Originally posted 2017-06-10 07:21:52.
The global report of online criminal activities are increasing by the day and most of them do occur through emails and social media. Securing your devices and yourself from these activities is a concern to everyone using all gisttime websites and one of the ways to be secure is by understanding the working technics of these criminals, which we shall be revealing to you through this post and other subsequent posts similar to this under the online technical services categories.
If you regularly open your email accounts and conduct some confidential transactions with them, then you need to relax and digest every content of this post. In other hands, if you are a regular user of social media and using them as means of gaining direct contact with people you equally need to relax and digest these few information I will drop in this post.
One of the popular techniques of cyber criminals is impersonation, what is online impersonation? Impersonation simply means identifying one’s self with another person identity who may be popular or possibly someone the target supposed to know in other to create a good interactive means with the target. This method was the initial means used to get men seeking female relationships online, by most of those criminals impersonating pictures of beautiful girls and most times having female voices to back it up when it leads to direct phone contact, the prey usually fall into this trap when the request for a visit is made by the man and money will be requested for transport fair, the moment the attacker receives the money, the goal had been achieved and the account may be deleted or another victim may be focused on for a possible positive result. The only way to avoid this time of online criminality is by taking time to view the account details of the impersonating account, check the timeline activities of the account, the number of photos in the account having the same face, does the photo reveal different stages of facial advancement of the owner, check the phone number provided with true caller app, confirm the account number given with the social media account name, how many friends does the account have, if any mutual friend is seen try contacting the mutual friend and ask question relating to the person, with all these techniques you may get a good standing position to know if the account is impersonating or not.
Another means the cyber criminals carry out their activities is by sending you message of SOS by telling how the mother or father is sick or suffering from any chronic illness such as cancer and pleasing with you for financial support, in advance level this technique may lead to such criminals prompting you to per by dropping your credit card details which are very risky since such will definitely render your bank account vulnerable to attacks. To curtain this, delete any message from any unknown person seeking for payment by asking you to insert your credit card details.
Another popular means usually seen in email inbox, is email received from unknown person claiming that someone that bears similar surname like yours had just died in one country leaving behind properties worth billions of dollars and has no one to go and claim those properties, hence you will be asked and cajoled through the mail to identify yourself as one of the relatives of the victim so you can come over and claim those properties..haha!!, funny. The moment you agree you will be required to make some payments relating to your traveling document and fees, and if you pay that ends the whole interaction. Your money will be gone.
Another means reigning currently is attaching a spyware in an email sent to you and finding any possible way to prompt into downloading the attached file, though they may not call it downloading some may say upgrading your operating system of a particular software, the truth is that the moment you click the attached file it will be downloaded into the browsing device and hence monitor any activity the device is performing including the username and password input of any website the device will visit. To avoid this trap, do not click on any attachment from an unknown mail sender even when the mail content is mentioning the name of people, company, or website you may know, if the email address bears no such claimed names before the “.com” directory then it may be a suspicious attacker hence do not open any attached file accompanying such mail.
There are many techniques used by cyber-criminals, but we shall be limiting this post to the ones listed above, our next post in this category will reveal more.