Home / Technology / Note: Mega-Betrug at WhatsApp

Note: Mega-Betrug at WhatsApp



Cyber ​​criminals once received the Utility of WhatsApp's Visor. With an e-mail, which is hosted by WhatsApp, wished to be sensitive and sensitive. Specifically, you need some professional professional browsing to keep the messenger for the Messenger service. The User must update their account and extend the account anyway.

>>> Postcards: WhatsApp forbids mass-posts
    

Phishing-Masche

A storyline is about a pure Phishing Mail. That application of WhatsApp has been available for 2016 for all users free of charge. Click on the link to the left, you will come to an unsafe site. To this end, the user should be sensitive data such as credit card information, bank data or the telephone number. The cyber criminals aborted this information and dropped the money into the WhatsApp user.

>>> Readers: Surrounding WhatsApp Limitations with Broadcast
    

Official Warnning of the BSI

The Betrugsmasch had in the deprotection space midway through which there was a great deal of concern that the German BSI (Bundesamt für Sicherheit in Informationtechnik) warned of the failed mail. User, who clicked on the link and gave their data pre-posted, should be able to connect with your bank, so the BSI experts.

>>> Postcards: WhatsApp has a new top feature
    

782863169649'); fbq ('track', 'PageView');

// (bs) 2017-03-01 DAILY-692 new FB version // load ('// connect.facebook.net/de_DE/sdk.js#xfbml=1&version=v2.8appId', 'fbjssdk'); // (bs) end

load ('// platform.twitter.com/widgets.js', 'tweetjs'); load ('// apis.google.com/js/plusone.js', 'plusone'); load ('// s7.addthis.com/js/300/addthis_widget.js#pubid=ra-546c9bf525facb45&domready=1', 'addthis');

load ('// widgets.outbrain.com/outbrain.js', 'outbrain');

if (typeof jwplayer! = "undefined") { window._cbv = window._cbv || []; window._cbv.push (jwplayer); } } if (w.addEventListener) { w.addEventListener ("load", go, false); } else if (w.attachEvent) { w.attachEvent ("onload", go); } } (window, document, 'script'));
Source link