What is Cyber Crime?

What is the Cyber Security?
Cyber Crime

Cybercrime involves activities like raiding bank accounts and stealing information from companies computer crime or cybercrime is a crime. That involves a computer and a network the computer may have been used in the commission of a crime or it may be the target cybercrimes are offenses that are committed against individuals or groups of individuals with a criminal motive to intentionally harm the reputation of the victim or cause physical or mental harm or loss to the victim directly or indirectly using modern telecommunication. 
networks such as internet, chat rooms, emails, notice board and groups and mobile phone such crimes may threaten nation’s security and financial health issues surrounding these types of crimes have become high-profile particularly those surrounding hacking copyright information child pornography and child grooming there is also problems of privacy when confidential information is intercepted or disclosed lawfully or otherwise activity crossing international borders and involving interests of at least one nation-state is sometimes referred to as cyber warfare. The international legal system is attempting to hold actors accountable for their actions through the International Criminal Court.

Types of Cybercrimes?

3 main types of cyber attack

1.Distributed Attack:

    This is where malware is installed on multiple computers there are various ways that a distributed attack can reach your PC or mobile phone.
Encryption and ransomware hackers encrypt you files and hold your data to ransom never pay the ransom more often than not they’ll take your money and still not unlock your data the only solution is to restore your data from backup. Browser manipulation the malware manipulates what you see on your browser and steal your data, for example, the malware inserts a few extra lines of code into your bank’s website the website looks the same but the malware is stealing your data.


Key Logger: This type of malware sits in the background of your pc and captures what you’re typing to learn your behavior and potentially catch your personal data. 

Distributed Denial of Service (DDOS): Bombard your website with traffic until the server collapses and goes offline. So, how could you get caught by this malware? You install it. It could be in the form of a website downloads a pop-up box where you’re a winner type of messages, emails attachment or USB drive.

How do I avoid it?
Don’t click on any links or pop-ups the looks suspicious or that you’re not expecting. If in doubt don’t click on a PC you can press Alt+ F4 to close the window completely.

2.Central Attack:

         This is where a central system is hacked in a bid to get customer data usually for financial gain alternatively a central attack may be done in the name of hacktivism for moral social or political reasons a prime example of this was the Ashley Madison hacking scandal in 2015. Which saw thousands of appliance form the infidelity dating website have their personal details stolen with the threat of exposure if the parent company didn’t shut down.

How do you avoid it?
Unfortunately, you can’t that says you have absolutely no control over whether or not this happens but central systems are becoming more and more vigilant and resistant to such attacks. 

3.Personal Attack:

        This is exactly what it says on the tin a personal attack on your data. The most common types of personal attack are email spoofing, telephone spoofing, and letter spoofing.

     How can you avoid it?
     B’s cybercrime aware stay vigilant and use your common sense if someone calls you to form
     Microsoft to remotely log on to your home computer the chances are it's fake ask yourself. If it’s too good to be true.

    Cybercrime report 2019

    Today’s cybercrime world has been lowered. it is now easier than ever to carry out an attack join us as we go under the hood of this clandestine ecosystem understand where the attack begins and how malware is now more stealthy and targeted learn how it goes under the radar so much so that crypto hackers infect ten times more organizations than ransomware but only one in five IT security professionals are aware they were affected checkpoints cybercrime report brings you up to speed get your copy today.


Why You Should Be Concerned About Cybercrime 

     Over the past few years, cybercrime has increased exponentially.  If you haven’t noticed, state and federal agencies have developed cybercrime units and created new legislation to fight online crime.  While the good guys continue combating these cybercriminals, there are some stats from SecurityIntelligence.com you should be aware of in order to appropriately protect yourself:

