Cyber Crime encompasses a broad range of potentially illegal activities. Generally, however, it may be divided into one of two types of categories;
Crimes that target computer networks or devices directly;
Crimes facilitated by computer networks or devices, the primary target of which is independent of the computer network or device.
Examples of crimes that primarily target computer networks or devices would include,
Distributed denial-of-service (DDoS) attacks used by the hackers to hack banking websites successfully disrupted the operations of leading Wall Street financial institutions, including Bank of America, JPMorgan Chase, and Wells Fargo, as well as other firms in the beginning of the month. Last week, the attacks extended to include Capital One, SunTrust, and Regions Financial.
In spite of an advance warning by attackers, all of the targeted banks' websites still suffered disruptions.
It has been reported a major increase of social engineering attacks on Skype and other instant messaging applications over the last few weeks.
In this modern Computer and Internet Era, one of the sneaky Crimes is Identity theft. No one has robbed you, No one has accessed your credit card but when you try to use your credit card, it won’t work. Because someone has stolen your personal information and drained your checking account and maxed out your credit cards. And your identity has been stolen. It was, alas! No uncommon incident.
Don't be a target for these thieves. Use precautions to keep yourself safe from identity theft. Below are some measures one should keep in order to keep identity thieves at bay:-
In this Computer Modernization world, where every computer user is dependent on the internet for all of their transactions, business, works etc. it is estimated that almost 90% Internet Users are Vulnerable. A survey of more than 5,000 active Internet users across 10 cities in India says that users are becoming increasingly concerned about online security. 90% of the respondent Internet users have experienced some cases of Cyber Fraud, such as Data Theft, Fake Emails, Financial Losses, Phishing, Credit Card Fauds, Key Logging, and many more.
Do you know that there's a new computer virus variant being written or generated approximately every 15 seconds? As Internet users increase, the Web attack vector continues to grow. The list of top ten cyber threats has actually remained relatively consistent over the past 12 months or so, which shows that these methods are tried and tested and as far as the Malware author is concerned – they work.
The top three cyber threats are:
• Website attacks that exploit browser vulnerabilities
• Rogue AV
• SQL Injection