Monday, October 21, 2024

New Stock Market Fraud Alert!

 Let me share the latest stock market fraud going around the country. The terms you will be hearing are:

  • Institutional Trading
  • Block Deals
  • AI Algorithms, and
  • Confirmed IPO allocations

Modus Operandi

  1. You will be searching for some Stock Market resources on the Social Media Websites
  2. Advertisement lures you with 10x to 30x returns
  3. Invitation comes to join a WhatsApp or Telegram Group
  4. You will find several people posting their trade screenshots
  5. Each one of these screenshots shows 30%-50% gains
  6. An 'expert' will help you with formalities to open an account
  7. You have to invest anything from 1 - 10 lakhs (1 million)
  8. You will deposit the money into various bank accounts (why?) as advised by the expert
  9. You will get an advice to 'buy' a stock when they say
  10. You will get an advice to 'sell' a stock when they say
  11. You can't sell a stock whenever you want. The sell button is disabled.
  12. First few days, you will be getting 20-30% returns
  13. You are then pushed by the agents to invest more
  14. Assured by the returns you will be funding your account more
  15. 'No Demat' account is required (How?)
  16. Everything happens in 'their' app (So they can show whatever gains they want)
  17. They'll allow you to withdraw profits first few times
  18. Later on, you will not be able to withdraw your profits or your investments
  19. Similar approach to IPO. They will ask you to invest in an upcoming IPO. To your surprise, you will get 100% allocation. They will ask you to introduce more funds.

It looks like a mafia, run under the banner of some big stock trading companies. Often linked to foreign companies. Once you are inside, you can never come out. More luring with schemes follows. Introduce your friends get 10% discount on your brokerage. One-month 300x returns, etc. Aim of this mafia is to loot small amounts from large number of people. Assume 100,000 people investing 100,000 bucks to 1 million bucks every day. Imagine the amount of money the backend network makes per day.

Government has banned hundreds of loan apps that wiped-out the wealth of the middle class in India. Several people have committed suicide. This is one such platform.

Middle-class have been scammed several times in the past. Emu farm, multi-level marketing, binary gold purchase schemes, and Teak trees, etc.

Alert!

  1. Never buy stocks on the tips from WhatsApp, Telegram, and other Social Media websites
  2. Stay away from Trading platforms that says no need to have a 'Demat' account
  3. Limit yourselves with authorised trading platforms such as ICICI Direct, Kotak Securities, and HDFC Securities.
  4. Stay away from all new trading platforms, and apps.
  5. If you don't understand Stock market, stay away from it.
  6. If you have surplus, then invest little, invest regularly. Stay away from dramatic returns.
  7. Multi-bagger is a theory. Not for regular investors.
  8. Never introduce your friends to any of your Stock networks; even the intention is to help them earn money.
  9. Limit your exposure to manageable limits (of loss).
  10. Don't indulge in intra-day unless you can handle a loss.
  11. If you don't have time to learn stock market, invest in Mutual funds, in small amounts.
  12. Don't go for margin trading. You can't have more liabilities than your assets.
  13. Don't go for Futures & Options. This is not for part-time investors.
  14. If you are 'scammed' by any such platforms, openly share this to your friends and relatives so that they can be cautioned.

There is no easy way to make money. Only hard work pays. Anybody or any company claims there is an easy way to make money, your inner voice should say 'stay away', and 'it's too good to be true'.

Leave your comments if you have heard about, or experienced similar scams.

Source: Personal experience of one my contacts who has lost a lot of money.


Article by: Mohan K Madwachar

KYX

 KYX is the Key to Your Organisation’s Cybersecurity.

TIP 1. KNOW YOUR CUSTOMERS (KYC)

Understanding your customers’ business is key to building your organisation’s cybersecurity. Key considerations include: how they transact with you, whether online or offline, how you store their data and financial transactions, and if they share their PII (Personally Identifiable Information).

TIP 2. KNOW YOUR BUSINESS (KYB)

If you are a legacy organisation transitioning to digital processes, it is important to understand how you conducted business before computerisation and how you operate now. Have you fully embraced digital technologies, or are you just starting your journey? Do you have a website that serves as the primary point of interaction with your customers?

If so, do they share their data with you online, and if they do, how do you handle it? Is the communication channel between you and your customers fully secured? Finally, are you required to meet regulatory compliance? These are all questions you should consider to stay compliant and keep your customers’ data safe.

