Online Scams: What They Are And How To Avoid Them

Let’s see how the crime of fraud is declined in the online world and the differences with money laundering, to understand how to counter these phenomena

More and more often we hear about online scams that are direct consequences of the increase in commercial negotiations carried out through this channel. Therefore, let’s try to outline the main elements, specifying that online fraud is not an autonomous type of crime, but must be brought back to the general concept of fraud under art. Six hundred forty of the Criminal Code shows how even this type of crime can be charged with money laundering or self-laundering.

Online Scams During COVID Times

Let’s consider some of the latest types of online scams, some connected with the Covid-19 phenomenon.

Man-in-the-middle Attack

The technique consists of intervening between two subjects assuming one of them’s identity and having relations with the unsuspecting interlocutor to acquire confidential information and distraction of transfers and various payments.

In an online dialogue, usually for business reasons, a third person takes one of the two to extort money from the other confidential information and distraction of wire transfers and various payments.

“The most frequent method of carrying out criminal conduct – explain the postal investigators – is that of abusive computer access to email boxes and other accounts in use by the victim. The hacker is thus able to observe and intercept, managing the mail client personally through the IMAP Protocol, or to channel the emails from the interested party to a hidden folder, under his direct control, allowing him, without the knowledge of parties, to read, alter or modify the content of the correspondence “.

Phishing

For phishing, we mean the massive theft of digital identities through various emails that induce the victim to directly release their information tricks ( username, password and personal information ).

These computer scams aim to hoard personal data and, therefore, to extort money by deceiving.

Packaging and Invoice Spam

An email indicating the wrong purchase requires opening an attached pdf containing an exploit, which eventually transferred the Emotet Trojan to your device.

Online Ticket Scams

They are scams aimed at consumers who are tricked into buying fake tickets for sporting events or concerts (usually high profile). Fake passports tend to be duplicated or have a counterfeit barcode that does not allow entry, and in the worst-case scenario, no tickets have been issued.

Digital Extortion

Online scam used by criminal hackers to extort money from their victims through sexual blackmail ( sextortion ) carried out on social networks or through fake threatening emails.

For example, the scammer happened to say that he took control of your monitor and webcam and that he recorded both you and the pornographic material and created a video. And he threatens to send the video to everyone.

At this point, the scammer plays the part of the “good” and promises not to spread the video and to make everything disappear for the paltry sum of a thousand dollars in Bitcoin.

Online grooming is also part of this criminal activity. Online grooming is a slow process initiated by an abusive adult who uses new technologies to seek contacts, psychologically manipulating minors to build pseudo-sentimental relationships to induce and involve children in actual and tech-mediated sexual actions.

The phenomenon has experienced a recent progressive worsening of new technologies’ simultaneous diffusion among young and very young people.

Pedophiles are increasingly using social networks to identify their targets, taking advantage of the IT inexperience and the desire for protagonism of young people who expose a large part of their public and private life.

Online abusers identify the victims geographically more next, the preferred age groups, gender and attitudes most attractive.

Instant messaging (for example WhatsApp), which has currently almost wholly supplanted the use of SMS and MMS, has led online abusers to increasingly choose services such as WhatsApp as the theatre of attempts to “hook up” potential victims. , Snapchat, Telegram, favouring among these those that make it technically more difficult to identify users.

Many lurkers, groomers, dedicate themselves almost exclusively to this type of activity, favouring the techno medical dialectic with minors over contacts with other abusers to share child pornography material.

The priority interest of these subjects is to build a relationship that induces the minor in a state of psychological subjection such as to lead the victim to be increasingly collaborative and confident in the good intentions of the adult, colluding with requests for secrecy and preparing the ground to real encounters.

It is not uncommon for the abuser to send pornography and child pornography images to the boy/girl in the solicitation process, increase their familiarity with sexuality, and try to “normalize” the sexual actions required and more generally, sexual relations between adults and minors.

The sexual images that the victims are induced to produce by taking intimate photos or making short films with mobile phones can become a source of profit for the abuser.

An element of exchange and credit in pedophile circuits or be the subject of threats so that the minor accepts perform other sexual actions.

Fake Crowdfunding

This type of scam relies on people’s willingness to help someone in their time of need. Scammers will come up with some heartwarming stories while using crowdfunding websites.

TechSmashers
Tech Smashers is a global platform thatprovides the latest reviews & newsupdates on Technology, Business Ideas, Gadgets, Digital Marketing, Mobiles,Updates On Social Media and manymore up coming Trends.

RECENT POSTS

500 Million LinkedIn Profiles For Sale On The Dark Web

An archive containing data from 500 million LinkedIn profiles, including emails, phone numbers, and professional details. The Privacy Guarantor opens an investigation.

Here Are 7 Steps Test Before Choosing Used-mac

Choosing a second-hand mac can save your bucks but can be risky as heck. Certain loopholes or unauthentic login can send an...

5 Tips To Grow Your small Business

If you are the owner of a small business, you may not want it to become a large company. Of course, some...

Supply Chain Technology: The 6 Most Relevant Trends

Within Supply Chains, technology is becoming more and more complex. Here are the most relevant trends that managers need to consider for 2020 and...

Cybersecurity: What Awaits Us In 2021

The cybersecurity landscape has undergone significant changes throughout 2020 and has identified four critical trends that will need to be closely watched throughout 2021. In...

Sony Introduces The Ultra-Compact Speaker SRS-XB13

Sony introduces the SRS-XB13, a compact and portable wireless speaker capable of spreading sound virtually anywhere. XB13 delivers incredible audio in any context. Compact...

What Are The 3 Key Components Of Blockchain Technology

1. Peer-to-peer Networking Computers are connected through a peer-to-peer network. Blockchain technology lacks a centralized server that removes the control element that a company or...

How To Network Your Way To Success Using Only Your Phone

The phone has become one of the most useful gadgets in our lives. Whether we use it for games, social media, streaming or even...