There are several ways in which cyber criminals commonly use:

EXPLORE

This involves sending emails to deceive the recipient into believing that they are from a legitimate and trustworthy source, when in fact they are not.

Email Spoofing

 Cyber criminals send harmful applications and files through various means such as direct messaging, gaming, emails or websites, in order to gain access to personal data stored on a device.

Malicious Files Applications

This is a technique used by cyber criminals to gain the trust of an individual and obtain information from them. For example, a cyber criminal may impersonate another person with similar interests and engage in conversation to extract information.

Social Engineering

This refers to the harassment or bullying of an individual through electronic devices such as computers, mobile phones, and laptops.

Cyber Bullying

This is the deliberate use of someone's identity to gain financial advantage or obtain credit and other benefits in the other person's name, causing harm to the victim.

Identity Theft

This involves fraudulent representation or deceptive activities by employees or prospective employees towards their employers.

Job Frauds

Cyber criminals may fraudulently obtain money from depositors by posing as a bank or other financial institution.

Banking Frauds