CA NeWs Beta*: CYBERCRIME

Search This Site

Sunday, February 3, 2013

CYBERCRIME

Our financial transactions have undergone a sea change in the last decade, thanks to the Internet. We can now pay our utility bills, buy clothing items from overseas and dabble in the stock market from the comfort of our homes.
But these added financial freedoms come with significant risk as well. According to computer security firm Norton’s ‘Cybercrime 2012’ report, 18 adults become a victim of cyber-crime every second. Consequently, 556 million adults globally were targeted on the Internet during the year – roughly half the population of India.
This does not mean you should abstain from Internet-based transactions altogether. Rather, you must take precautions just like you would when visiting your brick-and-mortar bank branch for a deposit or withdrawal.
We take a look at some of the common cyber scams that you are likely to be exposed to on a daily basis, as reiterated by the Reserve Bank of India.

‘You’ve won the lottery’

This scam can take a variety of forms, ranging from a winning lottery number (though you never bought a ticket) to a Saudi Arabian prince seeking to move a large cache of unclaimed funds with your assistance. Intimation of the “special deal” often comes from an email ID that looks genuine, but is fraudulent.
The catch is to access these “winnings” you have to pay a special transaction fee or clearance charge to an account. And once you do that, the cyber-criminal will do his best to milk more money from you.
It should be noted that remittance in any form toward lottery schemes is prohibited under the Foreign Exchange Management Act in the first place. This restriction also extends to remittances for money circulation schemes or for the purpose of securing prize money or awards.
So falling prey to this scam could also put you under the RBI’s eagle eye for FEMA violations. The best response to a fraudulent email is to delete it and use a filter to prevent such messages.

Phishing for information

‘Phishing’ is an attempt to acquire information such as usernames, passwords, credit card details and sometimes even money by posing as a trustworthy entity in an electronic communication. Phishing emails may contain links to Web sites infected with malware, or might direct users to enter their details at a fake Web site almost identical to the legitimate one.
One of the more recent scam emails doing the rounds is purportedly signed by RBI. The mail claims to offer a “new online security protection” dubbed ‘Netsecured’ through an attachment. Instead of securing the account, the software will steal your personal and banking information.

All that glitters…

Are you the recipient of an email promising you a new mobile phone at a throwaway price? Or have you visited a Web site where the prices of goods are lower than seems plausible? There are a few variations to the fraud, which could even be combined. Say you key in your credit card details into the site while making payment. In some cases, you may not be sent the product at all and lose your money. In others, your card details may be stolen and used to make purchases elsewhere. In a third scenario, you might be paying prices for cheap knock-offs or even stolen merchandise.
The first thing to remember is if something is too good to be true, it isn’t. When shopping online, check to see whether the site has a secure payment mechanism, such as Verisign or Paypal. Also, always use a card that has a low balance to offset any potential damage by fraud. Do a little Web research to find out other people’s experience with these sites.

A cold cyber-romance

Single and looking for a partner? The Internet may not be the best place to search, because unscrupulous cyber-criminals will have no remorse about playing with your feelings if they can get your money. Some common approaches adopted by cyber-criminals are to pose as a man or a woman looking for love just like you.
Initial email exchanges could even be done using ‘bots’, which are essentially bombarding hundreds of thousands of email IDs or Web chat accounts in the hope of getting a response from someone.
Once someone bites the hook, the cyber-criminal steps in to steer the conversation. And once your trust has been won, the requests for money will start, usually to pay for a medical emergency or a flight.

No comments:

Post a Comment

Related Posts Plugin for WordPress, Blogger...
For mobile version of this site click here


News Archive

Recommended Post Slide Out For Blogger