online fraude
Internet fraud is making use of online services and software which have access to the internet to steal your money. They mostly try to steal your money by using the internet or e-mail and then use a different identity , use phishing or other hacking activities . internet fraud can be broken down in different kind of attacks , including :
different kind of cyber attacks |
information |
---|---|
Phishing | phishing is basically where they use e-mail or other kinds of online messaging to trick victims into giving their personal , financial detail or other kind of private information |
Data breach | data breach is when a person steals protected or sensitive data from a secure location and putting it into an untrusted environment like for example the dark web which if you want to know more about the dark web press on this link . this includes data being stolen from users and organizations |
Denial of service | denial of service or how some people call it DOS attack which if you want know more about that press on this ![]() |
Malware | malware is when a person uses malicious software like for example viruses . They use these malicious software to disable your device or to steal personal data . another form of malware is ransomware click on here to know more. |
Business e-mail compromise | business e-mail compromise or how most people call it BEC hackers trick businesses that often send wire transfers . they do this by breaking into real e-mail accounts using methods like phishing once they have access they act like their a trusted person like a boss or a supplier and sent a fake payment request . Since the e-mail looks real the employee may not suspect anything and pay the pay request . This method of internet fraud is very high risk high reward that can cost a business a lot of money |
Ransomware | : ransomware is a type of malware that prevents users from accessing their private and critical data and then the hacker than demands an payment in the promise of restoring the data they took . This mostly done via a phishing attack |