Stop doing it! 3 behaviors that risk falling victim to scammers

Stop doing it! 3 behaviors that risk falling victim to scammers

Stop doing it! 3 behaviors that risk falling victim to scammers

Stop doing it! 3 Behaviors that risk falling victim to fraudsters Today, cyber threats have surpassed the limits of technical attacks. Gone are the eras of the exploitation of human behavior through regular activity on social media. Fraudsters have changed from trying to break into highly secure systems. It is a collection of information from “Digital Footprint” that users leave in public areas without being careful This risk arises from the habit and habit of disclosing personal information to the public, which reduces the “safe space” for users. Understanding these behaviors is therefore not just a matter of personal prudence. But it is the heart of technological disaster prevention. Risky behavior and information exploitation Three popular behaviors in Thai society It has become a critical vulnerability that criminals use as the starting point of the cybercrime cycle as follows: Disclosing contact information during live viewing: Typing your name, address, and telephone number in the comments field to order products. This information is collected and used in the phishing process with high accuracy. Or fraud in the form of COD Scam (illegal cash-on-delivery package) where scammers will send products that were not ordered to the listed address in order to trick them into collecting money. Disclosing identity information on the horoscope page: specifying the date, month, year of birth and time of landing. These data are the keys to Security Question Bypass or password guessing. They are also used in social engineering to create credibility in deceiving scammers into being government officials or people who know the victim's information. Disclosure of financial information in prize giving/donation activities: Specifying bank account number with real name and surname. Risk of having your information used in the money laundering process. or being impersonated in the account name in gray transactions This may result in the account owner being prosecuted for “horse accounting” and facing investigation by the Anti-Money Laundering Agency. When these 3 pieces of information are put together Fraudsters are able to create complete profiles of their victims to use in targeted and difficult-to-prevent attacks. Conclusion Cybersecurity in the modern world is not about antivirus software. But it is a matter of “Discipline in Disclosure” Even a moment's carelessness in publishing information in a public space can lead to irreparable loss. Your personal information is your most valuable asset. And when it leaks out It will become a weapon that criminals use to come back and destroy you. CR: Office of the Permanent Secretary, Ministry of Education

Scroll to Top