Google is one of the companies which takes place on each device in the world which may be in the form of a Google account, Google map, or any Google app.

The threat of scams has increased significantly in recent years because most people depend on the internet. Relying on the internet is not a bad thing but a lack of knowledge is dangerous.
Many government organizations are working against this scammer but citizens should be equally aware of the technology.
Many scammers and thieves are known for this loophole in society and they take advantage. So how do deal with these things you must know.
How your pin helps scammers to use your google account without knowing your password
Google account is one of the most used by people. Many things like payment options, contacts, personnel pictures, and social media accounts are connected with Google accounts.
In Android, Scammers click on Settings, Google, Manage your Google account, security, password, Forgot password, Use your phone screen lock and then click on yes to retrieve your data.
In this way, your Gmail ID password can be changed through a screen lock or pin.
5 Security tips to save your data from scammers
- Use a strong password for screen lock with biometrics.
- Use a different password for the payment app.
- Use double verification in your Google account.
- Use a recovery id that does not sign in to the same device
- Always keep the latest version of Software updated on your device.
How do you know your device is hacked?
Some people can’t understand that their devices are infected by malware.
- The device is suddenly running slower.
- Strange messages or calls coming from unknown numbers.
- A sudden increase in data usage means some data are transferred by criminals.
- Battery drains rapidly.
- If you start seeing lots of pop-up ads, especially which are difficult to close
- Unfamiliar apps are installed.
- if your device password change.
All this sign shows that your device is affected by malware.
What to do if your device is hacked or lost
- In Android First, click on PLAY STORE>Gmail logo top right corner > PLAY PROTECT > Play protect setting option. Always make sure that the Play Protect Setting options must be ON.
- In iPhone/Android, you must check the App permission that you have given to the Apps. Don’t give permission for everything like CAMERA, GALLERY, MICROPHONE, and CONTACT info to the APPS, if it is not necessary.
- Take a backup of your important file like images, documents, etc but don’t back up the Apps and reset the device.
- If you lost your device then change the password of your Apple account and Gmail account. and make a complaint to the nearest police station.
- Always use the option of two-way verification of any account like Social Media, Bank account, or Gmail account.
- Always use a strong password.
What techniques are used by criminals to leak your data
In this Era, the most important thing is Data rather than Money. Some methods are used by criminals, so be cautious.
- Phishing- Here Criminals trick users to get their login credentials and sensitive information by taking the advantage of user requirements regarding health policy, registration of student enrolment, etc. Never share your bank details or any OTP with any person.
- Don’t use a third-party app. Always install from Play Store(Android) or App Store (iPhone). Criminals gain access through this App to your device.
- Criminals use messages, Emails, or suspicious pictures to install the malware in your device. Never click unknown links that come through in a suspicious way.
- Criminals use fake Wi-Fi hotspots in public places like coffee shops or metro stations. Once you connected to the fake Wi-Fi, they can intercept any data that is received or sent from the device.
conclusion
Everyone wants new gadgets and devices to show their lifestyle but few people know what they are using and how to use it.
Recently The Wall Street Journal also published about how criminal use users’ phone pin to reset their Google account and leaks their data from their device.
Everyone should know the consequence of what happens if they use devices in the wrong manner and the threats regarding it.
What is your opinion regarding this comment below?