“I think I’re perfectly literate on the internet. I spent many hours a day on my smartphone and laptop, and in recent years I have bought at least 50 times, but sold goods by contract through social networks. Everything worked fine, and a few times I told myself – what a fool and fool you are. The voice of Slavonia 52-year-old from Osijek Retail.
He focused all his attention on communicating with the “seller”, but closed the profile on the social network where they communicated.
As she told him, the person he arranged for the purchase from was from the Zamorin area, and the package arrived from Stobray, near Split. He did not call the police.
He ordered a computer part and got a curved mouse
In another case, the damage was not so great, he ordered a part for a computer for 80 kuna, and he also got a plastic winding mouse in the package.
“I know it’s my fault, because most of the business on social networks is done by faith. Another mistake we make is not through direct phone calls, although we are not sure.” He said.
As souvenirs in the cafe he left the brick and the curved mouse, decorated the brick with the word “fool”, and added the mouse “jerk.”
He says everyone laughs well when they see it on the shelf behind the bar. Because of the package from March, he gets a nickname from a friend – Brick.
Seven types of corruption
Advised on how the police classify the seven most commonly used scams and how to avoid them.
The first is a CEO or director scam, where fraudsters deceive you into depositing money into a fake account or illegally transferring money from a business account, pretending to be your bosses or bosses.
Second, fraud is when you pretend to be your customer or supplier and deceive you into paying future bills to another bank account.
The third method of fraud is identity theft, in which criminals use “wishing” – in which they call you on the phone and try to force you to reveal or pay for your personal, financial or security information. “Phishing” is online identity theft with fake emails, and “smashing” is identity theft via SMS.
The fourth way is through bank fake websites: A fake bank email with a link to the fake website is used. Once you click on the link, various methods will be used to collect your financial and personal data.
In romantic scams, cheaters are interested in a romantic relationship. They usually occur on dating sites, and cheaters often use social media or email.
The sixth method of fraud is personal data theft, where fraudsters collect your personal data through social media channels.
The last one is the investment scam and the online shopping scam: they make you think you are on the path to a smart investment … or they give you a better but fake offer.
Problem solver. Incurable bacon specialist. Falls down a lot. Coffee maven. Communicator.