An Autonomous Body Registered Under The Indian Trusts Act. 1882
Summer Internship 2018
Bnnner News

Modern Scam of Cyber crimes on Online Portals

In our modern technology-driven age, keeping our personal information private is becoming more difficult. The truth is, highly classified details are becoming more available to public databases, because we are more interconnected than ever. Our data is offered for nearly anyone to sift through, as a result of this inter connectivity. This creates a negative stigma that the utilization of technology is dangerous as a result anyone can access one’s private information for a worth. Technology continues to vow to ease our daily lives; but, there are dangers of victimization technology. One of the most dangers of victimization technology is the threat of cyber crimes.

 

cyber crimes, online fraud, internet crimes

 

Common internet users could also be unaware of cyber crimes, coupled with what to do if they fall victim of cyber attacks. Several innocent people fall victim to cyber crimes round the world, particularly since technology is evolving at a fast pace. Cyber crimes are any crimes that cause harm to another individual employing a computer and a network. Cyber crimes can occur by problems surrounding penetration of privacy and confidentiality. Once privacy and confidential information is lost or interrupted by unlawfully individuals, it provides way to high profile crimes like hacking, cyber terrorism, espionage, financial theft, infringement of copyright, spamming, cyber warfare and plenty of additional crimes which occur across borders. Cyber crimes can happen to anyone once their information is breach by an unlawful user.

Companies have the same risk of being attacked by different cybercrimes. Such crimes include: Business Schemes, Counterfeit Cheque method.

  • Business Schemes normally include crimes stated above in theft crimes but more specifically freight forwarding, and counterfeit cheque schemes. This is where an ad for help is posted by the impostor on one of popular internet job search sites via the internet. The respondents have to fill out an application where give sensitive private data, such as their date of birth or Social Security number about themselves. The impostor uses that data to obtain merchandise on credit where the merchandise is sent to another respondent who has to be the freight forwarder in order to ship the merchandise out of the foreign country. The impostor then pays the freight forwarder with a counterfeit cheque containing a substantial excess amount. The excess is wired back to the impostor, usually in a foreign country, before the fraud is exposed.

 

  • Counterfeit Cheque method |Cheque overpayment fraud this is where a fake cashier’s cheque or corporate cheque is used to pay for goods or services. Most often these cheques are made out for a large amount of money than the buying price asking for.
    The victims are asked to deposit the cheque and return the excess amount, usually done by wire transfer, to a foreign country due to the banks may issue money from a cashier’s cheque before the cheque actually clears. The victim now believes the cheque has cleared and wires the money as indicated. One example of this scam is purchasing of automobiles listed in popular sites such as Craig’s list.

Read more : Cyber Security Expert Kislay Chaudhary Advice on Bitcoin fraud

Common internet users could also be unaware of cyber crimes, coupled with what to do if they fall victim of cyber attacks. Several innocent people fall victim to Internet crimes round the world, particularly since technology is evolving at a fast pace. Internet crimes are any crimes that cause harm to another individual employing a computer and a network.

Internet crimes can occur by problems surrounding penetration of privacy and confidentiality. Once privacy and confidential information is lost or interrupted by unlawfully individuals, it provides way to high profile crimes like hacking, cyber terrorism, espionage, financial theft, infringement of copyright, spamming, cyber warfare and plenty of additional crimes which occur across borders. Cyber crimes can happen to anyone once their information is breach by an unlawful user.

Read more : Career in ethical hacking