMPORTANCE OF CYBERSECURITY TO MANKIND
THE IMPORTANCE OF CYBERSECURITY TO MANKIND
ReinIgnacioUrolaza
 
CYBER.pptx
CYBER.pptxCYBER.pptx
CYBER.pptx
ssuser8b4eb21
 
The Major Types of Cybercrime
The Major Types of CybercrimeThe Major Types of Cybercrime
The Major Types of Cybercrime
Rubi Orbeta
 
Internet related frauds
Internet related fraudsInternet related frauds
Internet related frauds
TejalAdani
 
December 2019 Part 10
December 2019 Part 10December 2019 Part 10
December 2019 Part 10
seadeloitte
 
cybercrimeandtypes-19101817340 2.pdf
cybercrimeandtypes-19101817340      2.pdfcybercrimeandtypes-19101817340      2.pdf
cybercrimeandtypes-19101817340 2.pdf
gaherwarsaloni1234
 
Cyber crime and its types
Cyber crime and its  typesCyber crime and its  types
Cyber crime and its types
DINESH KAMBLE
 
Cyber Crime and Security ppt by Neeraj Ahirwar
Cyber Crime and Security ppt by Neeraj AhirwarCyber Crime and Security ppt by Neeraj Ahirwar
Cyber Crime and Security ppt by Neeraj Ahirwar
Neeraj Ahirwar
 
Cyber Laws.ppt
Cyber Laws.pptCyber Laws.ppt
Cyber Laws.ppt
silas Sargunam
 
ccs12-18022310494mghmgmyy3 (1).pdf
ccs12-18022310494mghmgmyy3 (1).pdfccs12-18022310494mghmgmyy3 (1).pdf
ccs12-18022310494mghmgmyy3 (1).pdf
KALPITKALPIT1
 
Name parul
Name parulName parul
Name parul
Parul231
 
Name parul
Name parulName parul
Name parul
Parul231
 
Computer and internet Cybercrime Reports
Computer and internet Cybercrime ReportsComputer and internet Cybercrime Reports
Computer and internet Cybercrime Reports
jcgevana
 
Phishing.pdf
Phishing.pdfPhishing.pdf
Phishing.pdf
MariGogokhia
 
cybercrime survival guide
cybercrime survival guidecybercrime survival guide
cybercrime survival guideGary Gray, MCSE
 

Similar to cyber_crim.pptx (20)

Top Cyber Security institute in India - Gicseh.pdf
Top Cyber Security institute in India - Gicseh.pdfTop Cyber Security institute in India - Gicseh.pdf
Top Cyber Security institute in India - Gicseh.pdf
 
Top Cyber Security institute in India - Gicseh.pdf
Top Cyber Security institute in India - Gicseh.pdfTop Cyber Security institute in India - Gicseh.pdf
Top Cyber Security institute in India - Gicseh.pdf
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
cyber crime.pptx
cyber crime.pptxcyber crime.pptx
cyber crime.pptx
 
Cybercrimes
CybercrimesCybercrimes
Cybercrimes
 
THE IMPORTANCE OF CYBERSECURITY TO MANKIND
THE IMPORTANCE OF CYBERSECURITY TO MANKINDTHE IMPORTANCE OF CYBERSECURITY TO MANKIND
THE IMPORTANCE OF CYBERSECURITY TO MANKIND
 
CYBER.pptx
CYBER.pptxCYBER.pptx
CYBER.pptx
 
The Major Types of Cybercrime
The Major Types of CybercrimeThe Major Types of Cybercrime
The Major Types of Cybercrime
 
Internet related frauds
Internet related fraudsInternet related frauds
Internet related frauds
 
December 2019 Part 10
December 2019 Part 10December 2019 Part 10
December 2019 Part 10
 
cybercrimeandtypes-19101817340 2.pdf
cybercrimeandtypes-19101817340      2.pdfcybercrimeandtypes-19101817340      2.pdf
cybercrimeandtypes-19101817340 2.pdf
 
Cyber crime and its types
Cyber crime and its  typesCyber crime and its  types
Cyber crime and its types
 
