Traditional Culture Encyclopedia - Hotel accommodation - What are the common online fraud methods?

What are the common online fraud methods?

Abstract: With the rapid development of the Internet and the industry, some criminals use mobile phones and the Internet to engage in various fraud activities. Some criminals at home and abroad use fraudulent tricks such as fishing, pseudo base stations, Trojans and telecom fraud to lure network users into being deceived. In the face of various scams on the internet, how should online financial users identify and guard against them? How to protect personal privacy in the network age? Common online fraud means

(a) "credit card consumption" fraud. In this kind of fraud crime, criminals remind mobile phone users through mobile phone text messages, saying that the user's bank card has just spent 5968 or 7888 yuan in a certain place (such as XX department store and XX hotel). If users have questions, they can call XXXX number for consultation and provide related telephone number transfer service. After the user called back, his accomplices lied that the bank card might be copied and stolen in the name of impersonating the bank customer service center and the financial crime investigation department of the Public Security Bureau. Taking advantage of the victim's panic, they ask users to go to the ATM of the bank to do the so-called data information change operation, or do the so-called encryption operation according to their telephone instructions, and gradually introduce the victim into the "transfer trap" and transfer the money in the victim's card to the account designated by the criminals, thus achieving the purpose of fraud.

(2) "luring remittance" fraud. In this kind of fraud crime, criminals send a large number of short messages such as "Please deposit the money in the bank, account number, Mr. Wang" in the form of group short messages. Some victims happen to be planning to remit money. After receiving such remittance fraud information, they may directly remit the money to the bank account provided by criminals without careful verification. Others owe money to others, receive such fraudulent information, think it is a dunning, and hastily remit the money to the bank account without realizing their real names.

(3) Fraudulent use of any software that displays numbers. Using arbitrary number display software, criminals pretend to be the staff of telecommunication bureau, public security bureau and other units, dial mobile phones and fixed telephones at will, and display the hotline and switchboard number of state organs. They were suspected of committing a crime because the victim's mobile phone arrears were stolen by others, and threatened to confiscate the victim's bank deposits to defraud the victim to transfer funds to the designated account.

(four) fictional purchase, defrauding the car tax rebate. The information content is "People's Republic of China (PRC) State Taxation Administration of The People's Republic of China (or car company) real estate (or car) transaction tax (or purchase tax) policy adjustment, your real estate (or car) can apply for transaction tax (purchase tax) refund, please consult for details. Once the victim contacts him, it is often easy to trick the ATM machine into transferring money under various excuses and transfer the deposit in the card to the account designated by the liar.

(5) False winning fraud. There are three main ways: ① printing a large number of beautiful fake winning scratch cards in advance, mailing them or hiring people to deliver them; ② SMS sending; ③ Send via the Internet. Once the victim contacted the criminals to win the prize, he asked the victim to remit money for various reasons, such as "personal income tax needs to be remitted first", "notarization fee" and "transfer fees", in order to achieve the purpose of fraud.

(6) "Remittance emergency" fraud. In this kind of fraud crime, after criminals grasp the information of the victim's family members through online chat, telephone dating, making friends, etc., they first trick the victim into turning off his mobile phone through repeated harassment or other means. During the period when the victim's mobile phone was turned off, they called the victim's family in the name of a doctor or a policeman, falsely claiming that the victim was ill or hospitalized in a car accident and was being rescued, and even falsely claiming that he was kidnapped, asking for remittance to a designated account for emergency rescue and fraud.

(7) "pretending to be a leader" fraud. In this kind of fraud crime, criminals collect the names, mobile phone numbers, office phone numbers and other related information of the main leaders of grass-roots enterprises and institutions, higher authorities, supervision departments and other units in detail through telephone inquiries and online inquiries. After obtaining the information, criminals pretend to be leaders, secretaries or departmental staff, call the heads of grass-roots units, and ask the deceived units to pay orders, supporting fees and handling fees to designated bank accounts on the grounds of selling books, commemorative coins, allocating funds, matching cars and helping solve financial difficulties, and implement fraud activities.

(8) ATM false notification fraud. The criminals blocked the exit card of the ATM machine in advance, pasted a false service hotline notice on the ATM machine, induced the bank card user to contact him after swallowing the card, obtained the password, and took out the bank card from the ATM machine after the user left.

