{"id":53,"date":"2020-08-05T02:45:22","date_gmt":"2020-08-05T02:45:22","guid":{"rendered":"http:\/\/thyakka.com\/wp\/?p=53"},"modified":"2020-08-05T02:45:46","modified_gmt":"2020-08-05T02:45:46","slug":"%f0%9f%97%83-most-common-types-of-online-scams-%f0%9f%97%b3","status":"publish","type":"post","link":"https:\/\/thyakka.com\/wp\/2020\/08\/05\/%f0%9f%97%83-most-common-types-of-online-scams-%f0%9f%97%b3\/","title":{"rendered":"Most Common Types of Online Scams"},"content":{"rendered":"\n<p><strong>\ud83d\udd25 Phishing \ud83d\udd25<\/strong><\/p>\n\n\n\n<p>The top online scam today is Phishing. Internet thieves prey on unsuspecting users by sending out phishing emails. In these emails, a cybercriminal tries to trick you into believing you are logging into a trusted website that you normally do business with. This could be a bank, your social media account, an online shopping website, shipping companies, cloud storage companies and more.<\/p>\n\n\n\n<p>Another type of popular phishing scam is the Nigerian Prince, or 419 scam. These are phishing emails in which you\u2019re asked to help bring large sums of money into the country, cash phony money orders or wire money to the thief. The trick is that the scammer first asks you for a small fee because the larger sum of money is \u201ctied up\u201d whether it be in wire transfer fees, processing fees or some other tall tale.<\/p>\n\n\n\n<p><strong>\ud83d\udd25 Fake AV \ud83d\udd25<\/strong><\/p>\n\n\n\n<p>One close to our industry is fake security software, which is also known as scareware. These start with a pop up warning saying that you have a virus. Then the popup leads the user to believe that if they click on the link, the infection will get cleaned up.Cybercriminals use the promise of \u201cFree Anti-Virus\u201d to instead implant malware on a victim\u2019s device.<\/p>\n\n\n\n<p><strong>\ud83d\udd25 Social Media Scams \ud83d\udd25<\/strong><\/p>\n\n\n\n<p>Social media scams are a variety of posts you will see in your news feeds- all with the goal of getting you to click on a link that could potentially be hosting malware.<\/p>\n\n\n\n<p><strong>\ud83d\udd25 Mobile Scams \ud83d\udd25<\/strong><\/p>\n\n\n\n<p>Mobile scams can come in many forms, but the most common are phishing apps. These apps are designed to look like the real thing, just like phishing emails. It is exactly the same premise, however, instead of emails, the malware is passed through a fake app.<\/p>\n\n\n\n<p><strong>\ud83d\udd25 Social Engineering Scams \ud83d\udd25<\/strong><\/p>\n\n\n\n<p>Social engineering is a way that cybercriminals use human-to-human interaction in order to get the user to divulge sensitive information. Since social engineering is based on human nature and emotional reactions, there are many ways that attackers can try to trick you- online and offline.<\/p>\n\n\n\n<p><strong><em>\ud83d\uddc3 Cyber Safety for Kids \ud83d\uddf3<\/em><\/strong><\/p>\n\n\n\n<p>The online world is becoming every child\u2019s favorite playground. With more children accessing the Internet with different devices, they are learning and growing more each day. When used appropriately the cyber world can be your child\u2019s portal to achieve great things.<\/p>\n\n\n\n<p>While every parent wants their child to have access to the latest and best information, they also know that safety is paramount.<\/p>\n\n\n\n<p><strong><em>\ud83d\udd30 How can parents help their child? \ud83d\udd30<\/em><\/strong><\/p>\n\n\n\n<p>Learning is not limited to children alone. It is important for parents to know what is out there. With the launch of new apps and social media sites, children are exposed to new things \u2013 things with the potential to make or break them.<\/p>\n\n\n\n<p>As a parent, it is best to stay fortified with all the information there is know about emerging threats, the latest school yard jargon and ways to deal with issues that emerge as a result of cyber behavior.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>\ud83d\udd25 Phishing \ud83d\udd25 The top online scam today is Phishing. Internet thieves prey on unsuspecting users by sending out phishing emails. In these emails, a<a href=\"https:\/\/thyakka.com\/wp\/2020\/08\/05\/%f0%9f%97%83-most-common-types-of-online-scams-%f0%9f%97%b3\/\" class=\"more-link\">View More<\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[9],"tags":[11,3,8,5,6,10,12,7,4],"class_list":["post-53","post","type-post","status-publish","format-standard","hentry","category-cyber-security","tag-child-safety","tag-computer-virus","tag-computer-worm","tag-cyber-security","tag-cyber-threat","tag-phising","tag-scams","tag-virus","tag-worms"],"_links":{"self":[{"href":"https:\/\/thyakka.com\/wp\/wp-json\/wp\/v2\/posts\/53","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/thyakka.com\/wp\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/thyakka.com\/wp\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/thyakka.com\/wp\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/thyakka.com\/wp\/wp-json\/wp\/v2\/comments?post=53"}],"version-history":[{"count":2,"href":"https:\/\/thyakka.com\/wp\/wp-json\/wp\/v2\/posts\/53\/revisions"}],"predecessor-version":[{"id":55,"href":"https:\/\/thyakka.com\/wp\/wp-json\/wp\/v2\/posts\/53\/revisions\/55"}],"wp:attachment":[{"href":"https:\/\/thyakka.com\/wp\/wp-json\/wp\/v2\/media?parent=53"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/thyakka.com\/wp\/wp-json\/wp\/v2\/categories?post=53"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/thyakka.com\/wp\/wp-json\/wp\/v2\/tags?post=53"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}