6 Minute English - Could you be a victim of online fraud?

We talk about online fraud and teach you some useful vocabulary along the way.

  • Play Speed:
Content Keywords: BBC download fraud Georgina English
This is the BBC.

This podcast is supported by advertising outside the UK.

This is a download from BBC learning English to find out more visit our website.

from BBC learning English. Com

Hello, this is 6 Minute English from BBC learning English nail remembering your computer passwords you something easy to remember like my mother's maiden name all the street where I was born, but we should be more careful about online security Georgina worrying trend on the topic of this program online fraud involves using the internet to trick someone into giving away than money odata. It takes many forms from deceptive email switch trick us into paying money to the wrong bank account to the theft of credit card details.

It's regarded by some as a highly profitable and relatively low-risk crime. So in this program will be finding out why it's so easy for criminals are frauds those to steal. Our money will be learning some related vocabulary along the way question in July 2029. British men were arrested for defrauding the coronavirus job retention scheme government fund for workers who've lost their jobs and covid-19. They set up fake companies and a plaid fortunately for money, but how much money has been claimed in total through the coronavirus jumps game in the UK. Is it a 17 billion pounds be 27 billion pounds or c-37 pill in pounds.

It must be a lot. So I'll say a 17 billion pounds.

Okay, Georgina will find out later now Rachel tobac CEO of social proof security is an expert in cyber crime. She describes herself as an ethical fraudster businesses wanting to come back for employment hack into that computer systems to find that weak spots cheat on iPhone.

Reason, why were able to do that from an attacker mindset is because we use with called osint open source intelligence. We look up everything about you. We can figure out who your assistant is who your account on LinkedIn. We know what emails you use from screenshot that you put on your Instagram from a criminal mindset. Someone's way of thinking and the general attitudes and opinions, but have about something from a full set of perspectives. The most valuable thing is intelligence secret information about the government or country or in this case a person such as the information people unwittingly post on social media intelligence to build up a picture of someone's online activity that explains there are many ways of doing this.

Foodstirs have thousands of cover stories, but the end goal is always the same to trick people out of cash open sessions. Rachel says they have options for how to do that. Look in detail stolen during a date to preach from one company often using software all viruses kill malware are used to infiltrate customer Accounts at another to access people's days are frogs. Do you cover Stories full story told in order to hide the truth? For example, they may pretend to be calling from your bank or credit card company. If this comes out in a data breach on occasion when private information can be seen by people. He should not be able to see it my computer computer what can also be used to gain login details and passwords or organization in order to

Bonnet or influences collecting online information that many victims only realize what's happened after that bank accounts have been emptied find those British forces. You mentioned earlier now man who tried to defraud the coronavirus jobs retention skating remember for my quiz question. I asked you how much the scheme has paid total so far in the UK 17 billion pounds is 495000 pounds, which these frauds this trying to steal was recovered even so now I think I'm going to change my password soon back to say since re Jana in this program. We've been hearing about the rising online fraud often committed when froze this game intelligence secret information about a person posted on the internet.

That old mentality is to surreptitiously find information by creating a cover story a full story someone's house in order to hide the truth, but they might be able to access sensitive private information, which they should not be able to see an event sometimes cool that Deja Bridge mission is with the use of Mahwah computer. So flat and forests is designed to DownEast away a computer works. If you want to find out more about keeping yourself safe from online from the BBC website using the tub cybersecurity and if you like topical discussion, I want to learn how to use the vocabulary found in headlines. Why not check out our news review podcast. We also have a free app. You can download for Android and iOS

National trending topics on real life vocabulary look no further than 6 Minute English from BBC learning English. See you next time.

from BBC learning English
Translate the current page