Doxing: Your data may be at risk

Doxing: Your data may be at risk

 

A lot has changed in recent years, from technology to fashion to our consumer habits. As consequence, unfortunately, so have the measures of theft and robbery. Sadly, fraud and/or cyber theft has become so popular that many people have already been victims, and what is even worse, there is still lack of information about the most popular and recurrent modalities, as well as about the prevention and security measures to avoid being a victim of any of these.

That is why today we want to talk to you about Doxing, a cyber fraud method that has become more recurrent every day, which means money loss, as well as loss or theft of information.

Before we start, let's be clear that when we talk about fraud and/or cyber theft we refer to a compendium of techniques used by criminals, in which through digital channels, such as banking transactions, online payments or purchases, social networks or mobile applications; information or money is stolen from us.

Article Doxing Your data may be at risk img1

What is Doxing based on?

Broadly speaking, what Doxing seeks in particular is to collect sensitive information about a person for criminal purposes. The methods or channels used to collect such information are varied, from social networks, where many times without realizing it, we publish sensitive information; hacking accounts; to social engineering, where through hooks we deliver private information to malicious people, without realizing it.

What criminals do with this information can be very varied, usually lends itself to some kind of extortion, where the victim is asked for a certain amount of money in exchange for returning their information, or for not making it public on the network. More recently,  there have been cases where criminals create credit cards in the victim's name.

Article Doxing Your data may be at risk img2

Recommendations to avoid becoming a victim of Doxing

  1. Be very cautious with the information you post on social networks.

  2. Do not download applications that do not have security verification.

  3. Be suspicious of applications that request access to your contacts, location, or other sensitive information.

  4. Be wary of applications that claim to lend money, make sure they are from recognized and duly registered entities.

 

We hope that with this information you will be able to prevent you or any of your loved ones from becoming a victim of this or any other type of cyber theft or extortion.

 

Featured articles

TimeValue; The efficient and effective target management platform

"TimeValue is the ideal goal-based management platform for your organization, as it simplifies and improves all processes. This tool allows you to...

Challenges of Starting a Business in Colombia

Currently, there are great challenges to starting a business in Colombia. Yes, there are both political and social changes that change the landscape for new...

RPA in the software quality process

A few decades ago, when talking about robots, automation and artificial intelligence, it seemed that it was only in the context of science fiction...

logo linexperts blanco web

For the most strategic projects of your company, get advice from experts.

Know our data treatment policy

 

Contact us

icon telefono linexperts 601 384 17 40

icon whatsapp linexperts +57 317 3316919

icon email linexperts contacto@linexperts.com

icon ubicacion linexperts Bogotá - Colombia

icono facebook gris   icono linkedin gris   icono linkedin gris

 

This website is owned by Linexperts and developed by Agencia Internacional Shark