SlideShare a Scribd company logo
1 of 18
: Cyber Crimes
Submited By
Vikas Bairwa
Content :)
• What is Cyber Crime.
• Cyber Crime statistic
• Trending Cyber Crimes in Present Time
• DeepFake Scam.
• Fex Ex Courier Scam
• Festival Theme Crimes
• Video Call Scams
• many more……
Cyber Crimes
”If you spend more on Coffee than IT ,you will be hacked .” -Richard Clarke
Cybercrime is a type of crime involving a computer or a computer
network. The computer may have been used in committing the crime, or it
may be the target. Cybercrime may harm someone's security or finances
What is Cyber Crime ?
Cyber Crime Statistics
.
Trending Cyber Crimes
Deep Fake
scam
Video call
scams
Fed ex Courior
scam
Investing Scams
Festival Theme
Crimes
Many more…
Deep Fake Scams
Artificial intelligence (AI) can be a powerful tool, but what happens when it falls into the
hands of scammers?
While AI can help with things like chatbots for customer service and writing emails, it can
also be leveraged by nefarious actors through deep fake scams that can mimic human
voices, create fake videos, photos and more to take advantage of unsuspecting victim
Deep Fake Scams
How it Works
Phone scams are nothing new, but with the help of AI, they’ve become more realistic and a more powerful
weapon for scammers. Scammers will use AI to:
● Take videos, photos and other information from your social media profiles and other websites and use AI to
create realistic deep fakes for their fraudulent schemes. They even leverage things like posts from your
current vacation to identify their targets.
● Once they’ve created a deep fake of a real voice of your loved one, they’ll call you to say they’re in trouble
and need money. Scammers have even taken things as far as faking kidnappings and using deep fake
voices to make their ransom calls seem legitimate. As AI continues to evolve and become more realistic,
scammers are also using it to create videos that may look and sound just like your loved ones to leverage in
their scheme.
● Scammers play up the sense of urgency and seriousness of the situation to get you to act quickly and without
thinking.
Scammers will ask for payment in cash, gift cards or cryptocurrency to try to make their schemes untraceable
Deep Fake Scams
Deep fake examples
Fed ex Courier Scams
The ‘FedEx courier’ fraudsters impersonate FedEx employees and law enforcement
officials. The scammers involved in the fake call operation prey on people’s anxieties and
fears. They employ Interactive Voice Response (IVR) systems that convincingly simulate
automated calls from FedEx and fake customs and Mumbai police officials. The callers
weave a tale of a stuck consignment being thoroughly checked at the Mumbai airport
customs, leading to the discovery of narcotics hidden among the items. To avoid legal
troubles, they coerce their victims into paying a hefty ‘fine’ ranging from Rs 1 lakh to Rs 10
lakh
Fed ex Courier Scams
In 2023 alone, Bengaluru Police have registered 163 such cases, 48 of them in the South-
East division alone
Festival Theme Crimes
The nation's cybersecurity watchdog, the Indian Computer Emergency Response
Team (CERT-In), on October 18 issued an advisory asking users to be aware of
festival-themed scams that promise users offers and prizes but end up stealing
sensitive information like bank account details and OTP. "It has been reported that
adwares are targeting prominent brands and tricking its (sic) customers in
fraudulent phishing/fraudulent scams.
Festival Theme Crimes
Video Call Scams
In video call scams you may got following situations .
● In this new type of online frauds, an offender uses voice and video
sample of your known individual and then calls use giving AI
commands from its mobile phone. The technology is so smooth in use
that the victim believes that he or she is talking to its knonw individual."
● For many with a mobile phone, scam calls are a regular
occurrence. But WhatsApp and instagram users are specifically
being urged to look out for a new phishing scam in the form of a
video call from an unknown number and are being advised not
to answer them.
Varition of Video Call Scams
● Tech support scams
● Impersonation scams
● Blackmailing by showing their video’s screen recording
Social Media Account Jacking
In this scam an unknown person may message you like “hey MR. XYZ i see your instagram
profile i am helping people to earn money in crypto in order to be in my team you need to
mention @XySD in your bio and add abc@gmail.com in your email of instagram”;
Social Media Account Jacking
How to be safe from cyber Crime
● Make your social media account and their posts private
● Never share your personal details with anyone on social
media
● Don’t answer unknown video calls
● Still if you got scammed Then call on cyber crime helpline
1930
THANK YOU
Your passion fuels our adventure!

