-
Notifications
You must be signed in to change notification settings - Fork 0
/
Copy pathRisks.html
124 lines (111 loc) · 9.11 KB
/
Risks.html
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
<!DOCTYPE html>
<html lang="en">
<head>
<meta charset="UTF-8">
<meta name="viewport" content="width=device-width, initial-scale=1.0">
<meta name="description" content="Educational site about online privacy and scams">
<title>Fight for Privacy</title>
<link rel="stylesheet" href="styles_risks.css">
</head>
<body>
<header>
<h1>₱ⱤłV₳₵Ɏ Ɽł₴₭</h1>
<nav>
<ul>
<li><a href="newPrivacyPage.html">Home</a></li> <!-- Links to the home page -->
<li><a href="Risks.html">Privacy Risks</a></li>
<li><a href="#scams">Types of Scams</a></li>
<li><a href="#resources">Resources</a></li>
</ul>
</nav>
</header>
<section id="home">
<h2>ꜛᴀ͎ꜜꜛʀ͎ꜜꜛᴇ͎ꜜ ꜛʏ͎ꜜꜛᴏ͎ꜜꜛᴜ͎ꜜ ꜛs͎ꜜꜛᴀ͎ꜜꜛꜰ͎ꜜꜛᴇ͎ꜜ</h2>
<p>You think you’re safe. Behind your screen, behind your keyboard. But in the digital world, safety is nothing more than an illusion. Right now, as you’re reading this, you’ve already made yourself vulnerable. In fact, you may have already been compromised.
Look around. Does everything seem normal? Are you sure? The site you're on, the address bar, even the text you're reading—what if none of it is what it seems? What if, without you knowing, a single line of code has changed what you’re seeing, leading you into a carefully crafted trap?
You clicked a link to get here. Harmless, right? But what if that one click gave someone access to your information, your browsing habits, even your personal details? You wouldn’t know until it was too late.
</br><center><i style="color: #777688;">Ⱦⱥҟē ⱥ ȼłꝋꞩēɍ łꝋꝋҟ.</i></center></br> Does the URL look slightly off? Maybe a letter changed, maybe it’s an entirely different site—but you wouldn’t notice. Not until everything started to fall apart. And by then, your privacy would be in someone else’s hands. They wouldn’t even need to be particularly skilled—just patient, waiting for you to let your guard down.
Now the real question: What’s happening right now, as you read this? Is this really the site you thought you’d come to? Or have you already stepped into something far more dangerous than you ever imagined?
The frightening reality is that technology and AI have blurred the line between real and fake. In an instant, a trusted website can become a tool to steal everything from you, without you even knowing it. The risks aren’t just hypothetical—they’re already here, and they’re closer than you think.
</br>
</br>
<hr>
</br>
<center><b style="color: #777688;">₮ⱧɆ ⱤɆVɆ₳Ⱡ</b></center>
</br>
As you’ve been reading, a single doubt has crept into your mind. That’s all it takes. Cybercriminals exploit this doubt, this uncertainty, to manipulate and trick you. Every seemingly innocent click, every “safe” site, can be a gateway to a devastating breach of your privacy.
</br>
</br>
What you just experienced is a subtle example of a phishing or spoofing attack—where something you trust is manipulated to deceive you. This type of attack is one of the most common ways cybercriminals trick individuals into giving away personal information. The website, the link, the email—everything can look legitimate until it’s too late.
Want to know how to protect yourself? Click here to learn about phishing and spoofing attacks and how to recognize the signs before you fall into the trap.
