0% found this document useful (0 votes)
31 views7 pages

Final PDF Cybercrime

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
31 views7 pages

Final PDF Cybercrime

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 7

[INTRODUCTION]

Anchor (Your Name):


"Hello everyone! My name is [Your Name], and we are proud to be here today representing
Trinity Institute of Professional Studies. We are currently in our third year of BCA, and
today, we’ve gathered to discuss something that affects us all—cybercrime and how we can
protect ourselves from it."

Anchor:
"But before we dive in, we want to show you a quick video that you might have come across
before. Let's watch this together!"

[VIDEO SEGMENT]

Anchor:
"You just saw what happened in that video—a crime, but not just any crime, a cybercrime."

Understanding Cybercrime

Anchor:
"Now, let's break it down. Do you all know what cybercrime really means?"

Explanation:
"Cybercrime refers to illegal activities carried out using computers or the internet. It’s not just
limited to hacking; it covers a wide range of activities, such as:

 Stealing and selling corporate data


 Demanding payment to prevent an attack, often through ransomware
 Installing viruses or malware on someone’s device
 Hacking into government or corporate systems to steal sensitive information"

Who Are the Culprits?

Anchor:
"And who are the people behind these cybercrimes? Let’s take a closer look:"

1. Hackers and Crackers:


o Skilled individuals who exploit system vulnerabilities. Black-hat hackers do
this for malicious purposes.
2. Cybercriminal Groups:
o Organized groups engaging in activities like phishing, ransomware, and
financial fraud—often operating across international borders.
3. Insider Threats:
o Employees misusing their access to steal data, trade secrets, or sabotage
systems, often driven by financial gain or revenge.
4. Script Kiddies:
o Inexperienced individuals using pre-made tools to hack systems for fun,
without much technical skill.
5. Nation-State Actors:
o Government-backed hackers involved in cyber espionage to gain strategic
advantages.
6. Hacktivists:
o Individuals promoting social or political causes through cyberattacks like
DDoS or website defacement.
7. Cyber Terrorists:
o Terrorist groups using cyber attacks to spread fear or target critical
infrastructure.

Famous Celebrities Who Fell Victim

Anchor:
"Even some of the biggest names aren’t immune to cybercrime. Did you know that Alia
Bhatt, Katrina Kaif, Shantanu Maheshwari, and even celebrities like Beer Biceps
(Ranveer Allahbadia) have been victims of hacking and data breaches? It just goes to show
that anyone can be targeted."

How Can We Protect Ourselves?

Anchor:
"So, the real question is—how can we protect ourselves? The answer is by being cyber
aware. Staying informed and vigilant is the first step to safeguarding yourself from cyber
threats."

Common Scams That Affect Us Daily

Anchor:
"Let's now take a look at some of the most common scams that affect everyday people on a
daily basis. These are scams that we’ve all heard of or might have even experienced:"

1. Chinese Loan Apps:


o Fraudulent apps that lure people into borrowing money, then harass them for
repayment with exorbitant interest.
2. Insurance Fraud:
o Scammers impersonate insurance agents, offering fake policies to
unsuspecting customers.
3. OLX Fraud:
o Scammers pose as buyers or sellers on platforms like OLX, tricking people
into making payments without ever delivering the product.
4. Nigerian Prince Scam:
o An old but still prevalent scam where fraudsters pretend to be from foreign
royalty needing help to transfer funds.
5. Sextortion:
o Hackers gain access to private photos or videos and threaten to release them
unless paid.
6. Telegram (Fake Work-from-Home Offers):
o Scammers lure people with fake job offers on Telegram, asking for a deposit
fee to start work.
7. Job Fraud & KBC Lottery Scams:
o Scammers call victims, claiming they've won a KBC lottery or a high-paying
job, and ask for a "processing fee."

Conclusion: Stay Cyber Safe!

Anchor:
"So, to wrap things up—cybercrime is real, and it’s happening all around us. But with a
little awareness and the right precautions, we can protect ourselves from falling victim."

Final Message:
"Remember, the internet is a powerful tool, but it’s up to us to use it safely. Stay alert, stay
informed, and most importantly, stay cyber safe! Thank you, everyone, for your time and
attention."

Topic 1: Instagram Hacked Accounts & Fraud Trading

Tamanna:
"Let's start with something that I am sure many of you use daily—Instagram. Raise your
hands if you love scrolling through Insta stories or posting pictures. But, what if I told you
that hackers can take over your Instagram account and use it for promoting scams?"

Punchline:
"Don't let the blue checkmark fool you, because a hacked account is not a verified one
anymore!"