Cyber Crime and Security ppt by Neeraj Ahirwar
Cyber Crime and Security ppt by Neeraj AhirwarCyber Crime and Security ppt by Neeraj Ahirwar
Cyber Crime and Security ppt by Neeraj Ahirwar
 
Cyber Laws.ppt
Cyber Laws.pptCyber Laws.ppt
Cyber Laws.ppt
 
ccs12-18022310494mghmgmyy3 (1).pdf
ccs12-18022310494mghmgmyy3 (1).pdfccs12-18022310494mghmgmyy3 (1).pdf
ccs12-18022310494mghmgmyy3 (1).pdf
 
Name parul
Name parulName parul
Name parul
 
Name parul
Name parulName parul
Name parul
 
Computer and internet Cybercrime Reports
Computer and internet Cybercrime ReportsComputer and internet Cybercrime Reports
Computer and internet Cybercrime Reports
 
Phishing.pdf
Phishing.pdfPhishing.pdf
Phishing.pdf
 
cybercrime survival guide
cybercrime survival guidecybercrime survival guide
cybercrime survival guide
 

Recently uploaded

7 Tips on Social Media Marketing strategy
7 Tips on Social Media Marketing strategy7 Tips on Social Media Marketing strategy
7 Tips on Social Media Marketing strategy
Digital Marketing Lab
 
Grow Your Reddit Community Fast.........
Grow Your Reddit Community Fast.........Grow Your Reddit Community Fast.........
Grow Your Reddit Community Fast.........
SocioCosmos
 
“To be integrated is to feel secure, to feel connected.” The views and experi...
“To be integrated is to feel secure, to feel connected.” The views and experi...“To be integrated is to feel secure, to feel connected.” The views and experi...
“To be integrated is to feel secure, to feel connected.” The views and experi...
AJHSSR Journal
 
The Evolution of SEO: Insights from a Leading Digital Marketing Agency
The Evolution of SEO: Insights from a Leading Digital Marketing AgencyThe Evolution of SEO: Insights from a Leading Digital Marketing Agency
The Evolution of SEO: Insights from a Leading Digital Marketing Agency
Digital Marketing Lab
 
Unlock TikTok Success with Sociocosmos..
Unlock TikTok Success with Sociocosmos..Unlock TikTok Success with Sociocosmos..
Unlock TikTok Success with Sociocosmos..
SocioCosmos
 
Surat Digital Marketing School - course curriculum
Surat Digital Marketing School - course curriculumSurat Digital Marketing School - course curriculum
Surat Digital Marketing School - course curriculum
digitalcourseshop4
 
Your Path to YouTube Stardom Starts Here
Your Path to YouTube Stardom Starts HereYour Path to YouTube Stardom Starts Here
Your Path to YouTube Stardom Starts Here
SocioCosmos
 
Multilingual SEO Services | Multilingual Keyword Research | Filose
Multilingual SEO Services |  Multilingual Keyword Research | FiloseMultilingual SEO Services |  Multilingual Keyword Research | Filose
Multilingual SEO Services | Multilingual Keyword Research | Filose
madisonsmith478075
 
SluggerPunk Angel Investor Final Proposal
SluggerPunk Angel Investor Final ProposalSluggerPunk Angel Investor Final Proposal
SluggerPunk Angel Investor Final Proposal
grogshiregames
 
Buy Pinterest Followers, Reactions & Repins Go Viral on Pinterest with Socio...
Buy Pinterest Followers, Reactions & Repins  Go Viral on Pinterest with Socio...Buy Pinterest Followers, Reactions & Repins  Go Viral on Pinterest with Socio...
Buy Pinterest Followers, Reactions & Repins Go Viral on Pinterest with Socio...
SocioCosmos
 
Social Media Marketing Strategies .
Social Media Marketing Strategies                     .Social Media Marketing Strategies                     .
Social Media Marketing Strategies .
Virtual Real Design
 
SluggerPunk Final Angel Investor Proposal
SluggerPunk Final Angel Investor ProposalSluggerPunk Final Angel Investor Proposal
SluggerPunk Final Angel Investor Proposal
grogshiregames
 
