Classic lies you should not let a cyber criminal use on you

  • 1
    Share

Cyber criminals can devise various ways to get what they want from you. Manipulating people into carrying out certain actions or giving away confidential information is known as Social Engineering. And this is a rampant form of exploitation. Why? If you can get access to anything you want just by deceiving someone, why waste time creating a highly technical and sophisticated hack?

So, how exactly do cybercriminals execute social engineering tricks or lies?

  • Advertisements and Emails – These usually grab attention with their subject lines or body text.

one

  • Phishing – Cybercriminals pose as genuine entities (a renowned bank or finance institution etc.) in order to extract confidential information through emails.

phish

  • Hoaxes – Typically known as the 419 scam, hoaxes are something that cyber criminals use to extract money or sensitive details. In this case, a cybercriminal would hack into accounts and message the person’s friends claiming to be trapped in a foreign country with no money. Other tricks/lies might include a question that piques the user’s interest and then directs them to a fake login screen. Criminals may be looking for your account information in order to send spam or to pull off a 419 scam.

hoax

  • Some of the hoaxes also include cashing on a panic attack or a recent endemic or natural calamity. For example, fake Japan Tsunami posts that came up everywhere on Facebook and Twitter after the calamity. The goal is to cheat individuals into submitting donations for relief efforts.  People who end up donating to these sites often find their credit card information and money stolen.The classic ‘Your account has been deactivated or blocked’ or ‘You have won a lottery’ emails also fall into this category.

hoax2

  • Shoulder Surfing – Looking over someone’s shoulder and writing down Logins or ATM PINs.
  • Tailgating – “Sneakers” use the ‘I’m late and in a hurry. Please let me in.’ phrase to create urgency and or physically follow someone into a restricted access area.

Businesses small and big or individuals, almost everyone is a target of these scams and social engineering tricks. Keep yourself updated and aware of such threats and risks. One of the best ways to avoid online tomfoolery is to install a good security software that warns, detects and blocks malicious sites or malware execution.

 

Soumya Patnaik

Soumya Patnaik


72 Comments

Leave a Reply to Zeba Azeez Cancel reply

Your email address will not be published.

CAPTCHA Image

  1. Avatar Onil S SonawaniApril 16, 2013 at 10:03 AM

    Hi,

    Thanks for a great article.

    Reply
  2. Wow really gr8 info regarding “Cyber Criminals” and how to identify this crimes.
    Rally thank you so much.

    Reply
  3. Avatar Paromita PaulApril 17, 2013 at 1:36 AM

    The article will be very helpful in detecting cyber crimes…Thank You so much for informing about all this….

    Reply
  4. how can i learn cyber crime course from u…………..is their any chance of that…i m not great in studies but i can try…

    Reply
  5. Avatar LIYAKATALI DAKEApril 17, 2013 at 7:30 AM

    Thank u for giving awareness regarding cyber crime

    Reply
  6. Avatar Zubair AlamApril 17, 2013 at 7:44 AM

    Great information about cyber-criminal.
    Thank you very much for sharing this with us.
    hope you will always share your knowledge with us.

    Reply
  7. Avatar Arvind RathodApril 17, 2013 at 7:56 AM

    A must read for all the quick heal users, unfortunately they rarely see the message which pop up. Just worried about the day when a infected QH pop up a hacker message :). Difficult to happen but not impossible.

    Reply
  8. Avatar Shabrez KhanApril 17, 2013 at 8:53 AM

    thnx 4 this information

    Reply
  9. Avatar Bharat kariaApril 17, 2013 at 9:05 AM

    how exactly do cybercriminals execute social engineering tricks or lies?