Teaching Segment:

 Hackers often get access to Instagram accounts using phishing emails or weak
passwords.
 Once they control your account, they might promote fake trading schemes or crypto
frauds to your followers.
 Prevention Tips:
o Use two-factor authentication (2FA).
o Never click on suspicious links, even if they seem to come from friends.
o Use a strong, unique password.

Topic 2: Facebook Fraud & Fake Shops

Tamanna:
"How many of you have come across amazing deals on Facebook? Too good to be true,
right? Well, sometimes, they really are! Let's talk about fraud shops on Facebook."

Punchline:
"Just because it's in your feed, doesn’t mean it should be in your cart!"

Teaching Segment:

 Scammers create fake Facebook pages and run ads to lure people into buying non-
existent products.
 They often disappear once they’ve collected enough money from unsuspecting
buyers.
 Prevention Tips:
o Verify the authenticity of shops by reading reviews.
o Never trust deals that seem too good to be true.
o Use secure payment methods and avoid direct bank transfers.

Topic 3: OTP Scams, Share & Win, and Fake Email Links

Tamanna:
"Now, let’s talk about something that targets our excitement for freebies—'Share and Win'
schemes, OTP scams, and those oh-so-convincing fake email links!"

Punchline:
"Free rewards are never truly free—especially if they cost your bank balance!"

Teaching Segment:

 Scammers might trick you into sharing your OTP, claiming to verify your account.
 ‘Share & Win’ schemes can sometimes be a front to steal personal information.
 Fake emails might look like they’re from reputable companies but lead you to
phishing websites.
 Prevention Tips:
o Never share OTPs with anyone, even if they claim to be from customer
support.
o Double-check the email addresses of senders.
o Avoid clicking on links from unknown sources.
Topic 4: Clickjacking

Tamanna:
"Now, here's something that sounds funny but is actually quite dangerous—clickjacking."

Punchline:
"One wrong click, and you're tricked! Clickjacking is no laughing matter!"

Teaching Segment:

 Clickjacking happens when hackers hide malicious links behind legitimate buttons or
images.
 You might think you're clicking to ‘Play’ a video, but in reality, you're authorizing
access to your social media.
 Prevention Tips:
o Always hover over links before clicking.
o Use ad-blockers and keep your browser updated.

Topic 5: Juice Jacking

Tamanna:
"We all love free charging ports, especially at airports or malls, but beware! You might just
be ‘juiced out’ with juice jacking."

Punchline:
"The only juice you should trust is from the fruit shop—not the USB port!"

Teaching Segment:

 Juice jacking involves hackers accessing your device through compromised USB
charging stations.
 They can steal your data or install malware on your phone without your knowledge.
 Prevention Tips:
o Use your own charging cable and adapter.
o Invest in a USB data blocker.
o Charge from a power outlet, not public USB ports.

Topic 6: Keeping Your Mobile Secure

Tamanna:
"Our phones are like a second brain; we store everything in them—photos, bank details, even
secrets. But how safe are they?"

Punchline:
"A locked phone is a happy phone!"
Teaching Segment:

 Always keep your phone's software updated to patch security vulnerabilities.


 Use biometric locks or PINs that are hard to guess.
 Install trusted security apps and regularly scan for malware.

Topic 7: Safe Use of Social Media

Tamanna:
"Social media is fun, but it’s also a place where strangers can learn more about you than you
might want them to."

Punchline:
"If they know your dog's name, your favorite color, and where you live—it's not a friend; it's
a stalker!"

Teaching Segment:

 Set your profiles to private.


 Be mindful of what you share, especially location tags.
 Report and block suspicious accounts.

Topic 8: Importance of Strong Passwords

Tamanna:
"Now, the most basic but often ignored tip—using strong passwords."

Punchline:
"If your password is ‘password123’, you might as well give the hackers an open invitation!"

Teaching Segment:

 Use passwords that combine uppercase, lowercase, numbers, and special characters.
 Avoid using obvious passwords like birthdays or names.
 Use a password manager to keep track of your passwords.

Conclusion Tamanna:
"And that's a wrap, folks! Remember, the internet is a fantastic place, but only if you use it
wisely. Stay smart, stay safe, and most importantly—keep your personal information
protected!"

Final Punchline:
"Be the boss of your online life; don't let a hacker steal your spotlight!"
Interactive Activity:

 End the session with a quick quiz to reinforce the learnings. Offer small prizes for
correct answers.

Closing Note:
"Thank you all for being such an interactive audience. Let’s be vigilant and make the internet
a safer place for everyone! Have a great day, and stay cyber-safe!"

You might also like