Social engineering is a technique used by criminals to gain access to your information. Social engineering scams can be both online (such as an email message that asks you to open the attachment, which contains malware) and offline (such as a phone call from someone posing as a representative from your credit card company, placing infected USB to install malware).
Phishing is carried out by e-mail spoofing or instant messaging and it often directs users to enter details at a fake website whose look and feel are almost identical to the legitimate one. Generally, phishing E-mails contain Spelling and grammatical errors and the associated link provided in the Email has different names from the actual website.
To avoid Phishing attack, be suspicious of unsolicited phone calls, visits, or email messages from individuals asking about your sensitive information.
Malware is short form for malicious software and used as a single term to refer to virus, spy ware, worm etc. Malware is designed to cause damage to a standalone computer or a networked pc. So, wherever a malware term is used it means a program which is designed to damage your computer. Strong Anti-Malware solution should be used to prevent spread of Malware.
Your computer may be infected if you recognize any of these malware symptoms:
This is a form of malware that locks computer files of users to demand ransom for access to those files. Ransomware spreads through phishing, Pirated Software and malicious websites. You can avoid being victim of Ransomware, If you do not click on suspicious links, do not install pirated/illegal software and ensure that your data is backed up on a regular basis.
Email spoofing is the forgery of an email header so that the message appears to have originated from someone or somewhere other than the actual source. Before clicking on any link/attachment in mail, verify sender detail.
Installing Application from unknown sources, granting mobile applications excessive permission, using open Wi-Fi network and sharing OTP may lead to loss of sensitive information and financial loss. We should not enable remote sharing on mobile applications and suitable anti-malware solution should be used.
Cybercriminals use USB charging ports available at public places to install malware, steal data or even take complete control of your device. This is referred to as Juice Jacking. We should disable data transfer feature on your mobile phone while charging.
A device called card skimmer is used to copy information from Credit Card/Debit Card. This information is used for online purchases or to clone the card for cash withdrawal. We should be careful while using your card at ATMs, public places and sharing card detail online.
Victims of Money Mule are used by fraudsters to transfer illegally obtained money through victim's Account. You should not receive money in your account from unknown sources. If money is received in your account accidently, you should inform your Bank and any reversal should be initiated by The Bank crediting money in your account. You should not return money directly to the person who claims to have accidently deposited in your account, instead "the person" contact his own bank.