Improving Workplace Safety Performance in Malaysian SMEs: The Role of Safety ...
Improving Workplace Safety Performance in Malaysian SMEs: The Role of Safety ...Improving Workplace Safety Performance in Malaysian SMEs: The Role of Safety ...
Improving Workplace Safety Performance in Malaysian SMEs: The Role of Safety ...
AJHSSR Journal
 

Recently uploaded (13)

7 Tips on Social Media Marketing strategy
7 Tips on Social Media Marketing strategy7 Tips on Social Media Marketing strategy
7 Tips on Social Media Marketing strategy
 
Grow Your Reddit Community Fast.........
Grow Your Reddit Community Fast.........Grow Your Reddit Community Fast.........
Grow Your Reddit Community Fast.........
 
“To be integrated is to feel secure, to feel connected.” The views and experi...
“To be integrated is to feel secure, to feel connected.” The views and experi...“To be integrated is to feel secure, to feel connected.” The views and experi...
“To be integrated is to feel secure, to feel connected.” The views and experi...
 
The Evolution of SEO: Insights from a Leading Digital Marketing Agency
The Evolution of SEO: Insights from a Leading Digital Marketing AgencyThe Evolution of SEO: Insights from a Leading Digital Marketing Agency
The Evolution of SEO: Insights from a Leading Digital Marketing Agency
 
Unlock TikTok Success with Sociocosmos..
Unlock TikTok Success with Sociocosmos..Unlock TikTok Success with Sociocosmos..
Unlock TikTok Success with Sociocosmos..
 
Surat Digital Marketing School - course curriculum
Surat Digital Marketing School - course curriculumSurat Digital Marketing School - course curriculum
Surat Digital Marketing School - course curriculum
 
Your Path to YouTube Stardom Starts Here
Your Path to YouTube Stardom Starts HereYour Path to YouTube Stardom Starts Here
Your Path to YouTube Stardom Starts Here
 
Multilingual SEO Services | Multilingual Keyword Research | Filose
Multilingual SEO Services |  Multilingual Keyword Research | FiloseMultilingual SEO Services |  Multilingual Keyword Research | Filose
Multilingual SEO Services | Multilingual Keyword Research | Filose
 
SluggerPunk Angel Investor Final Proposal
SluggerPunk Angel Investor Final ProposalSluggerPunk Angel Investor Final Proposal
SluggerPunk Angel Investor Final Proposal
 
Buy Pinterest Followers, Reactions & Repins Go Viral on Pinterest with Socio...
Buy Pinterest Followers, Reactions & Repins  Go Viral on Pinterest with Socio...Buy Pinterest Followers, Reactions & Repins  Go Viral on Pinterest with Socio...
Buy Pinterest Followers, Reactions & Repins Go Viral on Pinterest with Socio...
 
Social Media Marketing Strategies .
Social Media Marketing Strategies                     .Social Media Marketing Strategies                     .
Social Media Marketing Strategies .
 
SluggerPunk Final Angel Investor Proposal
SluggerPunk Final Angel Investor ProposalSluggerPunk Final Angel Investor Proposal
SluggerPunk Final Angel Investor Proposal
 
Improving Workplace Safety Performance in Malaysian SMEs: The Role of Safety ...
Improving Workplace Safety Performance in Malaysian SMEs: The Role of Safety ...Improving Workplace Safety Performance in Malaysian SMEs: The Role of Safety ...
Improving Workplace Safety Performance in Malaysian SMEs: The Role of Safety ...
 

