Scams with online payment methods

Module 8 of C1b3rWall Academy 2021, “Online scams. Means of payment”, just 8 months since the beginning of another program and the course already has more than 50,000 students from different parts of the world. We are grateful for the participation of all the speakers who have accompanied us on this journey, but above all, to all of you who form part of the C1b3rWall community, which continues to grow.

In Module 8 we have four specialists who will address the most common scams that occur in the network during online payments.

  • “Scams with cryptoassets. Principles of cybersecurity and data protection”, Pablo Fdez. Burgueño from PWC.
  • “CEO scams in O365 I”, Antonio Sanz, from S2 Grupo.
  • “Scams in the network through Means of Payment”, Beatriz Gómez Hermosilla, National Police.
  • “How to detect a cryptocurrency scam? (And not to fall into it) I”, Alberto Muñoz, UNED

We begin this unit with a lecture by Pablo Fernández Burgueño, who will describe the relationship between current data protection legislation and cryptocurrencies.

Blockchain and data protection

We usually associate blockchain with concepts such as functional transparency, immutability, decentralization, anonymous validators, historical permanence, global access to data or unlimited publication (no censorship).

Moreover, data protection is implemented in the European Union and elsewhere through transparency in processing, the right to delete, rectify…, identified controllers, identified processors, limited retention period, confidentiality, and data minimization.

As for cryptocurrency wallets, this is an asymmetric cryptography solution: we have a private key to sign documents, guarantee the integrity of the content and order transactions; and a public key as a unique user identifier to receive transfers. There are several types:

  • Mobile
  • Hardware
  • Desktop
  • Service provider (exchange)
  • Paper

Regardless of the type, we must implement security in transfers, such as establishing strong passwords, establishing a double authentication factor, and making copies of the private key. The majority of the times someone attempts to steal our passwords to make unwanted transfers, it will be through scams or phishing, although it can also be due to errors in the address or in the cryptocurrency itself.

In the blockchain not only monetary transactions can be written, but computer codes in general, such as smart contracts, letters and numbers that can be personal data, as well as tokens referenced to files (NFT) that can contain data.

This is just a part of what you will learn in Pablo’s talk, I invite you to enroll in this module to delve into a topic as interesting as transactions in blockchain.

Enrol here  


Juan Manuel Corchado

Full Professor in Computer Science and Artificial Intelligence, Department of Computer Science and Automation, University of Salamanca, Spain.


SOCIAL NETWORKS:

Contents: Noixion.TVWDiarium.com – e4YOU – Másteres – CyberCamp

Join 9,035 other subscribers

Discover more from Juan M. Corchado

Subscribe now to keep reading and get access to the full archive.

Continue reading