TIP 3. KNOW YOUR INFRASTRUCTURE (KYI)

Your infrastructure has five important elements: Network, Users, Data, Applications, and Cloud. You need to consider how you operate, whether at your premises, remote, or mobile. You should also think about how your users connect to your corporate applications. Can you identify from where they are accessing your network? Are they using corporate- owned equipment? Are the endpoints secured to handle corporate communications? If you have developed the applications, have you followed the standard secure coding practices?

TIP 4. KNOW YOUR USERS (KYU)

Effective cybersecurity measures depend on user behaviour. Those who neglect cybersecurity hygiene become the weakest link in an organisation. Educate, enable, empower, and repeat.

TIP 5. KNOW YOUR ROLE (KYR)

The designations of CISO, CIO, CTO, and CDO come with great responsibility. Even a single data breach can lead to severe consequences and put the blame on you. Therefore, it’s crucial to know your role, authority, powers, and responsibilities in the organisation. You should document what you can and cannot do, as well as what you are responsible for and not responsible for. It’s also essential to document any observations you make and communicate them to all stakeholders. This way, you can address any issues before they escalate and avoid negative repercussions.

TIP 6. KNOW YOUR VENDORS (KYV)

Original Equipment Manufacturers (OEMs) are responsible for developing modern cybersecurity technologies. Are they present in your country? Do they have a Technical Assistance Centre (TAC) and provide Return Merchandise Authorization (RMA)? Do they offer 24x7 support? Is the product stable and safe to install in your system? Are they committed to the locations where your operations are based? Is the product reaching its End-of-Life (EOL) or End-of- Sale (EOS)? Do they make commitments on the data sheet that they are unable to deliver? Do they have a long-term roadmap for this product line? Do they offer an integrated solution or just individual components?

TIP 7. KNOW YOUR PARTNER (KYP)

Whether you call them a partner, reseller, or system integrator, they are the link between you and the original equipment manufacturers (OEMs)! How do you assess their level of expertise? Do they have the necessary skills and experience to handle your project? How long have they been in the industry, and how stable is their organisation? Are they authorised to sell the products they offer, and do they have certified and trained staff? Will they be there for you when things go wrong? It’s also important to understand their organisational structure and have a clear escalation matrix in place.

TIP 8. KNOW YOUR JOURNEY (KYJ)

If you have an unlimited budget, you might be tempted to bring in the best-of-breed solutions and pay heavily for them. However, if these components do not talk to each other, there will be no integrated management in place. This means you won’t be able to understand what is happening in your organisation. Building a cybersecurity system is like constructing a house; each component needs to be synchronised, like the workings of an orchestra. If you ignore security, the digital journey becomes challenging.

TIP 9. KNOW YOUR FINANCES (KYF)

Budget and constraints are closely related. Out-of-turn investment requests after a breach may put a strain on your finances. It’s important to anticipate these requirements and plan for them in advance. CFOs are always looking for ways to optimise costs and often target the Information Technology (IT ) department. However, it can be challenging to explain the need for security tools like SIEM or SOAR to CFOs who may not be familiar with cybersecurity terminology. It’s important to avoid using scare tactics like FUD (Fear-Uncertainty-Doubt) when presenting to top management, as this can lead to either unnecessary fear or dismissal of the issue. Instead, focus on presenting the information in a clear and understandable manner.

TIP 10. KNOW YOUR ACRONYMS (KYA)

PCMCIA - People Can’t Memorize Computer Industry Acronyms! Just kidding! Often, vendors use acronyms while communicating. You should stop them if you don’t understand them. IP and IP may represent two different things. One stands for ‘Intellectual Property,’ and the other stands for ‘Internet Protocol.’ If you are unsure about an acronym, don’t hesitate to ask for an explanation. It’s your right to ask and their duty to explain! Making assumptions can lead to wrong decisions. Sometimes, a conversation can be filled with acronyms for 30 minutes, and you may not understand any of them. You don’t need to know all the acronyms or technologies, but it’s your role as a guardian to ensure you understand what’s happening in your company. That’s important!

Bonus Tip#: Know Your Opponent (KYO)

Knowing your adversaries is the name of the game. Is it your competition who wants to hurt your business? Or somebody from across the border! Are you an innocent bystander getting caught between the cross-fire of two other contenders? Were you the actual target? Are they trying to hack your website? Or they want to extract information about your customers? Or users acting from inside, or are they after your IP (Intellectual Property)?

~ Mohan Madwachar

Read it on: https://belmontbec.com/wp-content/uploads/2024/06/1001-cyber-security-Tips-Mohan-Madwachar.pdf

Blackbox vs. Whitebox vs. Graybox Testing

This blog post provides a concise overview of the three main types of software testing: Blackbox, Whitebox, and Graybox testing. It outlines...