Cyber crime, also called computer crime, is the use of computers as an instrument to commit fraud, steal indetities, or violate privacy. Most cyber crime is an attack on information about individuals, corporations, or governments.
5 most common types of cyber crime
1. Phishing scam:The majority of successful cyber crimes begin with curiosity, fear, or a sense of urgency. Phishing emails mimic messages from someone you know or a business. They are designed to trick people into giving up personal information or clicking on malicious links that download malware.
What you can do: stop trusting your emails because they are not always what they appear to be. Get free anti-phishing add-ons and always update security patches.
2. Website spoofing: The word "spoof" means to trick or to deceive. A website is designed to look like a real one and deceive you into believing it is a legitimate site. It is done to gain your confidence, get access to your system, steal data, steal money, or spread malware. Spoofed websites resulted in $1.3 billion in losses last year, according to the 2019 Thales Access management index.
What you can do: The easiest thing to do is to ignore or delete anything you are not anticipating. Legitimate companies will have multiple ways to contact you if needed.
3. Ransomware: A modern day technical twist on a crime that has been around for ages "extortion".
As the name implies, ransomware works when criminals steal something of great value and demand payment in exchange for it's return. For most business this involves the encryption of company data. Without restoring back up data the company is generally at the mercy of the attacker.
McAfee reported that the number of new ransomware attacks grew 118% between 2018 and 2019.
What you can do: Back up your data and then do it again in a separate location. Frequency is a key to your success.
4. Malware: Malware is a type of software that is malicious. It is specifically designed to gain access to or damage a computer. Common types of malware include:
-viruses that spread, damage functionality, and corrupt files.
-worms that infect all the devices connected to a network.
What you can do: Be cautious about email attachments, avoid suspicious websites. Install and update a high quality antivirus program.
5. IOT Hacking: IOT means internet of things. A term used to describe devices that are connected to the internet that aren't primarily computers.
Hackers may exploit weak security and 24-hour connectivity of consumer devices to recruit them into botnets, which are used to launch attacks on their targets.
What you can do: Use a password generator to secure your devices with a unique password.
Content created and supplied by: Mayortech (via Opera News )
Opera News is a free to use platform and the views and opinions expressed herein are solely those of the author and do not represent, reflect or express the views of Opera News. Any/all written content and images displayed are provided by the blogger/author, appear herein as submitted by the blogger/author and are unedited by Opera News. Opera News does not consent to nor does it condone the posting of any content that violates the rights (including the copyrights) of any third party, nor content that may malign, inter alia, any religion, ethnic group, organization, gender, company, or individual. Opera News furthermore does not condone the use of our platform for the purposes encouraging/endorsing hate speech, violation of human rights and/or utterances of a defamatory nature. If the content contained herein violates any of your rights, including those of copyright, and/or violates any the above mentioned factors, you are requested to immediately notify us using via the following email address operanews-external(at)opera.com and/or report the article using the available reporting functionality built into our Platform See More