3 scams that use your Pix and will be trending in 2022

Technologies have the ambiguity of serving to assist us in various tasks, while at the same time being a resource for criminal action. And so it is with social media, mobile apps and even Pix. In this way, it is not uncommon to find people who claim to have been harmed by bandits who associate the population's inattention with access to technology. Therefore, since the launch of this tool, Pix has been suffering continuous attacks and being used to steal money. Meet the scams that use Pix!

Read more: New smartphone game is releasing payment via PIX for users.

see more

How to get your CNH for free in 2023?

After hacker attacks, Microsoft releases free tools for…

3 scams that use Pix

  • Fake employee scam or fake kidnapping

These two types of cybercrime are inspired by traditional models of lie robbery. Therefore, many criminals pretend to be company employees asking the user to make a transfer that, in fact, will be credited to the bandits' account.

In addition, criminals can also call you and pretend to be one of your family members or friends in a fake kidnapping. For this, the scammer changes his voice and does his best to make you believe his lie. Typically, they ask for significant amounts through Pix for the “rescue”.

  • phishing

The term "Phishing" comes from English, and means "fishing" or "fishing". That's because the crooks really try to reach the user through a "bait". These are messages or emails that arrive to make the victim click on an ad or link. With that, your cell phone is at the mercy of the bandit, who can invade your banking applications.

  • whatsapp cloning

Another traditional blow that reinvents itself through Pix. After all, the criminal will be able to hack into the individual's cell phone and access his Pix key. Then, the scammer will be able to message your contact list, letting them know that you will give the number, in addition to asking for a Pix.

For these and other reasons, we must be very attentive to our cell phones and always doubt unsolicited messages and links that reach us. And then, you will be able to enjoy this very practical technology more safely.

You only have 5 seconds to find the hidden apple.

You only have 5 seconds to find the hidden apple.

You observation games they are excellent for testing and calibrating our level of attention. They...

read more

Know which passwords NOT to use to keep your networks secure

World Password Day was celebrated on May 5, a date when the importance of protecting our privacy ...

read more

URL shorteners can hide serious threat to users

If you work with the internet or even if you are an active internet user, you have certainly alre...

read more