Internet has become one of the integral part of our daily life. It has transformed the way we communicate, make friends, share
updates, play games, and shop. They are impacting most aspects of our day-to-day life. Cyberspace connects us virtually with crores of online users across the globe. With increasing use of
cyberspace, cybercrimes especially against women and children such as cyber stalking, cyber bullying, cyber harassment, child pornography, rape content, etc. are also increasing rapidly. To
stay safe in the online world, it is important to follow some cyber safe practices which may help in making our online experience and productive.
BEC is a tried-and-tested cyberattack method that costs consumers and businesses billions every year. So what makes BEC
such a prevalent cybercrime technique? Simply put: cybercriminals use BEC as a way to make social engineering attacks more effective. A social engineering attack is any form
of cybercrime involving impersonation. The attacker pretends to be a trusted person so that the target does what they’re told. According to Verizon’s 2021 Data Breach Investigation Report
(DBIR), BEC is the second-most common type of social engineering attack. In a BEC or other social engineering attack, the threat actor pretends to be a trusted person so that the target does
what they’re told.
With the growth of information and communication technology, the structure and nature of financial services delivery has also
changed. Online banking or internet banking has emerged as a new and convenient way for using financial services like funds transfer, viewing account statement, bill payment, use of
e-wallets etc. An upsurge in the use of devices connected with the internet and the convenience of online financial services has increased the risk of our hard-earned money being duped by
cybercriminals of our hard-earned money.
Identity theft is the act of wrongfully obtaining someone’s personal information (that defines one’s identity) without their
permission. The personal information may include their name, phone number, address, bank account number, Aadhaar number or credit/debit card number etc. Identity theft can have many
adverse effects. Let us look at some examples of identity theft. Hacking or gaining access to Social Media Accounts Misuse of photo copies of identity proofs Credit/Debit Card