Wangiri, a Japanese term meaning "one ring and cut," has become synonymous with a prevalent mobile fraud scheme. In this scam, fraudsters initiate a single ring to a mobile phone, enticing the recipient to return the missed call. However, the call is directed to an international premium rate number, resulting in exorbitant charges for the unsuspecting victim.
This deceptive tactic preys on curiosity, and the fraudsters capitalize on the momentary confusion caused by the missed call. To avoid falling victim to Wangiri fraud, telecom consumers are advised not to return calls from unfamiliar international numbers and to block suspicious numbers promptly. As telecommunications authorities enhance security measures, awareness remains a crucial defense against these scams. Stay vigilant and protect yourself from falling victim to the Wangiri mobile fraud menace.
In today's world, where mobile telephony has become an integral part of our lives, we must remain vigilant against the growing threat of mobile phone fraud. The advances in technology have brought us more comfort, but unfortunately, they have also led to a new way of scamming unsuspecting people. This article explains some of the most used methods by which people are cheated out of money with mobile phones, and shows us how to avoid falling victim.
- Fake Apps: Criminals often exploit the popularity of mobile applications by making fake versions of commonly used applications or implanting malicious software in popular apps. Such malicious applications can require a high level of permission, which may result in unauthorized access to the user's data or the installation of malware on the device. To prevent falling victim to this scam, download apps from the Official App Store, check app permissions, and get user feedback before installing them.
In today's digital age, the internet has become an integral part of our lives, connecting us to vast amounts of information and opportunities. This means staying safe online has become an essential part of our daily lives. To ensure your online safety and protect your personal information, it's crucial to follow these ten (10) essential tips.
- Use Strong and Unique Passwords: Create strong, complex passwords for your accounts by combining letters, numbers, and special characters. Avoid using easily guessable information like birthdates or names. Consider using a reputable password manager to generate and store your passwords securely.
- Enable Two-Factor Authentication (2FA): 2FA adds an extra layer of security by requiring a second form of verification, like a code sent to your phone, in addition to your password. This significantly reduces the risk of unauthorized access.
- Beware of Phishing Attempts: Be cautious of emails, messages, or links asking for personal information or urging you to take immediate actions. Legitimate organizations will never ask for sensitive data via email.
- Update Software Regularly: Keep your operating system, antivirus software, web browsers, and applications up to date. Updates often include important security patches that help protect your device from vulnerabilities.
- Use Secure Wi-Fi Connections: Avoid using public Wi-Fi networks for sensitive transactions or accessing confidential information. If necessary, use a Virtual Private Network (VPN) to encrypt your internet connection.
- Be Cautious with Social Media Sharing: Limit the amount of personal information you share on social media platforms. Cybercriminals can use this information to target you or attempt identity theft. Adjust your privacy settings on social media platforms to control who can see your posts and personal information.
- Secure Your Devices: Use strong passcodes or biometric authentication methods to secure your smartphones, tablets, and computers. Encrypt your devices to protect your data in case they are lost or stolen.
- Regularly Back Up Your Data: Back up your important files and data to an external drive or a secure cloud storage service. In case of a cyberattack or data loss, you can easily restore your information.
- Practice Safe Online Shopping: When making online purchases, only use reputable websites with secure checkout processes (look for "https://" and a padlock icon in the address bar). Avoid clicking on suspicious ads or links.
- Educate Yourself: Stay informed about the latest online cybersecurity threats and best practices. Participate in cybersecurity awareness programs and keep yourself updated on evolving cyber risks.
While the digital world offers unparalleled convenience and opportunities, remember that online safety is a continuous activity. Cyber threats are constantly evolving, so staying vigilant and informed is key to protecting your digital presence. By following these tips, you'll be better equipped to navigate the online world securely and confidently.
The Nigerian Communications Commission has directed all licensed all Mobile Network Operators (MNOs) to commence implementation of approved Harmonized Short Codes (HSC) for providing services to Nigerian telecom consumers.
QR code, an abbreviation for Quick Response code was invented in Japan in the 1990's for use in the automobile industry to aid production but have since spread to other areas of commerce. QR Code is used by multiple web applications to authenticate users based on a technology known as QR Login (QRL).
Users only need to scan the QR codes displayed on the web applications to log in, instead of
A consumer’s Quality of Experience sometimes goes beyond the Quality of Service (QoS) offered by telecom operators as a lot can depend on some minor changes and an upgrade of the Subscriber Identity Module (SIM) card. It is therefore important that consumers who are complaining about QoS check their phones to ensure that they are optimally set to enjoy the current generation of mobile services in their service areas – 3G and 4G services.
The following are some of the steps a subscriber can take
The COVID-19 pandemic has limited physical interactions such that the use of the internet/cyberspace has become more prevalent in our work and social lives. This increased reliance on the internet and cyberspace exposes our personal data as well threatens privacy and online safety. The internet, while a great tool for innovation, social interactions, work and many more, also harbours some rouge elements determined to perpetrate cybercrime.
Cybercrime is any unlawful activity that is conducted in cyberspace, these include but are not limited to stealing personal data, spying, deception, bullying. To stay safe online it is important to practice good cyber habits.
Good Cyber habits are
An eSIM is a SIM card that is embedded in a mobile device and can connect a consumer/customer to any operator that offers eSIM service(s). It is pre-installed in a device (could be a mobile phone) and can be activated by installing an “eSIM profile” on it when a customer who has a phone with eSIM facility visits his or her Service Provider’s customer care centre.
The drive towards eSIM came in part from the Internet of Things (IoT) industry. ESIM does not require extra room for a slot because it is built into devices like mobile phones, tablets, drones, wearables, sensors, and location trackers, where miniaturised size of the device is a concern but not in all cases as some
Understanding DND
On many occasions, Nigerians had complained about the menace of unwanted messages from service providers. As a result of the persistent complaints from the consumers, the Commission directed telecom operators to incorporate Do not Disturb (DND) in their service provision. This is done to give a subscriber the choice to receive or not receive such messages from network providers.
Below is how DND works.
What is DND?
DND simply means,