Skip to playerSkip to main content
  • 5 minutes ago
आगरा में SIR केवाईसी के लिए साइबर क्रिमिनल ने कई लोगों के मोबाइल पर APK फाइल्स भेजी हैं.

Category

🗞
News
Transcript
00:00Look, as you all know that the cyber thug is changing in the world,
00:06the nature of cyber crime also changes the nature of cyber crime.
00:10In the time of the time, you all know that it is a season.
00:14So, people often use a card with a different type of digital form.
00:18So, this is the advantage of the cyber fraud.
00:21They also send some AP files in the name of the family.
00:24After clicking, people will have cyber thug.
00:27In the same way, some of these things have come in front of the SIR.
00:33Some APK files have been forwarded to the social media.
00:37After clicking on it, it was a fraud.
00:40If you talk about APK files, these files are the same.
00:43If you click on it, it is open to your phone's background.
00:51And your data, without your knowledge and knowledge,
00:56you can share it with third-party.
00:58So, you can share it with your phone, your device,
01:01whatever your private data and details are,
01:06you can use them to make a thug.
01:08Look, if someone sends you a card,
01:12generally, it remains a PDF format.
01:14Or a normal JPEG, which remains in pictures.
01:18So, you don't have to click on the APK files.
01:20You don't have to click on the APK files.
01:22So, you don't have to click on the APK files.
01:24After that, if you don't have any information or contact,
01:28you have to send them to you,
01:30then you have to send them to your phone.
01:32And confirm them,
01:33that you have to send them to you.
01:35And as soon as possible, you can avoid it.
01:37And as soon as possible,
01:39you have to send them to your phone.
01:41So, you have to send them to your phone.
01:43So, without permission,
01:45without your knowledge and knowledge,
01:47any type of file is downloaded and executed,
01:50you have to send them to your phone's details.
01:53That's how you can download it.
01:54As you know,
01:56we have three or four steps.
01:58We have to send them to me,
02:00the most important thing is to get away from people.
02:02First, it is that you have to get out of it.
02:05If you get out of your phone later,
02:06the next step is your information.
02:09We have to send them to your aid.
02:10To give up our help line number,
02:13such as to your network,
02:14and then cybercrime.gov.
02:16which is our portal.
02:18Or you have to send those police police.
02:20If you have a police or a cyber cell, you have to give a knowledge to them.
02:24And the third, when you ask them to ask them,
02:28you don't have any knowledge to them.
02:30You don't have all knowledge to them.
02:32You don't have all knowledge to them.
02:37And lastly, if you are scared or you are scared to come in a rush
02:41or you don't have any social media platform,
02:44you don't have any knowledge.
02:46Because most of all of the cyber processes,
02:49either the cyber processes you give to something else
02:51or then you are scared.
02:53Because of which you are hiding things
02:56and you have to become a victim of the cyber system.
Be the first to comment
Add your comment

Recommended