Close Menu
    DevStackTipsDevStackTips
    • Home
    • News & Updates
      1. Tech & Work
      2. View All

      Sunshine And March Vibes (2025 Wallpapers Edition)

      May 30, 2025

      The Case For Minimal WordPress Setups: A Contrarian View On Theme Frameworks

      May 30, 2025

      How To Fix Largest Contentful Paint Issues With Subpart Analysis

      May 30, 2025

      How To Prevent WordPress SQL Injection Attacks

      May 30, 2025

      Does Elden Ring Nightreign have crossplay or cross-platform play?

      May 30, 2025

      Cyberpunk 2077 sequel enters pre-production as Phantom Liberty crosses 10 million copies sold

      May 30, 2025

      EA has canceled yet another game, shuttered its developer, and started more layoffs

      May 30, 2025

      The Witcher 3: Wild Hunt reaches 60 million copies sold as work continues on The Witcher 4

      May 30, 2025
    • Development
      1. Algorithms & Data Structures
      2. Artificial Intelligence
      3. Back-End Development
      4. Databases
      5. Front-End Development
      6. Libraries & Frameworks
      7. Machine Learning
      8. Security
      9. Software Engineering
      10. Tools & IDEs
      11. Web Design
      12. Web Development
      13. Web Security
      14. Programming Languages
        • PHP
        • JavaScript
      Featured

      How Remix is shaking things up

      May 30, 2025
      Recent

      How Remix is shaking things up

      May 30, 2025

      Perficient at Kscope25: Let’s Meet in Texas!

      May 30, 2025

      Salesforce + Informatica: What It Means for Data Cloud and Our Customers

      May 30, 2025
    • Operating Systems
      1. Windows
      2. Linux
      3. macOS
      Featured

      Does Elden Ring Nightreign have crossplay or cross-platform play?

      May 30, 2025
      Recent

      Does Elden Ring Nightreign have crossplay or cross-platform play?

      May 30, 2025

      Cyberpunk 2077 sequel enters pre-production as Phantom Liberty crosses 10 million copies sold

      May 30, 2025

      EA has canceled yet another game, shuttered its developer, and started more layoffs

      May 30, 2025
    • Learning Resources
      • Books
      • Cheatsheets
      • Tutorials & Guides
    Home»Development»Stay Safe Online – Cybersecurity Awareness Session by WIT India

    Stay Safe Online – Cybersecurity Awareness Session by WIT India

    January 21, 2025

    It’s a need of the hour and the topic of discussion – How to stay safe online. Promptly, Cybersecurity Awareness session was hosted by WIT, India. The speaker of the day is Sanjana Rathi, Cyber security specialist. She shared her wisdom on Cybercrimes, preventive measures and practical solutions to the problems.
    In this blog the victim is called Mr. David and Scamster/Predator is called Goliath.

    The mobile number magic
    We tend to be free with our Phone number and basic details and while billing in a hotel, service provider, coupons for Free raffles, we tend to share the number for free without thinking much on the consequences. There are no proper policies with the application to guard our data and hence it gets leaked to the predators who are waiting for an opportunity to prey on us.

    Call forwarding scam:
    Mr. David was approached by Goliath asking him to dial few numbers and at that time David was unaware, call forwarding would be activated in his mobile and his data would be stolen, As the call forwarding is activated in his mobile and Goliath used WhatsApp for Business installed newly in his phone and messaged his contacts asking for money. Few people got scammed and others reached out to this Mr. Dávid and only then he was aware he and his friends were under cyberattack.

    Cyber security:
    “Cyber security is about being aware and takes lots of practice to stay safe from Scammers”.
    There are lot of challenges in the digital era. We tend to agree to Application license without going through the documentation granting them access for our personal data such as Contacts, Photos, location and much more.

    Types of Cyberthreats:
    Cyber threats are classified majorly into four categories.
    • Malware
    • Phishing
    • Ransomware
    • DDos attacks

    Phishing:
    Goliath uses social engineering tactics to send you link, we are prompted to download link/ respond to a mail or pay our utility bills using the link. Once we click it by mistake, we would be routed to a fake website asking us for our bank details and we would be scammed.

