Users receive a message on their mobile phone from a contact in the address book, who in turn has already fallen into the trap: what to do
The new scam in WhatsApp refers to the six-digit code: maximum attention to avoid unpleasant surprises. The scam implemented in the well-known messaging service is being depopulated in Italy and would be affecting thousands of users throughout the country. The alarm comes today from Consumerismo No Profit, a consumer association specialized in technology, which reports that the cyber-scam in question is registering an increasing number of victims in a kind of chain of letters that is getting bigger every day.
How does the scam in question work? The “6-digit code” scam runs on WhatsApp and uses the unique code (consisting of six digits) needed for fast transfer of the messaging app when we change the smartphone or phone number, Avv explains. Piera Di Stefano, Head of the Department of Digital Law of the association – Users receive a message on their mobile phones from a friend present in the address book contacts – in turn already fallen into the trap – in which it is stated that they have sent a code by mistake via sms, asking to return the 6 numbers of the same code. Whoever complies with the request opens the link received via text message but, by doing so, opens the door to cybercriminals who enter the WhatsApp profile of those who fall into the deception and can access personal data, credit card access codes and current. accounts, and the column, through which other potential victims fish with the same stratagem of the false message of help – adds the lawyer. Di Stefano – A very dangerous scam that causes not only identity theft, but also the emptying of checking accounts and unauthorized expenses through cards and ATMs ”.
Just to help users avoid encountering the 6-digit code scam, here is a practical guide with tips to follow to protect your personal data. Never provide your personal data by phone or email, even if those who contact us qualify as friends, acquaintances or operators
of our banking institution, and even if we are asked to change our password because there has been an abnormal access attempt to our Online Account. Never click on links in text messages and emails that appear to come from people or entities (banks, companies) that we know. Those links may contain malicious software capable of taking possession of all our data, documents, information present on our devices or directing us to cloned sites that, once our personal and financial data have been collected, disappear into thin air.We must always protect our accounts online, wherever it is possible to do so, with two-step verification or two-factor authentication. Based on this mechanism, which also applies to WhatsApp, after entering the password, a code is sent via text message to our mobile phone and the account will be accessible only after entering it. It is also necessary to activate alerts, that is, notifications via sms or via e-mail of anomalous accesses to our accounts, by unknown devices. These codes are strictly personal and should never be shared. When you have to get rid of paper documentation that contains data and personal information, destroy it avoiding that it can be reassembled and therefore that you can read and be able to read the content;
And again: using privacy filters on personal social profiles and not publishing your data, including mobile phone numbers and identification documents, is always a good idea. Never send your identification documents or other documentation that contains personal, banking, health and similar data through instant messaging platforms (WhatsApp, Messenger, Telegram, etc.). Always avoid storing your identification, health, financial or banking documents on a portable device (PC, smartphone or tablet). If necessary, save them only on a PC, “protecting” them with an access code. In case of loss of your identification documents or if you discover that you have been a victim of identity theft, go immediately to the police, also to prevent more possible victims of the chain, in the first case to formalize the report and in the second case to file a complaint.
Exploring the Top 5 Voice AI Alternatives: What Sets Them Apart?
The Rise of Spatial Computing: Evolution of Human-Computer Interaction
Data Loss on Windows? Here's How Windows Recovery Software Can Help
Integrating Widgets Seamlessly: Tips for Smooth Implementation and Functionality
School sports days are a fun event for all students, but it’s important that the…