FAQs

FAQs


An alarming 91% of hacking attempts today begin with some kind of phishing attack, which uses email and social-engineering to gain access to confidential data. Hackers attempt to dupe recipients into opening an attachment, clicking ona link, divulging confidential information or even wiring money to a fraudulent account.

Essentially, it is human nature that makes us so vulnerable – we desire to behelpful, have a tendency to trust people we don’t know, and have a fear of getting into trouble, which are all traits that social engineers are able to capitalise on.

Embedding a link in an email/SMS/WhatsApp message that redirects a person to an unsecure website that requests sensitive information is common and mostused method of phishing.

Installing a Trojan via a malicious email attachment or ad which will allow the intruder to exploit loopholes and obtain sensitive information, Spoofing the sender address in an email to appear as a reputable source and request sensitive information are other methods of phishing.

Phishing messages often use language that creates a false sense of urgency, trying to trick you into acting quickly without thinking

No, the information submitted here would only be forwarded to the respective organisations/LEAs to help streamline the resolution for the financial fraud that you have claimed you have faced.

Please visit the ‘Associate with Us’ section on the Sticky Bar for the same.

You will have to contact the nearest police station where you are supposed to file an FIR to know the status of your resolution.

Blogs and Advisory

Partners