cyber_crim.pptx

  • 1. TABLE OFCONTENTS • What is cyber crime? • Types of cyber crime ?
  • 2. What is Cyber Crime ? • Cybercrime is criminal activity that either targets or uses a computer, a computer network or a networked device. Most, but not all, cybercrime is committed by cybercriminals or hackers who want to make money. Cybercrime is carried out by individuals or organizations.
  • 4. FINANCIAL FRAUDS CVV/OTPFRAUD UPIFRAUD REMOTE ACCESSING APPS FRAUD ONLINE SHOPPING FRAUD LOTTERY FRAUD MATRIMONIAL SITES FRAUD PHISHING/VISHING/SMISHING FRAUD ONLINE JOB FRAUD
  • 5. SOCIAL MEDIAFRAUD CYBER STALKING CYBER BULLYING IDENTITY THEFT HACKING/ACCOUNT TAKEOVER SEXTORTION
  • 6. OTHERCYBERCRIMES  RANSOMWARE  MALWARE /RAT/MALICIOUS APPS  KEYLOGGERS  PUBLIC WI-FI AND HOTSPOTS  SERVICE CENTERS
  • 8. 01-CVV / OTP FRAUDS  One-time password (OTP), a two-factor authentication, is effective deterrent against cyber criminals trying to steal money from victim’s bank account through online transaction. This OTP is valid for one transaction only and has time limit. In OTP Fraud, cyber criminals dupe bank customers into revealing OTP and siphon off money from bank account online.  Common pretext used by Fraudster to Cheat/Dupe Victims are:  Renewing debit or credit cards  Updating KYC  Reward points or cash backs
  • 9. KYC Verification • The Bank official will never call you for KYC verification • If some one called and informed to verify KYC other wise your account will be Blocked – never do it. • Never click any links shared for verification of KYC • Never give access /install app like Anydesk or quick support apps.. These apps steal your information • You loose your amount from your bank
  • 10. 02-UPIFRAUDS In UPI Fraud, UPI mobile app installed on Fraudster’s mobile get linked to victim’s bank account when victim sends some code to another number. Once the victims account gets linked with the frauds UPI app, money will be siphoned off from the victims account.
  • 11. CustomerCare • Never search for customer care number through google. • If you search you get plenty of fraud customer care numbers • The payment wallets/App have Help desk inside the app. • Connect the customer care support from the app
  • 12. 03-REMOTEACCESSINGAPPSFRAUDS (TEAMVIEWER,ANYDESKETC)  Fraudsters trick the victim to install app to allow remote access on the device. The fraudster gain access to all OTP based transactions and siphons off all the fund.  Remote Accessing Mobile App: AnyDesk, Teamviewer ETC.
  • 13. Screen SharingApps • Never download and install “anydesk” or “quicksupport” • If you install these applications, your mobile screen can be viewed by some one at other end. • They can take out your UPI PIN and other important financial passwords • Most of the customer care frauds are happened through this.. You may loose money
  • 14. 04-ONLINE SHOPPINGFRAUDS  Classified ads are one of the prominent sources for different kind of scammers to find potential victims where frauds pose both as buyers and sellers. In these type of fraud, scammers posing as sellers, ask for pre-payment for delivery of items and DOES NOT deliver it.  While posing as buyers, scammers send Money request of UPI Mobile App with instruction to type in MPIN to receive the money. As soon as victim, enters MPIN amount is transferred to fraudster’s account.
  • 15. QR Code Fraud - Fewtricks used by fraudsters • Fraudster will share QR code for payment of goods you purchased online . • When you scan and start transaction, it ask for your PIN. • Remember – When you are receiving money, you never give your PIN • Never share your QR code to any one. It contains all your bank account details in it. • Be careful while your scanning and paying amount at shops.
  • 16. 05.LOTTERYFRAUD  The fraud in which, victims receive phone calls, emails, SMS’s, WhatsApp messages, or letters etc. telling them that they have won a lottery or an expensive gift. Victims are subsequently requested to deposit money in a bank account as processing fee or tax.
  • 17. 06-MATRIMONIALSITESFRAUDS  Fraudsters befriend men/women after creating an impressive online profile on a matrimonial site, posing as prospective bride/bridegroom. After gaining confidence, the fraudsters ask to transfer money into their bank accounts stating various emergencies. Once the money has been transferred the fraudster cuts all the contacts with the victim and disappear without a trace.
  • 18. 07-PHISHING / VISHING/ SMISHING  Phishing: It is one of the well-known forms of social engineering technique of sending a link via email or text or embedding a link on a website or downloads malware onto the user’s device.  Vishing (or voice phishing) in which Scammers will call targets from a phone (or spoofed) phone number, typically claiming to be representatives of banks or financial organizations.  Smishing: It is SMS phishing attack in which attacker ask target to download an app or open a link. Individuals are more often the victims of smishing exploits.