(9) "Guess who I am" fraud. The criminal pretended to be an acquaintance of the victim and asked the victim to guess who he was on the phone. When the victim reported the name of an acquaintance, he admitted it, and then lied that he would visit the victim in the near future. I made a phone call the next day and made up that I was arrested by the public security organs for gambling, whoring, drug abuse, etc. Or we are in urgent need of money because of car accidents, illness, etc. , and borrow money from the victim and inform the remittance account.

(10) Fictitious stock trend, committing fraud on the grounds of providing stock dividend information. In the name of a securities company, criminals spread false inside information and trends of individual stocks through the Internet, telephone calls and short messages. Even making fake web pages to trick investors into transferring funds into their accounts for fraud in the name of providing funds to participate in stock trading dividends or buying and selling stocks on their behalf.

(eleven) "telephone arrears" fraud. "I am XX Telecommunications Bureau (Public Security Bureau, Procuratorate). Your phone is in arrears, and your bank account is suspected of money laundering, fraud and other crimes. Please cooperate. " In this kind of fraud, criminals pretend to be telecom workers and call the victim's home, falsely claiming that the victim has handled a fixed telephone in a certain place, which has caused arrears. When the victim reports that he has not registered the "arrears" phone, the perpetrator will continue to transfer the phone to the so-called public security department on the grounds that the victim's identity information has been leaked, used by others and the public security organ is investigating the matter. Next, criminals pretend to be public security police, falsely claiming that the identity information of the victim has been stolen, that the bank deposit may be unsafe, or that the victim is suspected of "money laundering" to trick the victim into remitting the bank deposit into a safe account provided by criminals.

(twelve) to provide free low-interest loans for fraud. Our company provides loans to people who are short of funds in this city with a monthly interest rate of 3%. No guarantee is required. Please call the manager. This kind of fraudulent short message is that swindlers use the psychology that some enterprises and individuals are in urgent need of liquidity under the background of tight money supply to lure them with low-interest loans, and then cheat money in the name of prepaid interest.

(thirteen) "telephone fraud" fraud. In this kind of fraud crime, criminals induce you to call back by calling a "ringing" phone (a strange phone that hangs up soon after ringing) to "earn" a high phone bill. Or send "your friend13 ×××× year×× month× day× month× day× month× day× month× day× month× day× month× month× day× month× day× month× day× month× day× month× month× day× month× month× day × month× month× day × month× month× day × month× month× day × month× month × day × month × month× month × day × month× month × month × day × month

(14) impersonated a triad society to extort money and commit fraud. Criminals call and send messages to mobile phone users in the name of "Northeast underworld" and "black boy" to seek revenge for others, such as threats of "breaking your leg" and "killing you", which makes the victims feel scared, and then put forward conditions such as "I think you are good", "handout spirit" and "taking money to eliminate disasters" to force the victims to remit money to their designated accounts.

(fifteen) "high salary recruitment" fraud. In this kind of fraud, criminals use mass information to recruit "Mr. Public Relations" and "special care" with high salary as an excuse to ask the victims to interview in designated hotels. When the victim arrived at the designated hotel and called again, the criminal did not show up, claiming that the victim had passed the interview and remitted certain training, clothing and other expenses to the designated account before going to work. Step by step, set traps to cheat money.

(sixteen) to sell cheap illegal goods as bait for fraud. The text message was "90% of the new cars of the group (Honda, Audi, Passat, etc.). ) They are sold in this city, and there are other self-defense weapons. Telephone XXX. " This kind of deception takes advantage of people's greed for cheap, falsely claiming that there are all kinds of smuggled goods confiscated by the customs and can be mailed at low prices. First of all, the attractor mainly calls for consultation, and then swindles by paying the deposit and consignment fee.

(seventeen) online and telephone dating fraud. Criminals use the internet and newspapers to publish information about friends with superior personal conditions (for example, falsely claiming that they are "Qian Jie" or "rich businessman"), and confuse victims with sweet words in online and telephone communication. Later, the victim was asked to pay a fine or deposit on the grounds that the gift brought to the victim on the way was a cultural relic, or the victim was asked to remit money to his partner's account on the grounds that the victim opened a new shop, and the victim was asked to give gifts such as flower baskets.

(eighteen) "lost card" fraud. The suspect made a so-called gold card for consumption. On the back of the card, the amount available for consumption, contact website and telephone number are written, and it is specially stated that the card is anonymous and does not report the loss. They threw these gold cards in conspicuous places in some large shopping malls, supermarkets and high-end entertainment places. If someone finds the card, call the contact number on the card or consult online, the other party will tell them to remit money to the designated account first, and pay a certain handling fee to activate the gold card before spending, thus committing fraud.

