Dear All, Please let’s be very careful.. There is a new HIGH TECH FRAUD in town called the SIM SWAP FRAUD, and hundreds of persons are already VICTIMS.
How does it work?
- A new fraud called SIM SWAP has started. Your phone network will momentarily go blind / zero (No Signal / Zero Bars) and after a while a call will come through.
- The Person on the other end of the call will tell you that he is calling from (your cell phone company) depending on your network and that there is a problem in your mobile network.
- He will instruct you to Please press 1 on your phone to get the network back.
Please at this stage don’t Press anything, Just cut or END the call
If you press 1, the network will appear suddenly and almost immediately go blind again (Zero Bars) and by that action, your phone is #HACKED.
Within a second they will empty your bank account, thereby causing you untold damage.
– What you will experience –
It will appear as though your line is without Network, meanwhile your SIM has been SWAPPED.
The danger here is that, you will not get any alert of any transactions, so please those of us doing USSD Banking and Mobile Banking BEWARE. Let’s be very careful.
Please, share this article to your contacts, loved ones and friends. The fraud is increasing day by day.
Message from: a Cybersecurity Group
FG Lists Benefits Of 5G Network, Insists On Deployment
The Federal government through the Nigerian Communications Commission, NCC, has further enlightened Nigerians on the benefits of the controversial Fifth Generation mobile network, 5G, to their lives, business, economy and general wellbeing.
The Commission said that the country cannot shy away from the 5G while the rest of the world is leaving it behind.
The NCC, in a statement made available on Thursday, said it was working with various stakeholders currently towards developing a policy document that will provide guidance and policy direction for 5G deployment in the country, adding that, “We have moved from 0% to 1G, 2G, 3G and 4G. The next frontier is 5G.”
While highlighting the benefits, the Commission explained that the 5G is a new global wireless standard after 1G, 2G, 3G, and 4G networks, which enables a new kind of network that is designed to connect virtually everyone and everything together, including machines, objects, and devices.
It stressed that “5G wireless technology is meant to deliver higher data speeds, ultra-low latency, more reliability, massive network capacity, increased availability, and a more uniform user experience to more users.
“5G has the potential to provide 20X faster data speeds and carries a massive amount of data for a large number of simultaneous users. So users in high-density areas – like airports, stadiums or urban areas – can still experience the fast speeds and low latency of 5G service.
“As the world replaces more and more household items with ‘smart devices’ that connect to the internet, also known as the Internet of Things, this network capacity will be critical. 5G will potentially be able to handle more than 2.5 million connected devices per square mile. 5G is a transformational change from 4G.
“5G will enhance technological development because of the extremely fast transfer rate of large quantities of data. Overall, it enables interconnected devices for instant communication. This is a new connected world of ‘Smart cities’ made possible by 5G networks.
“5G is extremely fast: it supports data transfer rates of up to 20Gbit/s, if supported by robust fibre infrastructure. On top of that, wireless data delays drop to one millisecond. This opens up the potential for multiple driverless cars, where large quantities of potentially lifesaving data have to be transferred almost instantaneously.
“5G network is designed to carry data up to 10 times faster than 4G networks. This means HD movies can be downloaded in seconds.
“5G tops out at 10 gigabits per second (Gbps). 5G is 10 to x100 faster than 4G.The use of shorter frequencies (millimeter waves between 30GHz and 300GHz) for 5G networks is the reason why 5G is so fast.
“5G has been deployed commercially and in use in some countries. As with the previous technologies, the International Commission for Non-ionizing Radiation Protection (ICNIRP) has classified radiation from 5G as non-ionizing and therefore safe for human beings.
“5G represents the future. While we have made tremendous progress since the advent of the global system of mobile communication (GSM) in Nigeria, 5G will be the bedrock of future communications.
“According to GSMA’s Policy Position on 5G spectrum, ‘5G is expected to support significantly faster mobile broadband speeds and lower latencies than previous generations while also enabling the full potential of the Internet of Things.’
“5G will revolutionize and transform our way of life. From education to agriculture, security to entertainment and governance in general. On education, 5G will transform our educational system. The availability of a fast wireless network will enable virtual learning.