</p>
</section>
<section id="privacy">
<h2>How Your Privacy Can Be Compromised</h2>
<ul>
<li>Tracking cookies</li>
<li>Unsecured connections</li>
<li>Phishing attacks</li>
<li>Data breaches</li>
<!-- Add more content as needed -->
</ul>
</section>
<section id="scams">
<h2>𝗖̘̚𝗼̘̚𝗺̘̚𝗺̘̚𝗼̘̚𝗻̘̚ 𝗢̘̚𝗻̘̚𝗹̘̚𝗶̘̚𝗻̘̚𝗲̘̚ 𝗦̘̚𝗰̘̚𝗮̘̚𝗺̘̚𝘀̘̚</h2>
<ul>
<li><b>Phishing Emails</b></li>
<ul>the practice of tricking Internet users (as through the use of deceptive email messages or websites) into revealing personal or confidential information which can then be used illicitly
</br>Source: <a href="https://usa.kaspersky.com/resource-center/threats/top-scams-how-to-avoid-becoming-a-victim">Merriam-Webster</a>
</ul>
<li><b>Fake tech support</b></li>
<ul>a type of scam in which a scammer claims to offer a legitimate technical support service. Victims contact scammers in a variety of ways, often through fake pop-ups resembling error messages or via fake "help lines" advertised on websites owned by the scammers. Technical support scammers use social engineering and a variety of confidence tricks to persuade their victim of the presence of problems on their computer or mobile device, such as a malware infection, when there are no issues with the victim's device. The scammer will then persuade the victim to pay to fix the fictitious "problems" that they claim to have found. Payment is made to the scammer via gift cards, which are hard to trace and have few consumer protections in place.
</br>Source: <a href="https://en.wikipedia.org/wiki/Technical_support_scam">Wikipedia:Technical Support Scam</a>
</ul>
<li><b>Romance scams</b></li>
<ul>a criminal uses a fake online identity to gain a victim's affection and trust. The scammer then uses the illusion of a romantic or close relationship to manipulate and/or steal from the victim.
</br>Source: <a href="https://www.fbi.gov/how-we-can-help-you/scams-and-safety/common-frauds-and-scams/romance-scams">FBI Romance Scam</a>
</ul>
<li><b>Messaging Scams</b></li>
<ul>
You might receive a text message telling you that you have a package or delivery pending, and you need to confirm your identity or pay a fee to claim ownership.
</br>
</br>
You might receive a message purporting to be from your bank, telling you that your account is being closed, or your debit card is being locked or charged, and to log in (to a fake website) to prevent that from happening.
</br>
</br>
Or perhaps the message tells you that you’ve won a huge prize, and to claim it, you need to submit your financial information.
</br><a href="https://usa.kaspersky.com/resource-center/threats/top-scams-how-to-avoid-becoming-a-victim">Kaspersky</a>
</ul>
<li><b>Social Media</b></li>
<ul>
You might see a social media quiz that promises to tell you what personality type you are, or what celebrity you look like, or offers you an eye-catching prize. They usually include terms and conditions which allow the data you enter to be sold to third parties. The quiz developer can also obtain a lot of information about you from your profile, friends list, and IP address – which can be used to build up a picture as part of identity theft.
</br>
</br>
Or perhaps you receive a random friend request on Instagram from a fraudster posing as someone you may know, who then sends you a phishing link that takes you to a malicious site.
</br>
</br>
Perhaps you download an app on social media which you think is legitimate, but in fact downloads malware onto your device.
</br>
Source: <a href="https://usa.kaspersky.com/resource-center/threats/top-scams-how-to-avoid-becoming-a-victim">Kaspersky</a>
</ul>
<li><b>Online Shopping Scam</b></li>
<ul>Scammers use the latest technology to set up fake retailer websites that look like genuine online stores, using stolen logos and copied designs. Many of these websites offer popular brands of clothing or jewelry, or gadgets at low prices. Sometimes you may receive the item you’ve paid for, but often you don't. A more recent version of the scam involves setting up a social media store, which usually disappears after a while to resurface again in another guise.
</br>Source: <a href="https://usa.kaspersky.com/resource-center/threats/top-scams-how-to-avoid-becoming-a-victim">Kaspersky</a>
</ul>
<!-- Add more scam types as needed -->
</ul>
</section>
<section id="resources">
<h2>Useful Resources</h2>
<p>Here are some trusted sources to help you stay informed and protected online:</p>
<ul>
<li><a href="https://www.ftc.gov" target="_blank">FTC: Federal Trade Commission</a></li>
<li><a href="https://www.aarp.org/money/scams-fraud/">AARP Fraud Watch Network</a></li>
<!-- Add more resource links as needed -->
</ul>
</section>
<footer>
<p>© 2024 Fight-4-Privacy. All rights reserved.</p>
</footer>
</body>
</html>