Tag: Online safety

  • Cybercrime: Scammers dupes Muzaffarpur businessman of Rs 89.90 Lakh; Know How To Be Safe |

    New Delhi: Cyber ​​fraudsters defrauded a Muzaffarpur businessman of Rs 89.90 lakh by alleging his involvement in a money laundering case, an official reported on Saturday. The victim has lodged an FIR at the Muzaffarpur cyber police station, and the Bihar Police’s cyber cell is currently investigating the matter.

    According to the FIR, the victim received a call from an unknown number. The caller, posing as a Telecom Regulatory Authority of India (TRAI) official, claimed that the victim’s phone number would be disconnected within two hours. The caller further informed the victim that another mobile number (8945392862) was active under his Aadhaar documentation and had been used to send illegal messages.

    He stated that an FIR had been registered in Tilak Nagar Police Station in Mumbai and the victim had to appear before the officers. The caller transferred the victim’s call to another number (+91 7453951616) and a person wearing a police uniform interacted with him via a video call.

    “That man in the police uniform claimed to be an officer of the Tilak Nagar Police Station and he took the victim’s statement. “He also informed him that a bank account had been opened in Canara Bank using his Aadhaar number and that account was used in the money laundering case of one Naresh Goyal with illegal transactions to the tune of Rs 2.5 crore,” said Seema Devi, DSP. of cyber cell Muzaffarpur.

    “He further informed the victim that an arrest warrant had been issued by the Supreme Court and asked him to appear at the Tilak Nagar Police Station. When the victim expressed his inability to reach Mumbai on such a short notice, the caller asked him to upload the details of the source of his earnings on the website of the Supreme Court. That caller also gave him a link http://www.main-scoi.in/,” the officer said.

    “When the victim opened the link, an arrest warrant was shown in his name. Hence, he uploaded his bank details on that website. Soon after, the cyber conmen withdrew Rs 89.90 lakh from his account. The victim lodged an FIR on July 24 and we are investigating the matter,” she said.

    The DSP did not reveal the name of the victim and said that four other FIRs had been registered in Muzaffarpur where fraudsters had used the same modus operandi to dupe people.

    Here’s How To Be Safe from Cyber ​​Scams

    If you want to avoid cyber scams, then you have to use strong passwords, enable two-factor authentication, avoid suspicious links, keep software updated, and be cautious with personal information. It is important to note that TRAI doesn’t make such calls. (With inputs from IANS)

  • ‘Hackers adore it’ when you are making those 6 largest password errors, says safety knowledgeable

    Greater cyberattacks in 2022 have created a high-risk web panorama. However for many of us, hitting “refresh” on their password behavior nonetheless is not a concern.

    As a cybersecurity marketing consultant, I persistently pay attention tales about other people getting their non-public data stolen as a result of they made a easy mistake like the usage of the similar password for a couple of web page logins.

    After two decades of finding out on-line legal behaviors, techniques, tactics and procedures, I have discovered that hackers adore it when other people make those six password errors:

    1. Reusing the similar password.

    Greater than two-thirds of American citizens do that, nevertheless it simplest lets in information breaches to stay bad for years when they occur.

    To steer clear of growing a brand spanking new password for each account, other people additionally have a tendency to reuse passwords with slight permutations, like an additional quantity or image. However those also are simple for hackers to bet, and they are no fit for tool designed to briefly check iterations of your password.

    What to do: Increase distinctive passwords for each and every of your accounts. Whilst this may increasingly really feel daunting, password managers generally is a giant lend a hand in designing and organizing your password library.

    2. Most effective growing distinctive passwords for ‘high-risk’ accounts.

    Many customers simplest create distinctive passwords for accounts they consider elevate delicate data, or that experience a better probability of being breached, like on-line banking or paintings programs.

    However even elementary consumer data that lives on “throwaway” accounts can comprise information issues that fraudsters use to impersonate respectable customers. Simply your electronic mail cope with or telephone quantity on my own may also be precious to unhealthy actors when mixed with stolen data from different breaches.

    What to do: Offer protection to all accounts — even those you hardly ever use — with one-of-a-kind passwords.

    3. No longer the usage of password managers.

    Along with multi-factor authentication, password managers are very important applied sciences that may toughen good password behavior.

    Those managers let you create distinctive, single-use passwords and auto-fill them within the accounts they’re tied to — a large leg-up at the 55% of customers who set up passwords by means of reminiscence on my own.

    Even though you by chance click on on a phishing hyperlink, your password supervisor can acknowledge the discrepancy and select to not auto-fill.

    What to do: Make a choice a password supervisor that matches your own convenience stage and era wishes. A couple of credible possible choices which can be robotically well-reviewed come with 1Password, Bitwarden, Dashlane and LastPass. Whilst all of them be offering equivalent capability, each and every one differs in prolonged options and price.

    4. Developing easy passwords that comprise non-public data.

    The most productive passwords don’t seem to be essentially complicated, however they’re laborious to bet. Passwords that give you the excessive coverage are non-public to you and do not comprise simply gleaned data, corresponding to your identify and birthday.

    For instance, sturdy password foundations is also a favourite tune lyric or your go-to order at a cafe.

    What to do: Design passwords which can be a minimum of 12 characters lengthy and steer clear of the usage of non-public data that may be simply guessed. They will have to even be memorable to you and comprise numerous characters and emblems.

    5. Opting out of multi-factor authentication methods.

    Even essentially the most difficult passwords may also be compromised. Multi-factor authentication creates an additional layer of coverage by means of requiring verification past your username and password each and every time you log in.

    Maximum regularly, that is finished via one-time passwords despatched to you by means of SMS or electronic mail. It is an additional step, however it is properly price it — and it creates any other hurdle for attackers to leap via.

    What to do: There’s no manner so as to add two-factor authentication to products and services that do not natively be offering it, however you will have to flip it on anyplace it is supported.

    6. Being apathetic about password behavior.

    It is simple to suppose cyberattacks would possibly not occur to you. However for the reason that information breaches and different cyberthreats elevate a excessive threat of id robbery, monetary loss and different serious penalties, it is best to organize for the worst-case state of affairs.

    So long as you are an web consumer, you are going to all the time be a possible goal — and apathetic password behavior spice up your threat stage even additional.

    What to do: Do not suppose you are secure. Stay reevaluating your password hygiene and when new authentication applied sciences come alongside, and undertake them early.

    John Shier is a senior safety marketing consultant at Sophos, and has greater than 20 years of cybersecurity revel in. He’s protective shoppers and organizations from complicated threats. John has been featured in publications together with Reuters, WIRED, CNN and Yahoo. Practice him on Twitter @john_shier.

    Do not pass over: