Modus Operandi no video Cybercrimes PDF
Document Details
Uploaded by Deleted User
Tags
Related
Summary
This document discusses cybercrimes and how to prevent them, focusing on social engineering techniques. It explains various types of cybercrimes, like phishing, vishing, and sextortion. The document also provides tips for identifying and avoiding scams.
Full Transcript
Cybercrimes and How to Prevent Them Social Engineering Common Targets of Social Engineering Impact of Social Engineering Attacks on an Organization/Company Behaviors Vulnerable to Attacks Factors That Make Companies Vulnerable to Attacks Why is Social Engineering E...
Cybercrimes and How to Prevent Them Social Engineering Common Targets of Social Engineering Impact of Social Engineering Attacks on an Organization/Company Behaviors Vulnerable to Attacks Factors That Make Companies Vulnerable to Attacks Why is Social Engineering Effective v v Phases of a Social Engineering Attack Types of Social Engineering Types of Social Engineering Human-Based Social Engineering Human-Based Social Engineering Human-Based Social Engineering Computer-Based Social Engineering Computer-Based Social Engineering: Phishing - the practice of tricking Internet users (as through the use of deceptive email messages or websites) into revealing personal or confidential information Phishing Site / Online Transaction Phishing Site / Online Transaction Social Engineering Countermeasures Identity Theft Countermeasures CYBERCRIME MODUS OPERANDI Paradigm Shift of Crime TRADITIONAL CRIMES TO CYBERCRIMES FRAUD/SCAMS/ESTAFA O LIBEL THREATS N EXTORTION ROBERRY L IDENTITY THEFT I BULLYING ILLEGAL RECRUITMENT N VAWC HUMAN TRAFFICKING E PORNOGRAPHY (ILLEGAL) TERRORISM 30 Phishing Site / Online Transaction Phishing Scam Cybercriminal tries to trick you into believing you are logging into a trusted website that you normally do business with. This could be a bank, your social media account, an online shopping website, shipping companies, cloud storage companies, and more. Phishing Site / Online Transaction VOICE PHISING/VISHING Vishing—or voice phishing—is the use of fraudulent phone calls to trick people into giving money or revealing personal information. It's a new name for an old problem—telephone scams. Vishing frequently involves a criminal pretending to represent a trusted institution, company, or government agency. VOICE PHISING/VISHING Vishing—or voice phishing—is the use of fraudulent phone calls to trick people into giving money or revealing personal information. It's a new name for an old problem—telephone scams. Vishing frequently involves a criminal pretending to represent a trusted institution, company, or government agency. TEXT SCAM SMS SPOOFING SMS SPOOFING ROMANCE/LOVE SCAM ROMANCE/LOVE SCAM PIG BUTCHERING SCAM Pig Butchering Scam is a type of social engineering scam that combines love or romance scam with cryptocurrency investment. The goal is to build trust with the victim and incite them to invest in cryptocurrency. Once large money is invested, the scammer vanishes taking all the money. EMPLOYMENT SCAM Employment scams are a criminal form perpetrated by individuals or organizations posing as recruiters or hiring agencies offering or promising attractive jobs and big money to people seeking for job opportunities. Online Shopping Scam Scammers offer luxury items such as popular brands of clothing, jewelry and electronics at very low prices. Sometimes you will receive the item you paid for but they will be fake, other times you will receive nothing at all. Scammers will ask the victim to pay half the agreed price before sending the parcel. After the victim sent the money through Gcash, Paymaya, or Dragonpay, the scammer will block you and the parcel will not arrive ONLINE LENDING ONLINE LENDING www.npc.gov.ph ONLINE LENDING Cashmoney Loan Cashope Credit Peso Crazy Loan Happy Cash Lalapeso One Cash PinoyCash Pinoy Peso Qcash Utang Peso Super Cash Sell Loan SEXTORTION Cyber Criminal obtains nude pictures or videos from his/her victim, then blackmails them for money to avoid the publication of the nude material. SEXTORTION They will then threaten to release the sexual images, videos, or information in PUBLIC and will ask for MONEY in exchange for not posting or for SEX. HOW TO IDENTIFY A SCAM Pressure: You are pressured to make a quick decision, or you are threatened if you don't. Unexpected contact: You are contacted unexpectedly by a company or someone who claims to be from a government agency. Personal information: You are asked for personal or financial information, such as your Social Security number, bank account information, or credit card number. Unusual payment methods: You are asked to pay in unusual ways, such as with gift cards, prepaid credit cards, or Bitcoin. Urgent messages: You receive urgent messages that demand you contact the sender immediately. Spelling and grammar: The message contains poor spelling or grammar. Unusual email address: The message comes from an unusual email address. Odd layout: The message has an odd layout or contains weird characters or text. CYBERTIPS Be careful with personal information: Never share personal or financial information over the internet. Be alert to phishing scams: Avoid clicking on links or opening attachments in suspicious emails or texts. Don't respond to unsolicited messages or calls asking for personal or financial details. Use strong passwords: Use strong and unique passwords for all your online accounts. Resist pressure to act immediately: If you think you've been scammed, notify the companies you have accounts with right away. Protect your computer: Always run your anti-virus software regularly, and back up your data. Verify a site's security: Make sure the web address starts with "https://" to verify that the site is secure. Check out as a guest: When shopping online, check out as a guest to avoid the retailer THINK BEFORE YOU CLICK QUESTIONS? REMEMBER: When in doubt, Google is your FRIEND!