EXPLORE
This involves sending emails to deceive the recipient into believing that they are from a legitimate and trustworthy source, when in fact they are not.
Cyber criminals send harmful applications and files through various means such as direct messaging, gaming, emails or websites, in order to gain access to personal data stored on a device.
This is a technique used by cyber criminals to gain the trust of an individual and obtain information from them. For example, a cyber criminal may impersonate another person with similar interests and engage in conversation to extract information.
This refers to the harassment or bullying of an individual through electronic devices such as computers, mobile phones, and laptops.
This is the deliberate use of someone's identity to gain financial advantage or obtain credit and other benefits in the other person's name, causing harm to the victim.
This involves fraudulent representation or deceptive activities by employees or prospective employees towards their employers.
Cyber criminals may fraudulently obtain money from depositors by posing as a bank or other financial institution.