Category

Fraud

Dangerous that can be digital footprint

Though the current time is of social media, the digital footprint that is emerging is not seriously considered. There is currently a possibility of getting a job lost, due to the shock that has been broken.

There was a rule that a large company of web designing could not work together with the Committed Cupels. Chandan and Sadhana (names have changed) The same academic batch. Incidentally, having a job in a single company increased the intimacy with each other. The social account also used to comment on one another; But he was not yet comedited. According to FB, his relationship with the office was seen by the management of the office and both of them were afflicted, so one person was told to leave his job. This was a shock for both of them. They did not want to do such posting when they were not commuted; Because they decided to establish their relationship status before the management sealed them.

Chandan and Sadhana were in a dilemma all of a sudden to hurry to share everything on social media. He had not thought about the consequences of your posting in the future. Posting in the language of social media is called ‘digital footprint’. That means life experiences, memories or traumatized accounts. You can be called a digital album of what memories are remembered for going forward in life. Humans must be ‘social’; But he should have a limit. If you exceed the limit, the result will be affected by anybody.

It is the youth’s interest to go to where you eat, what to eat, whatever happens on the occasion. There are many reasons behind creating this virtual image, marketing yourself, show off. It is a virtual attempt to tell about the situation, the person’s personal experience, and how soon it is going on in our life, telling me how much fun I am. Then you can get real happiness in the moment or not, as soon as you get it, your updates are given in mobile hands immediately.

Mobile ‘Hacking’ beware!

Recently, many people prefer to surf the Internet from mobile phones. The number of internet users is increasing due to the cheap Internet access on mobile. That’s why hackers have now turned their mobile to mobile users instead of computers. Mobile cyber attacks are on the rise. In this situation, mobile security has become a key issue. In this regard we will learn about this article.

How Mobile Phone Get Hacked?

  • Mobile phones with GSM technology can be used to make hacking hardware comfortably, so that the phone gets hacked in hackers.
  • Mobile hacking is sent to hackers by some specific ‘link’ (malware) citizens, and citizens are asked to call mail and message sent on that link. Generally speaking, people are contacted by the government office and making contact with the citizens.

‘Cyber Stocking’ Be Watchful!

In this type of ‘Cyber Stocking’ the victim is harassed through the Internet.

Earlier, violence was being done by women on the basis of dowry, family violence, rigging, sexual harassment at work, and persecution by unilateral love, and now it has included internet harassment.

The internet continues to be the type of sending messages before sending or sending obscene messages to women; But now email has become a big medium for this. Blackmailing, threatening or attempting to engage in pornographic intercourse especially for girls, such type is being done more frequently than ever from emails. In most cases, the person who is close to or acquainted with the woman is familiar with it. However, this group is making ‘cyber stockings’ by creating fake accounts.

In this type of ‘cyber stocking’ the victim is harassed through the Internet. In such cases, making phone calls, doing bad things against a person or writing a sentence on his / her body. Most of the time, the culprit in this manner is a disloyal, one-sided love, but at times the humiliated person has done such a thing even with the feeling of vengeance. In this case, the victim’s personal information, family information, phone number and the victim’s diary can be collected by collecting information about it and using that information to hurt the victim. This type of personal information has also been posted on the Internet’s sex service or dating services website

Heads up: Your ATM card can be cloned

‘I am talking to bank officials, tell me your PIN number, your ATM card will be people’ and withdraw money from mutual banks. These phenomena are most common now. Many people are fooled by repeated information. Offer your account information on the phone. Fails. There has been a similar trend in the closing of the ATM card recently, as all the cases have reached here. Instead of believing the WhatsAppAwards forwards, you should learn how to use your Debit Card, how to use it, and how to use it.

‘On-line’ theft fad has increased a great deal. There has been a lot of fraud by ATM, Debit and Credit Card so far. There is not much success in catching ‘telefishing attackers’. Many people were cheated by buying this telefishing attacker online. Millions of rupees were blown away. It’s very serious. Now you have to take care of some of the rules regarding the ATM.

Do not forget that.?

  1. If you lose the ATM card, first contact the bank to block the card number.
  2. Apply in written format.
  3. If the information about the lost ATM, Debit, Credit Card is not communicated to the bank, then that card can be misused.
  4. Only after the lost ATM card has been blocked, apply for another ATM card.
  5. Do not tell anyone ATM card number or PIN number on the phone. Even the closest person
  6. Automatic ATM card handling. Even the nearest person should not give up except for an emergency.
  7. When you withdraw money at the ATM, exit the ATM if you get the instructions to complete the transaction.
  8. For missing PIN, the bank can apply in writing and get a new PIN number.
  9. Do not cloning your card anymore, so be careful not to cloning it.

What is the ATMs cloning?

 

As a convenience and security, everyone uses ATM cards It’s easy. But now all the data can be stolen by the account holder’s password. And on the basis of this information, thieves are deceiving the closing of the ATM card with the help of computer. Messages have been received on mobile phones in many cities to remove the mutual amount from their accounts. At that time, they were cheated. The complainants immediately complained to the police station. So they understood that this is the type of ATM cloning.

Today many ATM machines in many cities have Ram Bharose. Not being a security guard, the CCTV cameras being closed, all these things seem to be getting a snap to steal the thieves. It seems that this type is happening in many places.

How does cloning of ATM card work?

Many shops, petro pumps, hotels and showrooms have swapping machines for ATM or credit card payment. But often, what the thieves do is to get ‘scrmir machine’ to where the card is being placed. When the card gets to the main machine, the magnetic stripe scanner of the card is scanned.

And you’re typing a PIN to transfer. The exact pin number has a hidden camera in place. This means that the script machine is a stripe scan and the PIN number is displayed in the camera at the same time. Duplicate cards are made by imitating the magnetic stripe. Then, in any machine, it can be withdrawn if the PIN number obtained in this card and hidden camera is hidden. The climbing of the ATM card has exposed millions of rupees in many cities.

So be careful while swiping cards. Do not give your card to anyone. Bring a machine to yourself and ask them to swipe. Insert sharpness, pay attention to it.