The term ” online fraud ” refers to any type of fraud scheme that e – mail , websites , chat rooms or bulletin boards used to present fraudulent requests to prospective victims , to conduct fraudulent transactions , or to transmit benefit fraud to financial institutions or other persons who have ties to the regime .
- Internet banking fraud
Internet banking fraud is fraud or theft using online technology to attract money illegally or to transfer to another bank account . Types of banking fraud phishing and Internet recruiting mules , and may occur via your smartphone , tablet and other mobile devices .
Building on their computer, tablet or smartphone is so convenient and banks to protect their accounts. With advanced software systems Criminals know that it’s hard to beat these systems and focus on the customer directly encouraged victims to reveal their confidential information.
Avoid becoming a victim by knowing how to protect your data and mobile devices and understand how criminals use scams to try to deceive people.
Phishing involves the use of a form of spam to fraudulently access to bank information to get on the Internet. People The term phishing refers to the use of spam e – mails to be from a bank to fish ” criminals purporting to customers free of the information session legitimate bank.
Criminals send millions of these fraudulent e – mail addresses at random in the hope of attracting innocent unsuspecting people to provide their personal banking information e – mails.
Typically , a phishing e – mail in which an Internet client to a link to a fake bank site and go to follow their personal banking information .
If the link is followed , the victim often download a malicious program that captures his / her keyboard strokes including written , such as banking passwords and sends information to a third party.As and leads to bank customers e – mails, internet phishing can target online auction sites or other means of online payment.
Legitimate banks do not send . These e – mails to your customers
What you can do
It is also important to make others aware of these e – mails to and encourage not respond to requests for personal information to them . Some e – fraud / scam may seem very convincing , so their effectiveness for offenders .
Delete it without opening it . Treatment of phishing e- mails as spam Spam messages are proven for spreading viruses and other unwanted programs method.
If you think you have suffered and lost money as a result of phishing activities , please immediately contact your financial institution .
‘Nigerian letter’ or ’419′ scams, as well as ‘lottery’ or ‘Spanish lottery’ scams, attempt to lure victims into a type of fraud known as an ‘illegal advance fee’. They typically arrive via email.
Criminals send out millions of these fraudulent spam emails to random email addresses in the hope of enticing someone to respond.
Although the stories in these scams vary widely, after an initial exchange of conversation or emails with the victim, they all usually ask victims to provide bank account or personal details in order to receive a fictitious financial windfall.
The promised windfall may be lottery winnings, a huge inheritance, a multi-million dollar bank transfer, etc. While the windfall payment is never made, victims pay large sums of money to cover various false costs and fees.
is unsolicited commercial messages sent via email, SMS, MMS and other, similar electronic messaging media. They may try to persuade you to buy a product or service, or visit a website where you can make purchases; or they may attempt to trick you into divulging your bank account or credit card details.
If you receive a suspect email, the best course of action is to delete it immediately. Do not follow any links, or reply to the sender. By following a link, you may accidentally download a ‘Trojan’ or ‘key logging’ program, which could compromise your security. By replying, you run the risk of receiving more emails from this source.
A large part of online crime is now centred on identity theft which is part of identity fraud and specifically refers to the theft and use of personal identifying information of an actual person, as opposed to the use of a fictitious identity. This can include the theft and use of identifying personal information of persons either living or dead.