adUnits.push({
code: ‘Rpp_economia_economia_Nota_Interna1’,
mediaTypes: {
banner: {
sizes: (navigator.userAgent.match(/iPhone|android|iPod/i)) ? [[300, 250], [320, 460], [320, 480], [320, 50], [300, 100], [320, 100]] : [[300, 250], [320, 460], [320, 480], [320, 50], [300, 100], [320, 100], [635, 90]]
}
},
bids: [{
bidder: ‘appnexus’,
params: {
placementId: ‘14149971’
}
},{
bidder: ‘rubicon’,
params: {
accountId: ‘19264’,
siteId: ‘314342’,
zoneId: ‘1604128’
}
},{
bidder: ‘amx’,
params: {
tagId: ‘MTUybWVkaWEuY29t’
}
},{
bidder: ‘oftmedia’,
params: {
placementId: navigator.userAgent.match(/iPhone|android|iPod/i) ? ‘22617692’: ‘22617693’
}
}]
});
There were about 4581 robberies in Peru Cell Phones daily, according to Osiptel, which could mean a big problem if your bank accounts are linked to your phone.
Having a mobile phone offenders Usually they use the “thieves’ transfer” modality, that is, the transfer of money from accounts that are in the stolen phone.
“This scam consists of accessing the victim’s financial apps and using them for various purposes, such as transferring money or impersonating them to request loans through their contacts saved on their mobile phone,” explains Aldo Madruga, Senior Anti-corruption Manager fraud and good faith. Banco Pichincha Corporate.
In addition, it is possible that the thief not only makes transfers from your bank accounts preservationbut also impersonates the victim’s identity and requests financial loans on their behalf.
Even if they can’t access your accounts, it’s also possible that they ask your contacts for money as a loan or “emergency” assistance.
How to avoid becoming a victim of these robberies?
Being a victim stealing your cell phone It is proposed to file a corresponding complaint with the police department.
After filing a complaint, you must contact financial institutions to block your cards and digital users. In the same way, confirm your transactions through the movement of your account.
Another important point is communication with your operator. mobile phone report the incident and block your chip/mobile device. This step is also very important to do right after the theft.
You should also change passwords for your emails and apps from financial institutions or other apps you had on your mobile device.
Finally, it is recommended to warn your family and friends about the theft so that the perpetrator cannot deceive them.
Source: RPP

I’m Liza Grey, an experienced news writer and author at the Buna Times. I specialize in writing about economic issues, with a focus on uncovering stories that have a positive impact on society. With over seven years of experience in the news industry, I am highly knowledgeable about current events and the ways in which they affect our daily lives.