Mobile phone users are increasingly facing a barrage of unsolicited calls from fake and marketing companies, some of which are engaged in fraudulent activities. However, a new trend has emerged in recent days where individuals are receiving threatening calls claiming that their mobile numbers will be deactivated, purportedly on behalf of the Ministry of Telecom of the Central Govt. These calls, seemingly endorsed by the Department of Telecommunication (DoT), have sparked concerns among the populace.
Government Response to Threatening Calls: Blocking Phone Numbers
Responding to these reports, the Department of Telecommunication (DoT) has swiftly moved to dispel any misconceptions. The government has categorically stated that it does not engage in such communication practices. The fraudulent calls, ostensibly from the DoT, are part of a scam aimed at extracting personal information from unsuspecting victims. Callers are known to request sensitive data, subsequently exploiting it for nefarious purposes.
Of particular concern are WhatsApp calls originating from numbers based in Pakistan, adding an international dimension to the scam. Government warns citizens to be cautious, avoid sharing personal information over the phone due to security concerns. To combat such fraudulent activities, individuals are encouraged to report incidents to the authorities promptly.
In light of these developments, it is imperative for mobile phone users to adopt precautionary measures. Firstly, one should refrain from sharing confidential information such as ATM numbers or PINs with anyone, under any circumstances. Financial institutions never request such details over the phone, and any such inquiries should be treated with skepticism.
Avoid sharing personal details on social media to reduce the risk of being targeted by scammers. Regularly changing passwords for online accounts, including those for email and social media platforms, is recommended as a preventive measure against unauthorized access.
Moreover, users should exercise caution when granting permissions to mobile applications. Permissions related to location, camera, photos, and videos should be scrutinized carefully before granting access, as malicious applications may exploit these privileges for illicit purposes.
In conclusion, vigilance is paramount in safeguarding against fraudulent activities targeting mobile phone users. By adhering to the aforementioned precautions and promptly reporting suspicious incidents, individuals can protect themselves and contribute to the collective effort in combating telecom scams.