Oyunfor General Manager Mehmet Dumanoğlu: ¨According to the latest research, it is known that digital fraud threats have increased by 46% since the pandemic. We can easily confirm this chronic problem, based on the questions and complaints of users who have recently applied to our customer service for help, and the insecurity they have experienced in online shopping as a result of bad experiences. Scammers can use ‘phishing’ e-mails, social media, SMS messages on your mobile phone, fake technical support phone calls, fake shopping sites and many similar methods. The main purpose of such frauds is; credit card theft, user login and password hacking, and even identity theft. Although digital fraudsters targeting children and the elderly continue to develop new methods every day, we felt the need to raise awareness among users by explaining commonly used methods. ¨
fake emails
In today’s most common cyber scam, “phishing” attacks, hackers try to trick users by sending phishing emails. In these emails, a cybercriminal tries to make you believe that you are logging into a trusted website, such as a government agency with which you normally do business. This could be a bank, government agency, social media account, an online shopping site, travel site, and more.
social media scam
Fake phone apps
Also called “mobile scam”, this method can take many forms, but the most common is phishing. These apps are realistically designed, just like phishing emails. saved on your phone; Your sensitive data such as passwords, photos and information from banking apps are stolen. They are mostly third-party software and applications downloaded from outside the application markets of mobile operating systems.
social engineering
Social engineering is a method of fraud by cybercriminals that relies on human interaction among themselves to enable the user to disclose sensitive information. Because social engineering targets people’s vulnerabilities, it provides attackers with a large pool of options. In this method, you share publicly; Information that does not seem harmful at first glance, such as your home address, the names of your children or pets, and the city where you were born, can be used. Fraudsters who hijack social media accounts can request money or other information by sending messages to users on the account’s friend list as if they are the owner of the account, or by blackmailing them with inappropriate messages and photos they have captured.
fake shopping sites
Using sophisticated designs and layouts, cyber thieves can create and publish fake websites that look real or that copy existing websites. Fake shopping sites can offer deals that are too good to be true. For example, you can find popular clothing brands and expensive electronic products at very low prices on the relevant website, and you may find yourself entering your card information on this site.
Surprise reward scam
This type of scam falls under the category of phishing. It can be claimed that you have won a large amount of money or a vacation in an exotic place, via email or text, simply enter your credentials to claim your prize.