    Reply
  10. Thanks soumya and Quick heal for the great article about cyber crimes. Thanks a lot.

    prasad

    Reply
  11. Avatar AMITABH PATNAIKApril 17, 2013 at 9:38 AM

    oh good to share the information, thanks you might from orissa.I have little knowledge of computer facing lot of problems in my office

    Reply
  12. Avatar LEKH RAJ GOGIAApril 17, 2013 at 9:40 AM

    THIS IS HIGHLY INFORMATIVE & USEFUL. WE SHOULD STOP FLAUNTING OUR PROSPERITY IN THE MANNER OUR NEW GENERATIONS DO. THEY SHOULD ALWAYS BE ON GUARD

    Reply
  13. Avatar dr. m. s. ghoshApril 17, 2013 at 10:14 AM

    ciber criminal should punish strongly. International rule should made accordingly

    Reply
  14. these kind of warning r very useful for us to be a3ert nd careful in future. thks

    Reply
  15. What about our cyber laws? Why are these people not prosecuted? Pity, should do something.

    Reply
  16. Avatar Vikas WaskarApril 17, 2013 at 10:53 AM

    Indeed a nice and informative article about cyber crime. But most of the times we fail to identify fake sites looking as similar to original sites like banks. Please do write the articles on how to identify such sites. Thanks Soumya and QH team for this eye-opener.

    Reply
  17. Avatar ilyas kalwatarApril 17, 2013 at 11:05 AM

    thankssssssssss……
    Great information about cyber-criminal
    Thank you very much for sharing this with us
    hope you will always share your knowledge with us

    Reply
  18. Avatar Bharat Kumar DhanawatApril 17, 2013 at 12:10 PM

    That’s really educative. It’s really useful and protective. Thanks.

    Reply
  19. Thank you very much for sharing this Gr8 information about cyber-criminal.
    with us.
    hope you will always share your knowledge with us.

    Reply
  20. Avatar Gaurav SharmaApril 17, 2013 at 12:50 PM

    hi,
    thank you very much for this info.
    good job
    keep up the gud work.
    gud luck

    Reply
  21. Hi, good piece of info thanx a ton
    regards bye tc.

    Reply
  22. Avatar Zeba AzeezApril 17, 2013 at 1:24 PM

    hey! thanks great stuff,thanks for the warning on all these kind of Cyber Criminals!
    once again thank u soooo much,great advice!really helps!

    Reply
  23. Avatar Ramsingh yadavApril 17, 2013 at 2:03 PM

    Great information about cyber-criminal.
    Thank you very much for sharing this with us.
    hope you will always share your knowledge with us.

    Reply
  24. Avatar Ramsingh yadavApril 17, 2013 at 2:05 PM

    please send me informations every time thank you

    Reply
  25. I hesitate to click on the pop ups but not so when it is from Quickheal. Good information.

    Reply
  26. Thanks for the article.

    Reply
  27. hi, thanks for publishing regarding the cyber crimes. yes, i do get mails from many years and sms every week. anybody who gets these type of mails / sms’s should be very much careful and not to share his / her personal details to unknown person. yet many people fall on this trap. once again thanks for sharing this message.

    Reply
  28. Thanks for suggestion

    Reply
  29. Nice, Very informative information.

    Reply
  30. Avatar Dr Mahesh PatelApril 18, 2013 at 9:04 AM

    Hi
    Thanks for information through great and Helpful Article.
    Thanks

    Reply
  31. Avatar Dr Mahesh PatelApril 18, 2013 at 9:09 AM

    Hi Thank u for help through Great Article

    Thanks

    Reply
  32. Good information……………

    Reply
  33. Avatar Mishra S.N.April 18, 2013 at 4:55 PM

    An useful Article on Cyber Crime…………..Must read.

    Thanks Soumya for posting.

    Reply
  34. what actually a hoax is…?
    does an antivirus program provides protection against hoaxes..?