“For our educators, 5G will empower them to reimagine what is possible inside and outside their classrooms. The ability to download high quality and feature-length documentary in seconds, hosting a guest speaker via hologram or tutoring students virtually in real-time will speak to a 5G powered Nigeria.
“Artificial intelligence (AI) is set to revolutionise healthcare. 5G will make it easier to determine potential diagnosis and decide on the best treatment plan.
“By moving to 5G networks, healthcare organisations can use the AI tools they need to provide the best care possible – from wherever they are in the hospital or clinic.
“5G will support businesses’ innovative ambitions and create new markets, transforming supply chain management and creating smarter, more efficient manufacturing. It is also a fundamental platform for the Internet of Things (IoT) — the rapidly expanding number of devices that collect transmit and share data via the internet.
“Studies have shown that by the end of 2020 more than half of all new businesses will rely on the “IoT” to cut costs, build efficiencies, and grow their bottom lines. However, many of the innovations 5G technology will fuel literally may not be available yet especially in Nigeria. For the “IoT” to realise its limitless potential, 5G is critical.
“5G will allow us to stream, download, and upload huge quantities of data at a much faster rate than we are currently able to. This means higher definition video either from TV or using video conferencing. Additionally, 5G is designed to facilitate a wealth of new applications for wireless technologies.
“Driverless cars and drones will be able to safely and near-instantaneously send and receive information about their surroundings that will allow them to operate safely.
“Immersive virtual and augmented realities will become increasingly feasible experiences as the large quantities of data associated with HD graphics and processing external data can be transferred between devices accurately and quickly.
“Artificial Intelligence can help predict which patients are more likely to have postoperative complications, allowing healthcare systems to provide early interventions when necessary.
“Mobile augmented reality (AR) shopping experiences will revolutionise retail, with customers able to visualize products in a local environment. In-store, AR will enable shoppers to view additional information on a product simply by pointing their phones at it.
“A key benefit of 5G could be helping businesses work more quickly and more efficiently – in turn, saving costs and increasing revenue.
“Many countries are looking to 5G to better connect rural communities, allowing more people to start businesses from home and opening up opportunities.
“The shift from hardware to a software-based network environment will bring about lower overheads for mobile operators. Those savings will, in turn, be able to be passed on to business customers.
“With network slicing, it will be possible for a business to own their own private 5G network, precisely set up according to its specific business needs. 5G will certainly have much greater capacity across a much wider range of spectrums, but it will also use that space more intelligently, assigning only the resources necessary for each application.
“Generally, Quality of Experience (QoE) by users of telecoms will improve significantly with 5G just as there has been improvement in speed and user experience from the evolutionary shift from 1G, 2G,3G and current 4G in the country.
“What will 5G do: With 5G, we would have connected cities. In the area of transport and infrastructure, we would have Smart cars, car to car communications, smart parking, traffic decongestion and smart grids amongst others.
“We can have large scale events with thousands of users connected. Improved residential connections, smart energy and smart homes, e-health for health care and hospitals. Smart farms, Smart utilities, Remote management and Multi hop.
Features of 5G
· Faster response time
· Very high capacity
· More software options to upgrade
· Ubiquitous connectivity
· Wide range of applications
· Speed up to 10Gbit/s
· Virtually ‘0’ latency
· 100 times more devices.
Benefits of 5G to Internet of Things
· Deep coverage – to reach challenging locations.
· Ultra low energy- 10+ years of battery life.
· Ultra-low complexity- 10s bits per second.
· Ultra-low high density -1 million nodes per km2.”
REVEALED! This Is How Scammers Hack Into Your Social Media Accounts
You may have wondered at one point: “How do scammers hack into my account?” Whether is on Facebook, Instagram, Twitter or Pinterest, today we’re going to expose some of the methods so you can protect yourself from now on.
How Scammers Get Into Your Facebook Account:
The most common way for a scammer to get into your account is by sending you an email claiming to be from Facebook. The message resembles the social media giant’s branding and informs you that you have many unread notifications. It could be that you have a new message from a friend, someone has added you to their list, or that people liked a particular picture on your feed.
The email invites you to check the notifications by opening your account clicking on a link provided. Once you access the link you are taken to a page that looks exactly like the Facebook login page.
Unfortunately, the page is an exact replica of the original one, so when you put in your credentials (email and password) you are just passing along your key to the gate.
