Translate

Welcome

Updated once a month

Learn examples of Cyber Scams so you can protect yourself

Cybercriminal


2 mins fix: If you don’t have time to read this, know U.P.D.A.T.E 

Update everything.

Use unique long passwords.

Download as few as possible from official sources

Administrator — use low privilege computer user account for your web and email browsing.

Turn off your computer daily.

Encrypt your sensitive data.

If there are any keywords that you don’t know, Google the keywords: “Define virtual private network”, Who are cybercriminals?

Cybercriminals

International crime syndicates operate in every country from every ethnicity; from every gender; from every age group; from every occupation based on prison and police worldwide databases.

People often turn into crime for economic survival. Other reasons for committing crimes are crimes of passion. 

What do cybercriminals what from you?

Your trust, your name, address, driver licence no., date of birth and especially your bank account details, and all additional personal information.

What are examples of Cybercrimes?

Take your identity, sex photos or health data to blackmail you, steal your info (credit card numbers, music, software & videos) & money, erase info and ransom to you, take your passwords to hack other systems, confidential work info to make illegal stock trades based on insider info, info about upcoming travel plans that may be used to plan robberies of your home.

Take your business data to sell to competitors, leak data to the media, leak data covered by privacy regulations so you will be fined, access your human resources data to sell to your competitors to hire away your staff. Steal data to avoid paying a software license. Stealing research data.

Disrupt work systems to reduce their workload or destroy their promotion competitors.

Seek vengeance for not receiving financial rewards by the business for their hard work.

Plan on resigning from the company so they steal data that will be valuable in their next job.

Plant a time bomb virus to auto wipe victim’s computer in x years or when victim execute commands to reformat computer?

Hacker makes your “cut” data disappear from clipboard manager to result in your data loss of valuable information. You should always “copy” data.

Accessed government officials and CEOs data at the server end to learn secret information to do insider trading.

Intercept communications to sow discord via text messages.

Hacked job portals to silent block victim’s CV from reaching employers thus making victim unemployed and homeless.

3D body scanners to make custom apparels to use to make a duplicate impersonator of you via plastic surgery and Hollywood cosmetics

Smart baby monitor for hackers to know how to kidnap your baby or influence your baby’s developmental thought processes.

Re-identifying anonymous people in school and university entrance exams for demographic anti-selection.

Use Voice Print Tech for criminals to clone your voice.

De-pixelating tech against pixelated images to mine confidential info.

Boston Dynamics sophisticated robots to replace human workers.

Send marketing emails that impersonate retailers to victim where victim clicked on the marketing email’s unsubscribe hyperlink where the underlying link code is switched to direct the victim to the fraudster’s fake retailer’s website to mine victim’s personal info and banking logins. 

Human Errors — What are the examples of human errors that reduce cybersecurity effectiveness?

You accidentally delete info, accidentally misconfiguration of your computer systems thus disabling security technologies, &, infect a computer with viruses.

How can you protect yourself and your family?

You must be able to think like a criminal.

Don’t link your phone to smart TV to reduce risk of hack as your smart TV have no anti-virus app installed?

Cybercriminal’s email and phone calls are usually in broken English and poor grammar. This is a red flag.

Instead of wasting days or many hours to troubleshoot a hacked computer, just move your data to your SSD drive, reformat & download new OS in one hour. You just watch TV while waiting.

Google “How to protect yourself against hackers” & borrow a free book from the library “Cybersecurity for dummies.”

Google “SIM Hijack.”

Another interesting article:

How to protect yourself when you visit “sensitive” websites

What do you think? Let me know your thoughts. I will also much appreciate it if you will share this with your family and friends. :)

Thank you

Useful resources:

Never accept a cheque or money order for payment that is …. https://www.coursehero.com/file/p2mo0gpp/Never-accept-a-cheque-or-money-order-for-payment-that-is-more-than-what-you/


The main sources of malware infection. https://support.kaspersky.com/789


Cyber Awareness | Security Centre — HSBC AU. https://www.hsbc.com.au/help/security-centre/cyber-awareness/


11 creepy technologies that exist today and will keep you …. https://www.businessinsider.com/creepiest-technologies-tech-examples-ai-2019-8


Protect yourself against Phishing | HSBC UAE. https://www.hsbc.ae/help/protect-yourself-against-phishing/


Fraud Guide — HSBC CIIOM. https://ciiom.hsbc.com/help/security-centre/fraudguide/


Identify theft is a threat in every scam. https://www.islandandsurrounds.com/single-post/2018/08/27/Identify-theft-is-a-threat-in-every-scam


17 Things That Make You Vulnerable to Internet Scams …. https://bestlifeonline.com/how-scammers-work/


Protect yourself from scams | Scamwatch. https://www.scamwatch.gov.au/get-help/protect-yourself-from-scams


The Little Black Book of Scams. https://www.accc.gov.au/system/files/1557_Little%20Black%20Book%20of%20Scams%202019_FA%20WEB.pdf


How you recognize male scammers. — DelphiFAQ. http://www.delphifaq.com/faq/male_scammers/f6250_31.htm


Bukit Panjang NPC, No 1 Segar Road #01–05, Singapore (2020). https://www.govserv.org/SG/Singapore/444366035649595/Bukit-Panjang-NPC


Scam quiz question descriptions — Consumer Affairs Victoria. https://www.consumer.vic.gov.au/resources-and-tools/scams/scams-quiz/question-descriptions


Dating And Romance Scam — WASPADA SCAMMER CINTA. https://waspadascammercinta.wordpress.com/2016/01/23/dating-and-romance-scam/


Tech support scams and how to avoid them — Stay Safe Online. https://staysafeonline.org/wp-content/uploads/2017/09/Tech-support-scams-and-how-to-avoid-them.pdf


The Henry Ford Blog — The Latest on American History …. https://www.thehenryford.org/explore/blog/tag/civil-rights/


Betting & sports investment scams | Scamwatch. https://www.scamwatch.gov.au/types-of-scams/investments/betting-sports-investment-scams


Rental scam — Consumer Affairs Victoria. https://www.consumer.vic.gov.au/resources-and-tools/scams/consumer-scams/rental-scam


Someone accessed my imessage and made a group. They then …. https://www.reddit.com/r/cybersecurity/comments/fslzf4/someone_accessed_my_imessage_and_made_a_group/