  • 19. 08-ONLINE JOB FRAUD  Cyber criminals advertise fake job offers using various online platforms. Victim, in search of a job, goes through these offers and contacts the cybercriminal. Upon contacting cyber criminals, victim is asked to pay registration fee or make an advance payment (which they claim is refundable) to avail their services for getting a job. Victim transfers the money and follows the guidelines of the fraudster and falls prey to the cyber-crime.
  • 21. 01-CYBERSTALKING  Cyber stalking is a crime in which the stalker targets the victim with threatening/abusive messages and/or follows them/their activities in the real world. Cyber stalkers usually use digital platforms like email, instant messages, phone calls, and other communication modes to stalk you. Cyber stalking can be a sexual harassment, inappropriate contact or an unwelcome attention in your life and your family’s activities.
  • 22. 02-CYBERBULLYING  Cyber bullying is sharing personal or private information about someone else with an intention to cause embarrassment or humiliation, over digital communication, such as e-mail, instant messaging (IM), messages posted on a website or a discussion group. It includes sending, posting, or sharing negative, harmful, false, or abusive content about other persons over social media or other digital platforms.
  • 23. 03-HACKING/ACCOUNT TAKEOVER  Hacking is the unauthorized access to or control over computer network or digital devices for some illicit purpose like data deletion, data loss or stealing of sensitive data such as financial information or company/personal secrets. The genuine account of a person when accessed through illicit means and gained control of the same, by another person, for the purpose of committing fraud is called Account takeover. We have seen a rapid increase in segments such as social media, e-commerce in recent years.
  • 24. 04-IDENTITYTHEFT  Identity theft is the crime of obtaining the personal or financial information of another person to use their identity to commit a crime. Identity Theft takes place whenever a criminal gets hold of a piece of your information, and then uses that information for their own personal gain.
  • 25. 05-SEXTORTION  Sextortion is extorting money or sexual favors from people by threatening to reveal evidence of their sexual activity.
  • 27. 01-RANSOMWARE  Ransomware is as vicious malware that locks users out of their devices or blocks access to files until a sum of money or ransom is paid. Ransomware attacks cause downtime, data loss, possible intellectual property theft, and in certain industries an attack is considered a data breach.
  • 28. 02-MALWARE/ RAT/ MALICIOUS APPS  Malware, or malicious software, is any program or file that is harmful to a computer user. Types of malware can include computer viruses, worms, Trojan horses and spyware. These applications may have viruses which pass sensitive information or give control of your phone/device to some outside agent, who gets access to your contacts, passwords, financial data etc.  RAT- A Remote Access Trojan (RAT) is a type of malware that allows covert surveillance, a backdoor for administrative control and unfettered and unauthorized remote access to a victim's machine or mobile.
  • 29. 03-KEYLOGGERS  A Key logger is a hardware or software device which monitors every keystroke, screen shots, chats etc. typed on computer. Key loggers are used as a tools by attacker to steel user’s usernames and passwords in e-commerce, social network, Mail service etc. There are two type of key loggers- software-based and hardware based.
  • 30. 04-PUBLIC WI-FI AND HOTSPOTS  Public WI-FI :- Using a public Wi-Fi network poses danger to the users as the data over this type of open connections are often unencrypted and unsecured, leaving the users vulnerable to a man-in-the-middle (MITM) attack. A cybercriminal exploits a security flaw in the network to intercept data transmitting through the network. This gives a hacker access to sniff out any information that passes between you and the websites you visit — details of browsing activities, account logins, and purchase transactions. Your sensitive information, such as passwords and financial data, are then vulnerable to identity theft.
  • 31. 05-SERVICECENTERS Smart phones are bound to get damaged which have full of personal and important data. There is a chance of the repair person can access your data and may misuse it. They can steal your data, photos, camera module, speakers or microphone depending upon smart phone models.