Head Lines
    Headlines
  • Telangana Assembly passes TSRTC merger Bill
  • 'Money Heist'-Inspired Cyber Criminals Arrested For Conning Noida Businessman
  • SC to monitor cases of crime against women in Manipur
  • Veg thali cost surges 28% in July amid soaring food prices
  • IIM Lucknow launches executive programme in AI for Business
  • Govt to open research park at top educational institutions to promote science & tech
  • US to send Ukraine first $200 million of arms freed by $6.2 billion 'error'
  • Reliance Retail says it is set to lead the retail industry in the coming decade
  • Karnataka High Court accepts petition challenging provisions of Real Estate Regulatory Act
  • ‘I’m doing this for Pewdiepie’: MrBeast challenges T-Series, will fight to become YouTuber with maximum subscribers

6 ways to protect against cyber crime

Risks involved

Don’t install any direct application bypassing App Store or Play Store. You also need to be cyber smart and check three things before you install any app or tool: the developer, the reviews and the permissions. Recently, there was a wave of ‘Insta Loan’ apps. Most of these were Chinese and promised you a loan instantly without any documentation. But these loans came with huge interests and led to extortion when people were unable to pay back. Worse, these apps could access data on your phones, and copy your contact list and photos, says Dr. Rakshit Tandon, director of Hackershala, and consultant at Internet and Mobile Association of India. If people had checked the developer info, they would have realised that the apps aren’t reliable.

Parental control

Parental control on all devices helps you filter out inappropriate search words or content, and also controls access your kids may have to some things. Last year, a 16-year-old boy in Mumbai spent Rs 10 lakh from his mother’s bank account to play PUBG. Around the same time, a 13-year-old boy in MP’s Chhatarpur hanged himself after he spent Rs 40,000 of his parents’ money on an online game. Parents need to have content control, and educate children about their digital footprint.

Precautions on social media

We must check our privacy settings while sharing on social media. Someone could morph your photo to create an inappropriate video thumbnail, and then call you to say, “Oh my God, how did your video get leaked?”. In a panic, you will click on the thumbnail, which takes you to a page that looks exactly like the Facebook login page, and it asks you for your email and your password. When you’re agitated, you may not pay attention to small details. The hacker will use this information to lock you out of your social media account, but reach out to your friends asking for money immediately.

Black Hat SEO

Another scary factor is Google poisoning. This is when you try to find something on a search engine, but hackers, through what is called ‘Black Hat SEO’, have managed to put their own fake website at the top of search results. So, it may not be necessary that the first result you get is the genuine one. And if they ask you to download any app or tool, be suspicious.

Tools for safety

Don’t trust everything on the Internet. You have to do a little detective work yourself. It’s easy to make a fake profile so you need to know how to use basic OSINT or ‘Open Source Intelligence’. For instance, when you come across a matrimonial or dating profile, try to discover more about that person by doing a reverse image search. You can upload a photo or input the URL of an image on a search engine, such as www.google.com/imghp, yandex.com/images/, or www.bing.com/visualsearch to show you related images or those that contain similar looking items or people.

6/6

Victim of cyber crime

You can register a complaint on https://www.cybercrime.gov.in/ or call the national helpline number 1930. The government is building a network with bank nodal officers, and when there’s any information about a suspicious account, it is frozen. But keep in mind that digital money travels fast and the hacker may have already moved the funds. Also, hackers often create dummy accounts by using fake PANs and Aadhaar cards, which can be difficult to trace.

comments

No Comments Till Now.

Write Your Story