Skip to main content

Posts

Showing posts with the label Victims

WhatsApp Fraudsters Have Many Victims, Here's a List of the Latest Methods for 2024

WhatsApp Fraudsters Have Many Victims, Here's a List of the Latest Methods for 2024 Photo: cover topic/whatsapp looking for money/Aristya Rahadian Krisabella  - Online fraud often occurs. The perpetrators used many things, including WhatsApp, to ensnare their victims.  WhatsApp is known as a platform that is widely used in the world. The platform, which is a subsidiary of Meta, is also often used by users in their daily activities.  Most scams via WhatsApp make use of APK files that are randomly sent to other people's cellphone numbers. The goal is for the chat recipient to click and download the file and then unknowingly install the malicious application on their cellphone.  This method of hacking, known as phishing, is similar to the crime of sending links via email. Online fraudsters hope that the recipient of the email or WhatsApp will provide access unknowingly so that their cellphone or financial account can be taken over or hijacked.  For more details,

New Fraud Mode 2024 Horrifying, Victims May Be Unaware

New Fraud Mode 2024 Horrifying, Victims May Be Unaware Photo: Infographics / WA Fraudsters are Rising, Draining Accounts, Kominfo Reveals Their Methods / Ilham Restu  - IBM's annual X-Force Threat Intelligence Index report highlights the emergence of a global identity crisis as hackers continue to act to endanger users around the world.  Based on observations of more than 150 billion security events tracked daily across IBM, Red Hat, and Intezer, the report comes down to the fact that cybercriminals are finding more opportunities to log in than to hack corporate networks through valid accounts.  "Logically, being able to access an account without having to hack it is much easier than hacking it, because the report notes that obtaining credentials is the preferred option for threat actors," wrote the report quoted from Siliconangle, Thursday (22/2/2024).  IBM's findings indicate how willing perpetrators are to compromise their victims' credentials