A man from Osijek buys a mobile phone over the internet and arrives in a brick package – economy

A man from Osijek buys a mobile phone over the internet and arrives in a brick package - economy

“I think I’re perfectly literate on the internet. I spent many hours a day on my smartphone and laptop, and in recent years I have bought at least 50 times, but sold goods by contract through social networks. Everything worked fine, and a few times I told myself – what a fool and fool you are. The voice of Slavonia 52-year-old from Osijek Retail.

He focused all his attention on communicating with the “seller”, but closed the profile on the social network where they communicated.

As she told him, the person he arranged for the purchase from was from the Zamorin area, and the package arrived from Stobray, near Split. He did not call the police.

He ordered a computer part and got a curved mouse

In another case, the damage was not so great, he ordered a part for a computer for 80 kuna, and he also got a plastic winding mouse in the package.

“I know it’s my fault, because most of the business on social networks is done by faith. Another mistake we make is not through direct phone calls, although we are not sure.” He said.

As souvenirs in the cafe he left the brick and the curved mouse, decorated the brick with the word “fool”, and added the mouse “jerk.”

He says everyone laughs well when they see it on the shelf behind the bar. Because of the package from March, he gets a nickname from a friend – Brick.

Seven types of corruption

Advised on how the police classify the seven most commonly used scams and how to avoid them.

The first is a CEO or director scam, where fraudsters deceive you into depositing money into a fake account or illegally transferring money from a business account, pretending to be your bosses or bosses.

Second, fraud is when you pretend to be your customer or supplier and deceive you into paying future bills to another bank account.

See also  Why the need for new IT rules? - Bombay High Court to Central Government | The Information Technology (IT) Rules

The third method of fraud is identity theft, in which criminals use “wishing” – in which they call you on the phone and try to force you to reveal or pay for your personal, financial or security information. “Phishing” is online identity theft with fake emails, and “smashing” is identity theft via SMS.

The fourth way is through bank fake websites: A fake bank email with a link to the fake website is used. Once you click on the link, various methods will be used to collect your financial and personal data.

In romantic scams, cheaters are interested in a romantic relationship. They usually occur on dating sites, and cheaters often use social media or email.

The sixth method of fraud is personal data theft, where fraudsters collect your personal data through social media channels.

The last one is the investment scam and the online shopping scam: they make you think you are on the path to a smart investment … or they give you a better but fake offer.

Written By
More from Josh Atkinson
Owen Backup raised $ 167.5 million, valued at $ 1.4 billion
Company Own backup, Developing cloud backup and data recovery solutions, it raised...
Read More
Leave a comment

Your email address will not be published. Required fields are marked *