Pro Tips

Mobile Recharge Shop
A Mobile Recharge Shop is a place where scamsters can gain access to your cellphone number because you have provided it to the recharge vendor. They will misuse your number to call or text you, exploit your ignorance or even emotionally manipulate you.
Learn More
KEYLOGGER
It is a malicious program that may be installed on the victim’s computer for recording computer user keystrokes to steal passwords and other sensitive information. With Keylogger a scamster will be able to collect login details and other matter saved in the computer and have them mailed to a designated email address.
Learn More
CALL SPOOFING
Call spoofing happens through apps that enable a person with criminal intent to change his number and voice to impersonateanother to defraud.
Learn More
CYBER STALKING
Cyberstalking is the use of the Internet or other electronic means to stalk or harass another by misusing information uploaded on social networking sites
Learn More
PROFILE HACKING
Profile Hacking happens when your email or social networking site is accessed by a probable stalker who then compromises it.
Learn More
JOB CALL LETTER
Websites offering jobs need to be checked for veracity and authenticity. Mails need to be double-checked and verified before one responds and acts on instructions provided, especially if one is asked to put in a personal appearance
Learn More
DATING WEBSITE
Females can be emotionally manipulated by smooth talkers on dating sites. Any private pictures or texts that they send across to probable dating companions on such sites are fair game for unscrupulous persons who can then blackmail them.
Learn More
SOCIAL TROLLING
Social Trolling is posting inflammatory messages or visuals about a person or organisation in an online community with the sole intention of causing humiliation or nuisance to that person.
Learn More
FAKE MATRIMONIAL PROFILE
A fraudster may have registered on a matrimonial site with a fake profile. The details and profile pic may not be his. He can dupe a naive girl who falls for his practised charm and believes in the the authenticity of supportive material that he provides to back up his identity.
Learn More
FAKE REVIEWS
A website may dupe customers by putting up fake reviews of products. They plant glowing reviews and pay for perfect ratings that attract customers, especially backed by discounted prices. These products from dubious sites may cause untold harm if used.
Learn More
CYBER VULTURES
Cyber-vultures are a merciless breed of hackers who like to feast on consumers and businesses suffering from any type of attack. They use this scenario as an opportunity to trick them and swindle more money.
Learn More
JUICE JACKING
Juice Jacking is a type of cyber attack involving a charging port that doubles as a data connection, typically over USB. This often involves either installing malware or copying sensitive data from a smart phone or other computer devices. Charging ports at public places are prime areas for juice jacking.
Learn More
ONLINE RADICALIZATION
Young, vulnerable individuals can fall prey to terrorists’ propaganda while spending time online and browsing the net. The targets of such extremists are individuals or groups of people who can be easily led towards terrorist ideologies because of their experiences, state of mind or sometimes their upbringing.
Learn More
Honey Trap
Honey trapping is an investigative practice that uses romantic or intimate relationships for an interpersonal, political or monetary purpose to obtain sensitive information. In today’s cyber world, “Honey Trap” has gained a new dimension on social media platforms like Facebook, Twitter etc to trap targets by blackmailing them.
Learn More
RFID CLONING
Radio frequency identification, or RFID often abbreviated Radio Frequency IDentification is method for automatic identification of objects, where the object IDs read or write data using radio waves. Each chip contains an identifier stored inside, with unique number and antenna. Most of these cards can be cloned, easily!
Learn More

DEBIT CARD CLONING
Debit Card skimming happens when the PIN is revealed to another person. A scamster who knows the PIN and has possession of the card even for a short while can replicate the card with a skimming /schimming device and withdraw cash
Learn More
SMS SPOOFING
Spoofing is being able to send a message by hiding or changing or using a completely different sender ID. Typically, you send an SMS, your handheld device sends the message with your phone number as the originator where in you as the sender cannot alter that number.
Learn More
RANSOMWARE
Ransomware is a form of malware that encrypts a victim’s files. The attacker then demands a ransom from the victim to restore access to the data upon payment. Users are shown instructions as to how to pay a fee to get the decryption key. The costs can range from a few hundred dollars to thousands, payable to cybercriminals in bitcoin.
Learn More
PICTURE MORPHING
Morphing the face of a person to the body of another and publishing it to blackmail or otherwise intimidate the person is one of the ways by which people who upload photos on social networking sites can be exploited
Learn More
ONLINE GAMES
Girls who are vulnerable to loneliness, low self-esteem and clinical depression can fall prey to dangerous online games that may become addictive and further harm them. Some like the notorious blue whale challenge even end in the victim ending her life. This is a personal as well as social challenge for the others around.
Learn More
DEEPFAKES
Deepfake is a technique that is used to combine and superimpose new images and videos onto source images or videos. It is used to create videos where the voice or face of another is superimposed on the original in such a way that the viewer or listener cannot distinguish or doubt the veracity of it
Learn More
CAMERA HACKING
Camera hacking happens when photographs of a person are taken without consent, through malware that got downloaded with an attachment. Phones with no camera guard can be exploited for such criminal activities.
Learn More
PONZI SCHEME
A Ponzi scheme is a fraudulent investing scam promising high rates of return with little risk to investors. Victims of such schemes are vulnerable to hackers with malicious intent and fall prey to their promises of recovery of their losses
Learn More
MOBILE REPAIR SHOP
Pictures and videos stored in the phone’s gallery can be accessed by any person once the phone is in his possession. A mobile repair shop may have a criminal who accesses private pictures or other data and uploads them on shady sites to make them viral. He may also use them for blackmailing
Learn More
FAKE PROFILE WITH SEXTORTION
Public changing rooms may have strategically placed cameras that capture pics of the users, naturally with criminal intent. These pics can then be uploaded on a duplicate social media account with the intention of extortion
Learn More
APP TRAPS
The internet could come with a hidden cost. One of these is preloaded apps that harvest users’ data without their knowledge. These apps ask for permission to access files and once given, they may use videos, photos and storage media not only to be mined by marketers but also for other nefarious purposes.
Learn More
WIFI HACKING
Wifi hacking is essentially cracking the security protocols in a wireless network, granting full access for the hacker to view, store, download, or abuse the wireless network. Weak passwords to wifi networks may enable a hacker to log into the net through the wifi connection in the vicinity.
Learn More
Honey Trap
Honey trapping is an investigative practice that uses romantic or intimate relationships for an interpersonal, political or monetary purpose to obtain sensitive information. In today’s cyber world, “Honey Trap” has gained a new dimension on social media platforms like Facebook, Twitter etc to trap targets by blackmailing them.
Learn More
QR Code Scam
A QR (Quick Response) code is nothing more than a two-dimensional barcode. This type of code was designed to be read by robots that keep track of produced items in a factory. As a QR code takes up a lot less space than a legacy barcode, its usage soon spread and Hackers took it to their advantage!
Learn More
Drone Surveillance
In aviation and in space, a drone refers to an unpiloted aircraft or spacecraft. Drones can be equipped with various types of surveillance equipment that can collect high definition video and still images day and night. Drones can be equipped with technology allowing them to intercept cell phone calls, determine GPS locations, and gather license plate information
Learn More