
-
- How do you handle frauding people who are callingI've been using true caller since I bought android for 1st time, it always was able to tell me who are spammers, One time, it told me spam and I answered and immediately the man who called asked me if I recieved money from cbe of 100br and that I should return it to the following account. Truecaller saved me my money, I very grateful to this awesome service....
Read More
- How Does a DNS Work?Every time when you type an address of a website into your browser, the following things happen: 1. A DNS server is contacted. Your computer must reach out to the DNS server (DNS Resolver) for more information. 2. The DNS looks up a numerical address. Computers understand server addresses made up of numbers and dots only. If you've never searched for this site before, your computer will ask...
Read More
- Introducing the (Fayda) National ID Mini App on Telebirr : Your secure and trusted authenticatorIn today's digital age, the need for secure and reliable digital identification has become increasingly important. To address this need, a new mini-app has been launched by the National ID Program that will help individuals authenticate the existence of their digital ID localized in Amharic and English language. The Fayda (National ID) mini-app, which is currently available on...
Read More
- Pin reset options must be only at services providing centers to fight fraudersTelebirr pin resetting opitions must be only in service providing centers to fight against Frauders to ptotect the safety matter of our loyal customers This is my comment to Top level decision makers on the mstter I comment. Thank you for giving me the chance on the discussion Forum. I am Fekadu Hibiso from SSWR/Wolayta Premium shop sales representative.
Read More
4 Answers 0 Shares - ScammerWhen it comes to dealing with scammers on social networking platforms, here are some key general understandings to keep in mind: 1. Be cautious of suspicious profiles: Scammers often create fake profiles to deceive unsuspecting users. Look out for profiles with limited information, few or no friends, or inconsistent details. 2. Protect your personal information: Never share sensitive...
Read More
- Social engineeringSocial engineering It is an interaction technique presenting oneself as someone aiming to access confidential or personal information. Such fraudsters might contact customers through SMS, email, social media messages or phone calls.
Read More
- Types of Cyber AttacksTypes of Cyber Attacks @ Malware Software programs designed to damage or do unwanted actions on a computer. Common examples include: viruses, worms, trojan horses, spyware, and ransomware. @ Phishing Attacks sent via email and ask users to click on a link and enter their personal data. They include a link that directs the user to a dummy site that will steal a user’s information. @...
Read More
- What is SIM Swap Fraud and How do you stay safe.Mobile numbers are linked to almost everything now. Driving License, Aadhar, Digital Accounts, and even Bank Accounts. It’s the most convenient way to communicate as they are always in the consumer’s hand, and they can react to any message that is sent across. However, this also means fraud can happen easily when one number is linked to everything. This is why the Banking system has...
Read More
© 2025 teleforum