More Related Content

Similar to Cyber crime ppt college.pptx

AI And Cyber-security Threats
AI And Cyber-security ThreatsAI And Cyber-security Threats
AI And Cyber-security ThreatsSpotle.ai
 
Identity Theft: Evolving with Technology
Identity Theft: Evolving with TechnologyIdentity Theft: Evolving with Technology
Identity Theft: Evolving with Technology- Mark - Fullbright
 
ccs12-18022310494mghmgmyy3 (1).pdf
ccs12-18022310494mghmgmyy3 (1).pdfccs12-18022310494mghmgmyy3 (1).pdf
ccs12-18022310494mghmgmyy3 (1).pdfKALPITKALPIT1
 
How to Avoid Crypto Scams - Crypto JBro
How to Avoid Crypto Scams - Crypto JBroHow to Avoid Crypto Scams - Crypto JBro
How to Avoid Crypto Scams - Crypto JBroJared Broker
 
Phishing techniques
Phishing techniquesPhishing techniques
Phishing techniquesSushil Kumar
 
Running head HOW TO AVOID INTERNET SCAMS AT THE WORKPLACE 1 .docx
Running head HOW TO AVOID INTERNET SCAMS AT THE WORKPLACE  1 .docxRunning head HOW TO AVOID INTERNET SCAMS AT THE WORKPLACE  1 .docx
Running head HOW TO AVOID INTERNET SCAMS AT THE WORKPLACE 1 .docxwlynn1
 
Ict Phishing (Present)
Ict   Phishing (Present)Ict   Phishing (Present)
Ict Phishing (Present)aleeya91
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and SecurityMd Nishad
 
Hum 140: Social Media - Cyber fraud
Hum 140: Social Media - Cyber fraudHum 140: Social Media - Cyber fraud
Hum 140: Social Media - Cyber fraudRay Brannon
 
Phishing--The Entire Story of a Dark World
Phishing--The Entire Story of a Dark WorldPhishing--The Entire Story of a Dark World
Phishing--The Entire Story of a Dark WorldAvishek Datta
 
Cyber crime and its types
Cyber crime and its  typesCyber crime and its  types
Cyber crime and its typesDINESH KAMBLE
 
cybercrimeandtypes-19101817340 2.pdf
cybercrimeandtypes-19101817340      2.pdfcybercrimeandtypes-19101817340      2.pdf
cybercrimeandtypes-19101817340 2.pdfgaherwarsaloni1234
 

Similar to Cyber crime ppt college.pptx (20)

Cyber crimes
Cyber crimesCyber crimes
Cyber crimes
 
AI And Cyber-security Threats
AI And Cyber-security ThreatsAI And Cyber-security Threats
AI And Cyber-security Threats
 
Phishing.pdf
Phishing.pdfPhishing.pdf
Phishing.pdf
 
Identity Theft: Evolving with Technology
Identity Theft: Evolving with TechnologyIdentity Theft: Evolving with Technology
Identity Theft: Evolving with Technology
 
ccs12-18022310494mghmgmyy3 (1).pdf
ccs12-18022310494mghmgmyy3 (1).pdfccs12-18022310494mghmgmyy3 (1).pdf
ccs12-18022310494mghmgmyy3 (1).pdf
 
Online Scams and Frauds
Online Scams and FraudsOnline Scams and Frauds
Online Scams and Frauds
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Security Primer
Security PrimerSecurity Primer
Security Primer
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
How to Avoid Crypto Scams - Crypto JBro
How to Avoid Crypto Scams - Crypto JBroHow to Avoid Crypto Scams - Crypto JBro
How to Avoid Crypto Scams - Crypto JBro
 
Phishing techniques
Phishing techniquesPhishing techniques
Phishing techniques
 
Fraud in bank
Fraud in bankFraud in bank
Fraud in bank
 
Fraud in bank
Fraud in bankFraud in bank
Fraud in bank
 
Running head HOW TO AVOID INTERNET SCAMS AT THE WORKPLACE 1 .docx
Running head HOW TO AVOID INTERNET SCAMS AT THE WORKPLACE  1 .docxRunning head HOW TO AVOID INTERNET SCAMS AT THE WORKPLACE  1 .docx
Running head HOW TO AVOID INTERNET SCAMS AT THE WORKPLACE 1 .docx
 
Ict Phishing (Present)
Ict   Phishing (Present)Ict   Phishing (Present)
Ict Phishing (Present)
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Hum 140: Social Media - Cyber fraud
Hum 140: Social Media - Cyber fraudHum 140: Social Media - Cyber fraud
Hum 140: Social Media - Cyber fraud
 
Phishing--The Entire Story of a Dark World
Phishing--The Entire Story of a Dark WorldPhishing--The Entire Story of a Dark World
Phishing--The Entire Story of a Dark World
 
Cyber crime and its types
Cyber crime and its  typesCyber crime and its  types
Cyber crime and its types
 
cybercrimeandtypes-19101817340 2.pdf
cybercrimeandtypes-19101817340      2.pdfcybercrimeandtypes-19101817340      2.pdf
cybercrimeandtypes-19101817340 2.pdf
 

Recently uploaded

OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
power system scada applications and uses
power system scada applications and usespower system scada applications and uses
power system scada applications and usesDevarapalliHaritha
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort servicejennyeacort
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130Suhani Kapoor
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girlsssuser7cb4ff
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learningmisbanausheenparvam
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escortsranjana rawat
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AIabhishek36461
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.eptoze12
 
Introduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxIntroduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxvipinkmenon1
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerAnamika Sarkar
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 

Recently uploaded (20)

OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
power system scada applications and uses
power system scada applications and usespower system scada applications and uses
power system scada applications and uses
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
 
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learning
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AI
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.
 
Introduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxIntroduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptx
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 

Cyber crime ppt college.pptx

  • 1. : Cyber Crimes Submited By Vikas Bairwa
  • 2. Content :) • What is Cyber Crime. • Cyber Crime statistic • Trending Cyber Crimes in Present Time • DeepFake Scam. • Fex Ex Courier Scam • Festival Theme Crimes • Video Call Scams • many more…… Cyber Crimes ”If you spend more on Coffee than IT ,you will be hacked .” -Richard Clarke
  • 3. Cybercrime is a type of crime involving a computer or a computer network. The computer may have been used in committing the crime, or it may be the target. Cybercrime may harm someone's security or finances What is Cyber Crime ?
  • 5. Trending Cyber Crimes Deep Fake scam Video call scams Fed ex Courior scam Investing Scams Festival Theme Crimes Many more…
  • 6. Deep Fake Scams Artificial intelligence (AI) can be a powerful tool, but what happens when it falls into the hands of scammers? While AI can help with things like chatbots for customer service and writing emails, it can also be leveraged by nefarious actors through deep fake scams that can mimic human voices, create fake videos, photos and more to take advantage of unsuspecting victim
  • 7. Deep Fake Scams How it Works Phone scams are nothing new, but with the help of AI, they’ve become more realistic and a more powerful weapon for scammers. Scammers will use AI to: ● Take videos, photos and other information from your social media profiles and other websites and use AI to create realistic deep fakes for their fraudulent schemes. They even leverage things like posts from your current vacation to identify their targets. ● Once they’ve created a deep fake of a real voice of your loved one, they’ll call you to say they’re in trouble and need money. Scammers have even taken things as far as faking kidnappings and using deep fake voices to make their ransom calls seem legitimate. As AI continues to evolve and become more realistic, scammers are also using it to create videos that may look and sound just like your loved ones to leverage in their scheme. ● Scammers play up the sense of urgency and seriousness of the situation to get you to act quickly and without thinking. Scammers will ask for payment in cash, gift cards or cryptocurrency to try to make their schemes untraceable
  • 8. Deep Fake Scams Deep fake examples
  • 9. Fed ex Courier Scams The ‘FedEx courier’ fraudsters impersonate FedEx employees and law enforcement officials. The scammers involved in the fake call operation prey on people’s anxieties and fears. They employ Interactive Voice Response (IVR) systems that convincingly simulate automated calls from FedEx and fake customs and Mumbai police officials. The callers weave a tale of a stuck consignment being thoroughly checked at the Mumbai airport customs, leading to the discovery of narcotics hidden among the items. To avoid legal troubles, they coerce their victims into paying a hefty ‘fine’ ranging from Rs 1 lakh to Rs 10 lakh
  • 10. Fed ex Courier Scams In 2023 alone, Bengaluru Police have registered 163 such cases, 48 of them in the South- East division alone
  • 11. Festival Theme Crimes The nation's cybersecurity watchdog, the Indian Computer Emergency Response Team (CERT-In), on October 18 issued an advisory asking users to be aware of festival-themed scams that promise users offers and prizes but end up stealing sensitive information like bank account details and OTP. "It has been reported that adwares are targeting prominent brands and tricking its (sic) customers in fraudulent phishing/fraudulent scams.
  • 13. Video Call Scams In video call scams you may got following situations . ● In this new type of online frauds, an offender uses voice and video sample of your known individual and then calls use giving AI commands from its mobile phone. The technology is so smooth in use that the victim believes that he or she is talking to its knonw individual." ● For many with a mobile phone, scam calls are a regular occurrence. But WhatsApp and instagram users are specifically being urged to look out for a new phishing scam in the form of a video call from an unknown number and are being advised not to answer them.
  • 14. Varition of Video Call Scams ● Tech support scams ● Impersonation scams ● Blackmailing by showing their video’s screen recording
  • 15. Social Media Account Jacking In this scam an unknown person may message you like “hey MR. XYZ i see your instagram profile i am helping people to earn money in crypto in order to be in my team you need to mention @XySD in your bio and add abc@gmail.com in your email of instagram”;
  • 17. How to be safe from cyber Crime ● Make your social media account and their posts private ● Never share your personal details with anyone on social media ● Don’t answer unknown video calls ● Still if you got scammed Then call on cyber crime helpline 1930
  • 18. THANK YOU Your passion fuels our adventure!