translation

This is an AI translated post.

세상 모든 정보

7 Things to Watch Out For Regarding Fraudulent Schemes and Voice Phishing

Select Language

  • English
  • 汉语
  • Español
  • Bahasa Indonesia
  • Português
  • Русский
  • 日本語
  • 한국어
  • Deutsch
  • Français
  • Italiano
  • Türkçe
  • Tiếng Việt
  • ไทย
  • Polski
  • Nederlands
  • हिन्दी
  • Magyar

Summarized by durumis AI

  • Fraudulent schemes targeting P2P payment services are rapidly increasing, and new types of crimes beyond imagination are emerging, leveraging AI technology.
  • Be especially cautious of various methods such as phishing attacks, suspicious account activity messages, refund requests for accidental transfers, charity donation impersonation, and fraud dedicated staff impersonation.
  • Be wary of unknown companies and unclear transactions, and it is safe to use P2P transfer services with security and dual authentication features.


As contactless transactions and online financial transactions become commonplace due to the COVID-19 pandemic, cybercrime is becoming more sophisticated. Nowadays, it is necessary to be aware of advanced methods that even utilize artificial intelligence (AI). We hope you are aware of new types of cybercrime methods and never become a victim.


According to the Federal Trade Commission (FTP), one in four victims of fraud since 2021 were targeted on social media, and the amount of damage reached $2.7 billion. It is time to be wary of increasingly intelligent and cunning fraud methods. This time, with the use of artificial intelligence (AI), P2P crime with new patterns beyond imagination is expected to become rampant.


Types targeting P2P services directly


Recently, fraud methods targeting P2P payment services such as Venmo, Zelle, PayPal, Apple Pay, and Facebook Pay are on the rise. To prevent damage, it is safe to use services with security and dual authentication features like Cash App.


Beware of phishing attacks and AI voice phishing


Phishing attacks, a well-known and representative fraud method, are still prevalent. They impersonate government agencies, banks, etc., to steal sensitive personal information such as account information and inflict financial damage. In particular, with the development of AI technology, AI-created voices and synthetic photos are emerging, requiring caution.


Beware of messages stating "Suspicious activity in your account"


You may receive messages requesting a transfer of funds, citing reasons such as transaction cancellation or account freezing, claiming that suspicious activity has been detected in your account. It is safe to directly confirm with the relevant institution before taking any action.


Don't fall for "mistake transfer" refund requests


You should also be aware of methods that request a refund after transferring money through P2P, claiming it was a "mistake." Typically, the transferred amount is false or comes from a dummy account. If you refund it, the scammer will receive both the victim's transferred amount and the money from the P2P company.


Beware of "Help me" charity donation impersonations


Advertisements on social media requesting charitable donations may also be false. It is a method that induces donations by creating emotional and urgent situations.


Information theft impersonating "fraud dedicated staff"


There are also cases where impersonating a dedicated fraud department staff member of a retail company or vendor to request bank account information, credit card numbers, and other information. They use stolen information to create P2P accounts and use them for further crimes.


Beware of fake product sales


They may impersonate well-known companies to request payment for nonexistent products. Even if it is an unknown company, you should be suspicious if the product does not exist.


P2P transfers are convenient, but they are also vulnerable to fraud. Be careful of advanced methods that even use AI and be wary of unknown companies or unclear transactions.

식스센스
세상 모든 정보
세상 모든 정보
식스센스
Cyber Bullying: Meaning, Dangers, and Prevention Methods Cyberbullying is a serious issue not only for adolescents but also for adults, and can reach the level of crime, such as personal attacks, threats, and leaks of personal information on SNS. This article analyzes the causes, characteristics, and dangers of

April 18, 2024

What is LLM (Large Language Model)? Large Language Models (LLMs) are a core technology in artificial intelligence, learning from vast amounts of text data to acquire language processing abilities similar to humans. They can be used in various fields such as chatbots, translation, and text g

April 1, 2024

Is Worldcoin's Iris Recognition Safe? Worldcoin provides coins through iris recognition, but it raises several problems such as personal information trading controversy, opaque information utilization, and risks of transferring servers overseas. Experts emphasize the need for a cautious appro

March 31, 2024

Cryptocurrency Money Laundering Crime Syndicate 'Faceless Monster': A Comprehensive Review of the Reality and Countermeasures of Anonymous and Fluid Crime Groups The 'Tokuryu,' a new type of criminal group that utilizes anonymity and fluidity, has emerged as a social problem by being involved in various crimes such as investment fraud and cryptocurrency fraud, and the government is preparing strong countermeasures
durumis AI News Japan
durumis AI News Japan
durumis AI News Japan
durumis AI News Japan

May 28, 2024

The Meaning of Human in 2023, After the Rise of Generative AI 2023 was a year of significant changes driven by AI's dominance across the technology industry, including a shift towards generative AI platforms, increased public familiarity, and the agreement on AI regulatory bills. In 2024, alongside advancements in
Byungchae Ryan Son
Byungchae Ryan Son
Byungchae Ryan Son
Byungchae Ryan Son
Byungchae Ryan Son

May 16, 2024

Google I/O (May 14), Apple WWDC (June 10) Schedule Announced Major technology event schedules: Google Next (April 9), Google I/O (May 14), Apple WWDC (June 10). These events are expected to showcase innovative technologies in various fields, including cloud computing, artificial intelligence, and operating systems.
해리슨 블로그
해리슨 블로그
해리슨 블로그
해리슨 블로그

March 27, 2024

Deepfake Technology and Human Intent Concerns are growing about the ethical issues of deepfake technology, along with its social influence, and it is emphasized that it is difficult to regulate the intent of the creators. This article analyzes the social problems related to deepfake technolo
Byungchae Ryan Son
Byungchae Ryan Son
Byungchae Ryan Son
Byungchae Ryan Son

May 10, 2024

Raided US$ 1 Billion, This is How Hackers Rob Banks A hacker group called Carbanak has stolen more than US$1 billion from banks and financial institutions around the world, by breaking into 100 bank accounts in 30 countries over a period of two years.
DUNIA INTERNET
DUNIA INTERNET
DUNIA INTERNET
DUNIA INTERNET

March 21, 2024

14 Dangerous Apps That Can Hack Bank Accounts Trend Micro has found 14 malicious Android apps on the Google Play Store that contain the 'DawDropper' malware, which can steal personal data and access bank accounts. These apps disguise themselves as productivity and utility apps, such as
DUNIA INTERNET
DUNIA INTERNET
DUNIA INTERNET
DUNIA INTERNET

March 21, 2024