Learn how secure mobile banking!
For the preparation of the kind of crimes committed in mobile financial services and mobile banking, criminals take about three months and the commission only takes three minutes. This crime happens very quickly, that is, most of the parties are out of control.
However, in the case of special use of technology, it is possible to bring the criminals under the law, said additional inspector general of police (acting in the Economic Crime Branch of the crime investigation department), Shah Alam.
In the 'Financial Inclusion in Bangladesh: Opuracteristics, Challenges and Way Forward Through Digital Financial Services' seminar organized by 'Telecom Reporters Network Bangladesh' (TRNB) at a restaurant in Gulshan, Dhaka.
Source
Additional Inspector General of Police Shah Alam gave a detailed account of the crimes, causes and remedies related to the financial and financial services of the mobile phone.
In the case of Shah Alam Seminar, Mobile Banking was used extensively in Hyundaibasa / Thailand-based human trafficking by capturing Bangladeshi expatriates in the name of cheating and fraud in the name of Poketama Group, fraudulent in the name of fraudulent party, cheating in the name of fraudulent jihan betting, job or dealership, or hostage by the pirates of the Sundarbans. Ransom, child or adult people Imi Ransom, master of all the saints-monks, died Group fraud, Judge sahib, please call, or the threat of fraud and fake security cell group from the guys asking for a refund of the incident referred to by Flexi.
He said, have to be careful about these. Because these crimes prove and thus are being cheated. After knowing these, many people are being cheated like this.
Source
The Additional Inspector General of Police has long been involved in investigating the crimes related to mobile phones (especially monetary genres), using clonasim or clone like SIM (cloning SIM usage, use of website, call of last 6 digits).
He said this is the way to get rid of it: Calling from phone book without calling a call from call log. If there is a problem then it is possible to catch. Police officer Shah Alam also said, hacking the ID of ID by using the name of the ID of the hack is also used by the mobile banking system. Besides, it is a matter of increasing the number of examinations and sending money from the different operators to the customer through the development. In fact, these fraud cases are happening in the mobile phone market.
Source
He referred to a casestadi, said that the cybercrime manipulated the money from the mobile phone's tactics. If you do not know this strategy, you can easily take a large amount of money at any time.
Source
In search of Shah Alam, who has taken money from mobile phones, the main person of the burglar should be the target agent (person) of Kamlad (associates) and collect sample signature of the registration form of a target agent from the mobile operator or their third party agents. Do it.
This post has received a 0.21 % upvote from @drotto thanks to: @techtools.
Thank You Very Much .Friend i like it your all post -good job thanks
Congratulations @techtools! You have completed some achievement on Steemit and have been rewarded with new badge(s) :
Award for the number of posts published
Click on the badge to view your Board of Honor.
If you no longer want to receive notifications, reply to this comment with the word
STOP
To support your work, I also upvoted your post!
Do not miss the last post from @steemitboard!
Participate in the SteemitBoard World Cup Contest!
Collect World Cup badges and win free SBD
Support the Gold Sponsors of the contest: @good-karma and @lukestokes