Tech News

Five tips to recognize fraud in social networks and WhatsApp

It is a mistake to believe that cyberattacks happen just like TV movies. hackers. In real life anyone can be a victim, moreover, the attacks are so simple that they go unnoticed by most people.

[article_mb_code]

Cyber ​​attackers are a wolf in sheep’s clothing that takes advantage of ignorance to deceive and take advantage of others. They use social engineering strategies to benefit from people not verifying the offers, links, accounts, contests, among other things they see on the Internet.

A person who is unaware that cyber attackers impersonate real sites and offers can easily fall for scams, so here are Five tips to recognize fraud in social media Y WhatsApp, since they are the favorite places to attack.

Promotions and contests

[article_mb_code]

According to the Spanish Department of National Security (DSN), cyber attackers want their victims to click on their malicious links at all costs, therefore, on many occasions they pose as irresistible contests and promotions.

If you receive the message of a won prize, you should be suspicious, especially if you are not participating in a contest. It should simply be ignored if it says that in order to deliver the supposed gift it is necessary to share “something” with friends, fill out a form with personal data, make payments, make a subscription or accept confusing legal bases.

WhatsApp hijacking

[article_mb_code]

You can recognize this scam because unexpectedly received a verification code of the app via SMS to set up the account on a new device. Under no circumstances should the code be given to anyone, not even someone claiming to be a family member in distress.

fake accounts

Another of the strategies of cyber hackers is to impersonate companies or influencers, so before clicking on any link, you should first check that there are no other accounts with a similar name and content, since it is possible that it is a cloned profile.

It should not be trusted if the account with which the interaction was had does not have the blue verified account arrow, shares links from unknown websites or that are not related to the original, as well as if its messages appear to be generated by a bot or requesting support from his followers.

Sextortion and couples

[article_mb_code]

This is another common strategy but just as effective, since there never stops to be people who fall into this trap. It is characterized by using open profiles of attractive people. They often use photos stolen from other accounts and are interested in interaction.

Once establish communication pretend to have the same tastes, hobbies and more to win affection. When the victim trusts them, they begin to ask for economic favors under any pretext, they also ask for intimate photos or videos, but later they ask for money in exchange for not revealing them.

Fraudulent store ads

It is very common that attackers clone official pages of e-commerce to then send promotions to their potential victims, who may not realize that they are apocryphal by not paying attention to them.

They are dangerous because are spread on social networks with very attractive promotions of well-known brands, however, the URL or link of the store does not have to do with the original. The images of the products are of low quality, the descriptive information is scarce, but above all, the payment methods are strange, for example, They provide forms to enter bank details without giving options such as PayPal.

Due to the fact that scams are more common than people think, it is recommended not to believe in very good offers, to be wary of pages that are not very elaborate or that are not related to it, and to be alert to misspellings, since they could be signs that they are fraudulent pages.

:

Tags
Back to top button