To prevent telecom fraud, we should do "three noes";

The public security organs remind the broad masses of the people to be vigilant, strengthen self-prevention and prevent being deceived. Pay attention to "three noes" in work and life;

Don't trust: Don't trust phone calls and text messages from unknown sources. No matter what the criminals say, don't believe it easily. Hang up the phone in time, don't reply to text messages, and don't give criminals a chance to set traps further.

Don't reveal: strengthen your psychological defense, and don't be tempted by criminals or illegal text messages because you are greedy for small profits. Don't disclose identity information, deposits, bank cards, etc. under any circumstances. You and your family. If you have any questions, please call 1 10 for help or ask friends, relatives and colleagues.

Don't transfer money: learn the common sense of bank cards, ensure the safety of funds in your bank cards, and never send money or transfer money to strangers.

Report the case in time: If you are cheated or hear that your relatives and friends have been cheated, please report the case to the public security organ immediately, and provide detailed information such as the liar's account number and contact number, so that the public security organ can carry out investigation and solve the case.

Beware of new telecom fraud means

The high incidence of telecom fraud cases has seriously violated the property safety of the people. Recently, a new type of telecom fraud has appeared. By using arbitrary number display software, Internet telephony and other technologies, criminals pretend to be staff members of telecommunications bureaus, public security bureaus and other units, and dial mobile phones and fixed telephones at will to display the hotline and switchboard numbers of state organs, so as to defraud the victims of transferring funds by claiming that their phones are in arrears, being embezzled by others, or threatening to confiscate all their bank deposits, thus making citizens legal.

Alert:

1. If you receive a phone call claiming to be a staff member of the Telecommunications Bureau or the Public Security Bureau, don't trust the bank account easily. You can choose to call 1 10 or telecom 10000 for inquiry.

2. When you receive phone calls, text messages from relatives and friends, phone calls from public security organs, and hotline calls such as 1 10 and 95598, please be vigilant and check in time to avoid property losses.

3. No number indicating software supports callback. Even if the number displayed when the suspect calls is 1 10 or 10000, he can't connect or transfer to the real unit as long as he dials back.

Once the people are deceived, they should immediately report to the local public security organ, so that the public security organ can collect effective clues and information in time and try their best to recover losses for the people.

How to protect personal privacy in the network age?

Fire, theft and Trojan protection:

1, select a secure computer. In particular, don't go to internet cafes to operate important information and huge remittances.

2. Set a password with high security factor. The longer the better, the better letters, numbers and symbols, but don't forget yourself. In addition, don't be lazy and change it regularly.

3. Update antivirus software regularly. If you can't choose which one is good, change to several antivirus software.

4. Update the system regularly. For example, if you use win7 system, you will be prompted for an update. Find time to reload the next one.

5. Choose the websites of big companies. Unless there is a "special entertainment need". The websites of large companies have strong technical strength and do a good job in protecting their own security.

6. Control your curiosity and don't be blind. Advertising windows and video windows may hide viruses, not to mention phishing attachments in common formats such as exe and word.

Anti-spam and advertising:

1. Click "Do not receive website updates or other related information" when registering related websites.

2. Don't fill in too much information about yourself.

3. Choose the products of big companies to use. Can automatically help you filter out a lot of garbage.

In addition, in case ordinary people sometimes have confidential files to transmit or save through the network, there is another way: set a password for your files or emails. At present, 163 and other mailboxes have this password setting based on a single mailbox or network disk. This password only tells your recipient, and the privacy density is quite high.

To sum up, it's up to you to protect your privacy. You don't need much professional computer knowledge. Paying more attention to yourself can avoid many problems. Now I think my reaction to the accounting website may analyze my "privacy" is a bit excessive. The Internet is like our house. Even though we pay great attention to privacy protection and anti-theft, we can't be watertight after all. This is the reality, otherwise we will give up eating because of choking. How to protect your network privacy in the Internet age? Look at this question from another angle: What if the website that people have worked so hard to build leaves you an account, even if you analyze your consumption habits? Anyway, you don't have to use your real name or even fill in your phone number when you register.

How to protect your network privacy in the Internet age? Learn to sort out what you should do. To this end, we need to pay attention to the following points:

1. Don't fill in personal information easily.

2. Don't download software of unknown origin.

3. Don't send real-name articles easily.

4. Don't use your own name when registering your user name.

5. Set a highly secure password.

6. Personal computer security. Personal computers must be equipped with antivirus software and the latest system patches. Don't go to some bad websites or use any untrustworthy software, such as plug-ins.