There are many different ways that people commit fraud. In this article, we cover the different methods of fraud that people commit, and provide information on how you can protect yourself.
A typical example of social engineering is where a criminal pretends to need information in order to confirm your identity. To set up the pretext, the criminals often use prior research on social media to access personal information that is published online. Information can also be obtained in other ways, from a friendly chat at a social event to unsolicited telephone calls and emails. Armed with selected personal details, a criminal can appear very convincing and trick a targeted individual, by email or over the phone, into divulging further confidential information, such as confirmation of their passwords, mother's maiden name, place or date of birth, or account numbers.
Phishing is when criminals use various means to get you to reveal sensitive or confidential personal information. It always pays to be suspicious of any unsolicited emails, texts or phone calls which, for example:
Internet viruses can spread very rapidly via websites, email attachments, USB sticks or over a network. Once they gain access to your computer, they can steal any personal information you have stored there and use your contacts to infect the computers of your friends and associates.
This term can be applied to any programs that hide in your computer and collect up any personal details you have stored, and then circulate them over the internet to criminals.
Tailored to suit your needs