1. Fakes and become friendly with you.
2. Asks for your personal information.
3. Steals your picture and pone number.
4. Asks you to install apps.
5. Get control over your phone directory.
6. Access your OTPs
7. Your bank transactions are now easier.
Simple.
NB: The most worthy thing you lose is not your money. But your identity. Identity hijacking.
2. Asks for your personal information.
3. Steals your picture and pone number.
4. Asks you to install apps.
5. Get control over your phone directory.
6. Access your OTPs
7. Your bank transactions are now easier.
Simple.
NB: The most worthy thing you lose is not your money. But your identity. Identity hijacking.
إرسال تعليق