( “SCAM SCENARIOUS”)
- Malicious software (malware)
Malicious software is used to cause damage and destroy other computer programs and systems. The terms malware and virus are sometimes used interchangeably. A virus, worm, spyware, trojan horse, ransomware and phishing are all popular types of malware. The basic knowledge of cyber attacks and prevention strategies is essential for every digital citizen, use firewall, backup data, software updates…
Together with malware, hacking is another type of cyber attack which involves activities performed to gain unauthorised access to computers and data. Create strong account, Do not access important information on public computers, don’t type password, IP security for computer help prevent hackers
Online scams are a type of cyber attack to prey on vulnerable internet users. They come in many forms such as emails, text messages, online shopping or social media scams. Try to gain trust by claiming to be from a well-known business or impersonating a known contact. Suggest their own verification procedures, like going to websites they have created or calling numbers they provide to you. Appeal to your emotions by triggering an emotional response (e.g. excitement) to get what they want. Create a sense of urgency to get you to make decisions without thinking
Phishing emails (or email scams) are attempts to steal personal information or that trick you into downloading malware. This resulted in the development of ‘The 5 C’s of Critical Consuming’(Context, Credibility, Construction, Corroboration, Compare), which can help people critically analyse news media.
Fake news are fictitious stories, deliberately fabricated to deceive readers. Distinguishing fake news or sources from legitimate sources needs rational and critical thinking
- Phishing Scam: Banking SMS
“VCB notices that your account has been logged in by an unknown device. If not, please log in to http://www.vcbdiglhbink to authenticate to avoid being scammed into taking over your account”.
– Scammers can make messages look real. It is different in style from the first message. It has a malicious link. URL is not secure. It has a sense of urgency
You must log in to post a comment.