Another way to hack into someone’s social media account is through third-party applications. But let’s use Twitter for that example, with a concrete case of how that works.
How Scammers Hack Into Your Twitter Account:
A lot of mobile applications in the app stores are legitimate, but there are many that are less reliable. How many times did you see your cell phone screen showing a notification such as: “[App name] would like to access your Twitter/Facebook account. Click OK to allow”.
Well, by letting questionable applications accessing your accounts you are just opening another door for hacking. We are not saying to reject every single app that needs access to your major ones, but maybe take a second to review online the legitimacy of the app you are just about to let ‘in’.
Scammers initially hack into these less-trustful apps and then log into your Twitter or any other app that has access to.
How Scammers Hack Into Your Pinterest Or Instagram Account:
This way of hacking works for all social media networks as well, but for the sake of the example let’s use Pinterest.
The scammers get access to your account via email. Branded just like it would come from the Pinterest offices, the email says that someone is trying to access your account in Argentina (or any other country, for that matter). Indeed, the message asks if that was you – just like any other platform does.
As many people who are concerned about their accounts being hacked into, you may be clicking the button “That was not me”. If you then immediately take to a page that looks exactly like the Pinterest login page – similar to the Facebook Notification scam described above.
Needless to say, once you put in your credentials, you are offering scammers access to your account.
How To Avoid The Facebook/ Twitter/ Pinterest/ Instagram Hacking:
Although you probably hear this many times, change your password to your accounts every 6-8 weeks. There are too many social media accounts to keep track of their passwords, but here is a good tip:
Set your password having a couple of capital letters in the beginning and a number at the end, followed by a special character (punctuation mark). For example EMekaAdeleke36-. You should always remember that. When time comes to change the password, change just the number, from 36 to 37. And so on. This way you will only have to remember one character, while the old password is just not the same.
5 Methods Hackers Use To Break Into Your Bank Account
With so many users making the jump to internet banking, it’s no wonder that hackers are on the hunt for login details. What may be surprising, however, are the lengths that hackers go to in order to access your finances.
Here’s a look at how hackers target your bank account and how to stay safe.
1. Mobile Banking Trojans
These days, you can manage all of your finances from your smartphone. Usually, a bank will supply an official app from which you can log in and check your account. While convenient, this has become a key attack vector for malware authors.
The simpler means of attack is by spoofing an existing banking app. A malware author creates a perfect replica of a bank’s app and uploads it to shady third-party sites. Once you’ve downloaded the bad app, you enter your username and password into it, which is then sent to the hacker.
The sneakier version of this is the mobile banking Trojan. These aren’t disguised as a bank’s official app; they’re usually a completely unrelated app with a Trojan installed within. When you install this app, the Trojan begins to scan your phone for banking apps.
When it detects a banking app being launched, the malware quickly puts up a window that looks identical to the app you just booted up. If this is done smoothly enough, the user won’t notice the swap and will enter their details into the fake login page. These details are then uploaded to the malware author.
Typically, these Trojans also need an SMS verification code to complete the hack. To do this, they’ll often ask for SMS read privileges during install, so they can steal the codes as they come in.
How to Defend Yourself
When downloading apps from the app store, keep an eye on the amount of downloads it has. If it has a very low amount of downloads and little to no reviews, it’s too early to call if it has malware or not.
This goes double if you see an “official app” for a very popular bank with a small download count—it’s likely an imposter!
Likewise, be careful with what permissions you give apps. If a mobile game asks you for SMS read permissions with no explanation as to why it wants them, stay safe and don’t allow the app to install. Never install apps from third-party sites, as they’re more likely to contain malware.
As the public becomes savvy toward phishing tactics, hackers have escalated their efforts to trick people into clicking their links. One of their nastiest tricks is hacking the email accounts of solicitors and sending phishing emails from a previously-trusted address.
What makes this hack so devastating is how hard it would be to spot the scam. The email address would be legitimate, and the hacker could even to talk to you on a first-name basis. This is exactly how an unfortunate home buyer lost £67,000, despite replying to an email address that was previously legitimate.
How to Defend Yourself
Obviously, if an email address looks suspicious, treat its contents with a healthy dose of skepticism. If the address looks legitimate but something “seems off,” see if you can validate the email with the person sending it—preferably not over email, in case the hackers have compromised the account!