    Reply
    • Hi Nitish

      Hoaxes as described in the article are tricks, these websites and emails are designed to trick you into disclosing personal information such as bank account details, passwords or credit card numbers.
      The key here is to be aware and learn more about such fake websites and emails. And yes, a multilayered security software also helps you in staying safe online.
      Regards,

      Reply
      • Is there anywhere to complain (For eg email id of cyber police etc.) if we receive phishing or specific mails for e.g. I got an urgent message on my mobile to mail someone as they posed to be my prospective client. This way they replied back to me and I could not identify the same as spam.
        Regards,

        Reply
  35. Thanks! The internet is an ocean of predators,safety and privacy is always a problem. Keep up this good work.

    Reply
  36. This is a nice and informative article about law of cyber crime. But most of the times we fail to identify fake sites looking as similar to original sites like govt/ banks. Please do write the articles on how to identify such fake sites. Thanks Soumya

    Reply
  37. Thanks. This information is very helpful,keep updating us please.

    Reply
  38. Avatar Arabinda SaikiaApril 19, 2013 at 10:16 AM

    Nice information !

    Reply
  39. Avatar Amrit PaikarayApril 19, 2013 at 11:37 AM

    Good effort to make people aware. Please keep it up. Also pleased to see that queries raised are also attended. Thanx.

    Reply
  40. Avatar Mahendra SurveApril 19, 2013 at 11:45 AM

    Great & useful information about cyber-crime. Thanks a lot.

    Reply
  41. thanx 4 telling me….

    Reply
  42. Hi
    thanks for information.
    Regard
    jitender

    Reply
  43. Thanks ma’am, it was informative. Good job.

    Reply
  44. what is the best way to recognize fake mails

    Reply
  45. Avatar Shridhar TiwariApril 21, 2013 at 11:22 AM

    thanx for giving information about cyber criminal and thanx for given protection

    Reply
  46. Thanks Soumya. I am visiting my daughter’s family in the US. I have been watching TV advertisements on Identity thefts & how some people have lost all their bank balances. This is one reason why I am not into net banking.

    I am told even some International banks of American origin have lost billions due to fraudulent transfer of funds. What is even more scaring is that your bank balance will not reveal the transfer till it is too late ! Could you advise as to how this theft can be avoided.

    Reply
  47. Is there a sure way of sending all such emails in Spam and deleting them without bothering about them any further?

    Reply
  48. Avatar bappadittya mistriApril 22, 2013 at 6:21 PM

    Thanks. This information is very helpful,keep updating us please.

    Reply
  49. Avatar RS SangwanApril 22, 2013 at 6:55 PM

    Good efforts to make people aware. keep it up.

    Reply
  50. Avatar RS SangwanApril 22, 2013 at 6:58 PM

    Hi! Great efforts to make people aware. keep it up. Thanks & Good Luck.

    Reply
  51. Avatar Amit SodhiApril 22, 2013 at 9:00 PM

    WOW!
    Really nice and informative. I didn’t know about these kinds of cyber-crime before!!

    Reply
  52. Avatar Love Kr. PradhanApril 22, 2013 at 9:13 PM

    My Antivirus software is not update when internet connection. please arrenge to repair whom path is missing. I do not know about it.

    Reply
  53. Avatar bappadittya mistriApril 23, 2013 at 10:33 AM

    This information is very helpful,keep updating us please.

    Reply
  54. KNOWLEDGE SHARED IS WELL APPRECIATED. THANK YOU.

    Reply
  55. Avatar bappadittya mistriApril 24, 2013 at 11:24 AM

    Thanks . This information is very helpful , keep updating us please.

    Reply
  56. Thanks soumya,

    For sharing fantastic article with detailed summary of various attacks.

    Reply
  57. when we are downloading something some unwanted things usually come to the screen, are they linked to such type of cyber-criminals. thanks for this article

    Reply
  58. Avatar NungshitombaMay 12, 2013 at 12:45 PM

    Hi,
    Thank you so much for your concern. God bless you always. Amen.

    Reply
  59. Avatar shyam soodMay 13, 2013 at 7:07 PM

    for personal use

    Reply
  60. Avatar Zia MehdiMay 13, 2013 at 8:12 PM

    A lot of thanks for sending the information.

    Reply