Top 5 Cyber Scams of Christmas

P { margin-bottom: 0.08in; }

http://www.ehacking.net/2013/12/top-5-cyber-scams-of-christmas.html
We are heading towards the Christmas of
this year, you might be very excited and happy for your holiday,
Christmas celebration and of-course your shopping. The advent of
modern Internet has changed the way of shopping and many of us will
use computers, smart phones, tablets and other gadgets for online
shopping. Users like us are preparing themselves for shopping but we
should not forget that cyber criminals are also preparing their tools
and techniques to use scams.






McAfee has spotlights the “12 Scams of Christmas” to keep consumers digital lives safe, and in
this article we will discuss some of them (which are very important
and you may face them).




Fake gift cards





Social media specially twitter and
facebook are likely the best platform for these scammers to steal
money from consumers, and gift card (fake or bogus) are the easiest
way to target innocent people. Safe yourself from the deceptive
advertisement that ask your personal information.




SMS Scam “Smishing”






Smishing is the phishing technique that
done through a text message, here I am not mentioning sms because now
a days scammers are using android / iOS apps to target consumer. You
might get a text message from your bank or even an consumer website,
the SMS might not be originated from the pretended source. So always
confirm before going to share your information and do not open any
URL




Deceptive Online Games

Before your kids are glued to their newly
downloaded games, be wary of the games’ sources. Many sites
offering full-version downloads of Grand Theft Auto, for example, are
often laden with malware, and integrated social media pages can
expose gamers, too. “ Says McAfee

Fake Charity


Donation is the common practice of Christmas and most of us are
planning to donate some amount of money to the needy one, but do not
trust the fake charities on the basis of their claims. They might
create fake charity websites and ask your donation, email marketing,
social media marketing and even google advertisement may be use to
grab your attention and to play with human psyche.

Fake Application

Do not install the fake applications that look like the famous
online shopping portals, they might be malicious.






So above are the top 5 scams the everyone of us might face. McAfee
has created their list if top 12 scams. The number of scams is not
the matter at all because scammers always use different techniques
that used to be the mixture of various tricks, you need to aware
regarding the situation that is going on. Do not download any
application from third party website, do not check promotional emails
that you received from an unknown source and same goes with SMS.


Financial sector never ask personal information through SMS or
even email, so do not share your information. 


Also, if you find any malicious activity or scam then do share it
with us. So that we can investigate and publish the right thing for
the protection of other users.


Happy shopping and enjoy your holiday.





Note: If you want to learn more about Linux and Windows based Penetration testing, you might want to subscribe our RSS feed and Email Subscription  or become our Facebook fan! You will get all the latest updates at both the places.
Ehacking Staff
With more than 50 global partners, we are proud to count the world’s leading cybersecurity training provider. EH Academy is the brainchild of Ehacking, which has been involved in the field of training since the past Five years and continues to help in creating professional IT experts.

Most Popular

How to Install Kali Linux on VirtualBox [Windows Host] in 2020

Kali Linux is a Debian based Linux distribution, released on the 13th March 2013 as a complete rebuild of BackTrack Linux. It is one of...

Acunetix v13 Release Introduces Groundbreaking Innovations

The newest release of the Acunetix Web Vulnerability Scanner further improves performance and premieres best-of-breed technologies London, United Kingdom – February 5, 2019 – Acunetix,...

What is Ethical Hacking, how to be an Ethical Hacker

Hacking is the process of discovering vulnerabilities in a system and using these found vulnerabilities by gaining unauthorized access into the system to perform...

Basic steps to ensure security Online!

Security concerns are growing day by day due to the growing interconnectivity and technology. Drastic things can happen if you be a little careless...