00:00There are some links in the public domain.
00:04Basically, this is a malware.
00:07There is a link here that has a photograph that is coded with the virus.
00:13So, just like this link you can click,
00:15you can hack the whole phone,
00:17you can hide all your data.
00:21And that data is also possible.
00:23Your bank details, your account details,
00:25your login passwords,
00:27your PIN codes to credit cards and debit cards.
00:31And our idea is that we keep it safe,
00:34in some notes or somewhere.
00:37In case you have permanently saved it,
00:42your login password,
00:44you can save it forever,
00:47automatically, next time,
00:49when you fill it,
00:50the form will be filled up.
00:53So, in such cases,
00:55you can save data.
00:57And then,
00:58after that,
00:59there is such a virus
01:01that can create fake apps.
01:04And then,
01:06it can remotely use or misuse
01:09on your phone,
01:11or your device,
01:12which has been hacked.
01:14And lastly,
01:16it can also be shared with your phone,
01:18through the rest of the phone,
01:19through the rest of the phone,
01:20it can also be shared with the data.
01:22Like,
01:23you have a very close friend.
01:24Yes.
01:25If I send a link to you,
01:27please click it and see,
01:29he will definitely open it.
01:30Right?
01:31So,
01:32what will happen?
01:33You have not sent it,
01:35but,
01:36it can remotely send it.
01:37So,
01:38this chain is created,
01:39so,
01:40it can be changed,
01:41and it can be improved.
01:42and continue.
01:43First,
01:44first of all,
01:45let's see,
01:46how many links
01:47are shown,
01:48in which way?
01:49I mean,
01:50in addition,
01:51there are many links
01:53that can be seen.
01:54It can be seen,
01:56as well,
01:57there is no,
01:58no,
01:59no,
02:00no,
02:01no,
02:02no,
02:03no,
02:04no,
02:05no,
02:06no,
02:07difference
02:09if something has made some fake app.
02:10You think it is,
02:12it is your Indescent Bank.
02:14Just giving example,
02:15Indescent Bank has changed a lot
02:18and after,
02:20that,
02:22people think it is similar looking,
02:25they start operating by this.
02:27Once it clicks,
02:31then,
02:32we've shared everything,
02:33as well as you can use your data,
02:35If we are all vulnerable to cyber attacks because we have more time for social media and through our communication maximum.
02:50In that case, if you have clicked the link and you think it was a wrong link, I have not verified it.
02:59So, without verifying, please don't click on anything.
03:05And it will be good if you are going to go to WhatsApp settings and automatically download it.
03:14In case it has clicked, in that case, you will put the phone into airplane mode,
03:20first of all the internet connections and communications.
03:24Then, go to settings and check the apps.
03:28So, if you have any unknown apps, you can uninstall it.
03:32Then, your bank details, logins, passwords, gmail, ids, passwords,
03:39all the passwords, all the PIN codes to the credit card, debit cards, will change.
03:43Immediately change.
03:45Then, your antivirus scan, that is also very important.
03:49And lastly, it will be necessary to report on cybercrime.in.
03:57Do I have any numbers specific?
03:59One is one nine three zero.
04:01Which is Pan India, which is one of our users.
04:05And, like cybercrime is interlinked.
04:09There are new accounts,
04:11phone numbers,
04:13which is the first time you'll be able to do.
04:14So, the first time you'll get a new account that you have on the internet connection.
04:23So, please use this platform.
04:24And, report maximum.
04:25If you don't want to get a new account,
04:26you'll need to get a new account.
04:27So, please do not click on any link.
04:28And, do not click on any link.
04:30report maximum my submission is to the general public is he please don't click
04:36on any link and up though teen minute socially in case of the way stress call
04:43at the case is stranger say you can see known number say we have to cross check
04:47verifying just stay safe
Comments