Hackers can also use phishing, among other methods, to steal your identity on social media.
This method of attack is one of the quieter ways a hacker can gain access to your bank account. Keyloggers are a type of malware that records what you’re typing and sends the information back to the hacker.
That might sound inconspicuous at first, but imagine what would happen if you typed in your bank’s web address, followed by your username and password. The hacker would have all the information they need to break into your account!
How to Defend Yourself
Install a stellar antivirus and make sure it checks your system every so often. A good antivirus will sniff out a keylogger and erase it before it can do damage.
If your bank supports two-factor authentication, be sure to enable this. This makes a keylogger far less effective, as the hacker won’t be able to replicate the authentication code even if they get your login details.
4. Man-in-the-Middle Attacks
Sometimes, a hacker will target the communications between you and your bank’s website in order to get your details. These attacks are called Man-in-the-Middle (MITM) attacks, and the name says it all; it’s when a hacker intercepts communications between you and a legitimate service.
Usually, an MITM attack involves monitoring an insecure server and analyzing the data that passes through. When you send your login details over this network, the hackers “sniff out” your details and steal them.
Sometimes, however, a hacker will use DNS cache poisoning to change what site you visit when you enter a URL. A poisoned DNS cache means that www.yourbankswebsite.com will instead go to a clone site owned by the hacker. This cloned site will look identical to the real thing; if you’re not careful, you’ll end up giving the fake site your login details.
How to Defend Yourself
Never perform any sensitive activities on a public or unsecured network. Err on the side of caution and use something more secure, such as your home Wi-Fi. Also, when you log into a sensitive site, always check for HTTPS in the address bar. If it’s not there, there’s a good chance you’re looking at a fake site!
If you want to perform sensitive activities over a public Wi-Fi network, why not take control of your own privacy? A VPN service encrypts your data before your computer sends it over the network. If anyone is monitoring your connection, they’ll only see unreadable encrypted packets.
5. SIM Swapping
SMS authentication codes are some of the biggest problems for hackers. Unfortunately, they have a way to dodge these checks, and they don’t even need your phone to do it!
To perform a SIM swap, a hacker contacts your network provider, claiming to be you. They state that they lost their phone, and that they’d like a transfer of their old number (which is your current number) to their SIM card.
If they’re successful, the network providers strips your phone number from your SIM and installs on the hacker’s instead.
Once they have your number on their SIM card, they can circumvent SMS codes easily. When they log into your bank account, the bank sends an SMS verification code to their phone rather than yours. They can then log in to your account unimpeded and drain your account.
How to Defend Yourself
Of course, mobile networks typically ask questions to check if the person requesting the transfer is who they say they are. As such, to perform a SIM swap, scammers typically harvest your personal information in order to pass the checks. Even then, some network providers have lax checks for SIM transfers, which allowed hackers to easily perform this trick.
Always keep your personal details private to avoid someone stealing your identity. Also, it’s worth checking if your mobile provider is doing their part to defend you from SIM swapping. If you keep your details safe and your network provider is diligent, a hacker will fail the identification check when they try to SIM swap.
Keeping Your Finances Safe Online
Internet banking is very convenient for both customer and hacker alike. Thankfully, you can do your part to ensure you’re not a target of these attacks. By keeping your details safe, you’ll give hackers very little to work with when they take aim at your savings.
- Biafra News7 days ago
We Do Not Expect Everybody To Support Biafra Agitation — Nnamdi Kanu
- Metro5 days ago
VIDEO: “My Wife Believed In Me When I Had Nothing, That’s Why She Owns Part Of Coscharis Group” — Billionaire Businessman, Cosmos Maduka
- News5 days ago
Place Magu On Watch-List So He Won’t Run Away — Fayose Alerts DSS, Army, Others
- Gist6 days ago
Hushpuppi Reportedly Hires Micheal Jackson’s Former Lawyer, Mark Geragos
- News7 days ago
Hushpuppi: I Am Ready To Go To Jail If… — Dogara
- News6 days ago
JUST IN: Ibrahim Magu Told To Step Aside As EFCC Chair
- News5 days ago
EFCC Chairman, Magu Reportedly Detained
- News3 days ago
I Never Received ₦4 Billion From Magu — Osinbajo