    Voice cloning/Face cloning in Ransomware:
    Cyber Crime tools using AI, Metaverse – predators use Voice cloning/Face cloning asking for money transfer. A businessman’s secretary was asked by a man pretending to be his boss asking for money transfer through voice call. The secretary was vigilant and as the ransomware amount was huge. He did reach out to his boss and found out it was a fake Request. If at all he wasn’t careful, they would have got scammed.

    Hostinger

    Data Hygiene:
          Data Hygiene is important while we look out to buy new electronic devices and haul away the older ones. Some of the suggestions to be practiced are,

    • Get a phone/system from a credible source.
    • For Important data, have cloud storage and backup.
    • Reg the Disposal of the data regarding the resell of phone, degaussing of data must be done to erase/dispose the data in the Mobiles/Systems.
    • Cyber criminals make use of E-waste from foreign nations. They look in for the Recycle bin of the systems for data.
    • Always be cautious and verify before taking a step for transaction.

    UPI Fraud:
    • RBI regulations – on the first transaction, Report the crime on time by calling 1093 (Cybercrime helpline) – 4 hours within the incident and contacted the bank to freeze the account. Report to the ombudsman. It’s likely the bank has to refund the amount.
                         “Scamsters fuel on the fear of the Victim to prey on them”

    Digital Arrest:
    The recent day scam is as follows, At midnight, Mr. David got a call from Goliath impersonating that he is a Customs officer calling to say that Mr. David has sent a Package which contains a Illegal item distant nation. The call gets connected to the Police Commissioner where they asked Mr. David is enquired on video call and team member of Goliath’s impersonate as police commissioner with the whole setup uniform and background and prey on the fear of David.

    Mr. David is asked to Withdraw a huge amount of money from the bank. The bank employees found Mr. David acting weird and trying to close a huge amount of his savings in short notice. Meanwhile Goliath’s team would stay on call while Mr. David was at the bank. After multiple counselling by Banker and his trustworthy nature, David agreed that he was victimized and hence the scam is avoided.

    Cyber security measures at Perficient:
    ISMS awareness month is celebrated every year with various interesting games in order to educate and make us aware on the Domain spooking, different threats and solutions, Various mails been shared to us regarding the Do’s and Don’ts of using Perficient email and password management.

    Conclusion:
    With the advancement in AI, metaverse and Technology, Team of Goliaths comes up with various scams. They even use books like How to win friends and influence people by Dale Carenidge in order to trick people in liking them and to eventually scam them. We cannot eradicate cybercrimes completely. The best thing we can do is be aware of the ongoing scams and follow the safe practices in daily life. Staying cautious and vigilant and best practices will save us from cybercrime.

    Source: Read More 

    Facebook Twitter Reddit Email Copy Link
    Previous ArticleStreamline Your Code with Salesforce Apex Collection Conversion Hacks
    Next Article Preparing for Salesforce Spring ’25 Release Updates: Miscellaneous Updates

    Related Posts

    Security

    China-Linked Hackers Exploit SAP and SQL Server Flaws in Attacks Across Asia and Brazil

    May 31, 2025
    Security

    New Apache InLong Vulnerability (CVE-2025-27522) Exposes Systems to Remote Code Execution Risks

    May 31, 2025
    Leave A Reply Cancel Reply

    Continue Reading

    How to Build Your Own Portable Linux

    Development

    delicolour – lightweight colour finder

    Development

    Hackers Exploited Krpano Framework Flaw to Inject Spam Ads on 350+ Websites

    Development

    CVE-2025-48925 – TeleMessage MD5 Hashing Authentication Bypass

    Common Vulnerabilities and Exposures (CVEs)

    Highlights

    Rubikverse – Online Rubik’s Cube Solvers, Simulators & Tutorials

    May 28, 2025

    Post Content Source: Read More 

    CVE-2024-47893 – VMware GPU Firmware Memory Disclosure

    May 17, 2025

    9 Best AI Tools for Programming Assistance in 2024

    June 14, 2024

    Edge will soon launch Copilot pane automatically when you open the browser

    March 16, 2025
    © DevStackTips 2025. All rights reserved.
    • Contact
    • Privacy Policy

    Type above and press Enter to search. Press Esc to cancel.