Today internet, computers, Smartphones, and other communication technology devices have become an integral part of our life. Imagine how much time we spend each day on these smart devices. We have made internet communication mediums like Google, Emails, WhatsApp, Facebook, Twitter, etc., part and parcel of our everyday activities. But most of us are unaware of Cybersafety and security essentials to safeguard ourselves.
Do you know that whatever information is personal details are shared on the internet stay online forever as it is extremely difficult to delete information completely?
So share only such information on the Internet that you want your information to be publicly available.
Otherwise, whatever information about you will be on the Internet, it may be possible that you become a victim of the fraudsters and do not easily give your personal information on any untrusted third party website or to any strangers.
What are Cyber Crimes?
Cybercrimes are offenses that may be committed against individuals, companies, or Institutions by using computers, the internet, or mobile technology. Cybercriminals use the platforms such as social networking sites, emails, chatrooms, pirated software, websites, etc., to attack victims. Children are also vulnerable to various types of Cybercrimes.
"According to Indian computer emergency response team (CERT-In) over 53000 cases of cybersecurity incidents were reported in 2017 in India".
Cyber threats that can impact anyone:
Cyber threats are different possible ways that can be used to attack us using the internet or mobile technology.
some common ways used by cybercriminals are:
1. Email Spoofing
2. Malicious Files
3. Social Engineering
4. Cyber Bullying
5. Identity Theft
6. Job Frauds
7. Bank Frauds
1. Email spoofing
Sending out emails to you that look like genuine and from a trusted email ID but actually, they are not.
2. Malicious Files Applications
Sending you malicious and bad applications and files through direct messaging, gaming, emails or website, etc. in order to get access to your smartphone and personal data.
3. Social Engineering
Social Engineering is a technique used by cybercriminals to gain your confidence to get information from you. Depending on what you like to do most, a cybercriminal may try to interact with you to mine for information and/ or commit some harm to you. Suppose you like to play an online game and an impersonator behaves like another child and invites you to talk to him and share information.
4. Cyber Bullying
A form of harassment or bullying inflicted through the use of electronic or communication devices such as computers, mobile phones, laptops, etc.
5. Identity Theft
Deliberate use of someone's identity to gain a financial advantage or to obtain credit and other benefits in the other person's name for counterpart disadvantage or loss.
6. Job Frauds
Fraudulent representation or deceptive activities on the part of an employee or a prospective employee towards an employer.
7. Banking fraud
Fraudulently obtaining money from depositors by posing as a bank or other financial institution.
0 Comments