  • By 2019, the cost of cybercrime will reach $2 trillion dollars.
  • Identity Theft Resource Center’s "ITRC Data Breach Report" noted that more than 29 million records were exposed in 858 publicized breaches in financial, government, healthcare, and education in 2015 alone.
  • The average cost per stolen record in America is $220 (that’s just in initial damage)
  • The average cost of a data breach involving the theft of assets totaled $879,582 for small and mid-sized businesses. They spent another $955,429 to restore normal business in the wake of successful attacks. The problem is as technology is utilized more in business, it also becomes a more appealing target in the hacking and cybercrime communities… and there’s no sign of it slowing down.
     Because of the unseen nature of cybercrime, it can be easy to overlook it as a threat. You might not think to “lock the doors” of your IT network.  And, you’re not alone.  Looking at the facts above, it’s evident that many businesses focus on what they do best- serving their customers and growing their business, all the while, network security is overlooked.

    You might be wondering how to best protect yourself. Basic anti-virus software and firewalls within your network can help, but if you aren’t paying attention to updates or the latest technology, you are still vulnerable to the growing cybercrime epidemic.

    To best protect your critical business data and customer information, you might want to consider employing a team of technical experts. At Continuity Centres, we can help tailor your system to keep you safe from outside interference.  By knowing your business needs and capabilities, as well as the ever-changing threats on the web today, we strategize a plan to keep your business secure.

     5Most Devastating Cyber Attacks

Number 1: Melissa Virus

David Smith is perhaps, the discoverer of phishing attacks. Taking you to an America online chat group, Smith posted a document claiming to have credentials to several websites, but whose true content was the Melissa virus. Melissa then went viral.

Spawning itself across global email servers and several tech-savvy companies, including Microsoft, Intel, Lockheed Martin, were forced to shut down their email services after Melissa caused over $80 million in damages. The attack is inevitable.

Successful attacks are not but when we lock our focus on cyber resilience, we can withstand the unending parade of attacks and by persisting our security posture and maintaining line-of-sight, the attack the surface is compressed and becomes an inhospitable place for an attacker to win.

Number 2: Sony Pictures

The Guardians of peace (or GOP) fessed up to the crime by releasing a trove of sensitive data, including personal information, messages and correspondence, executive salaries, and even snatching several of Sony’s films. The group used a modified Shamoon wiper malware with a mechanism to wipe hard drives, unlike typical goals of stealing data, this malware hurts victims by completely eliminating their valuable information.

Number 3: Jonathan James

James breached the United States Department of Defence in 1999. Stealing Password, confidential messages, and software design for space exploration and the US military. 

In the 1960s, John F Kennedy famously urged the United States to “Go to the moon… not because it is easy but because it is hard”.
Well, mission accomplished. But, 30 years later NASA had to shut down its entire network for three weeks, costing millions in response to James’s brute-force attack.

Number 4: Conficker

In 2008, this worm exploited a number of Windows operating systems. It then, linked these computers together into a massive botnet, which was a new idea at that time. Conficker had several spoils of victory, including the creation of a whole new class of threats and leaving many world leaders no choice, but to call in favors from other nations to mitigate the attack.

Number 5: Mafiaboy’s 

Mafiaboy’s denial of service. Michael Calce, aka Mafiaboy, then 15 years old claimed that he had unknowingly input several widely known IP address into a security tool he had downloaded from the web.

Being a teenager, Calce went off to school and when he returned home, find his exploits were plastered all over the news. Denial of service attacks, like Mafiaboy, flood a site with traffic, disabling its ability to serve legitimate users. Yahoo, which, at the time was the world’s most used search engine collapsed, Buy.com, eBay, CNN, Amazon was all brought down for several hours, costing billions in the aftermath.


So, what are your top five? Drop them in the comments section below and I can’t wait to see who’s on your list.

Thanks for reading the article.
Don’t forget to share with your friends. 







Next Post Previous Post
1 Comments
  • Admin
    Admin 27 June 2019 at 23:20

    This is very nice post cyber crime.

    Visit our website to see our best collections!
    Lipstick Queen Best Sellers Lipstick Trio
    The World's Best Non Toxic Nail Polish
    The World’s Most Exclusive Perfumeries for Women
    Hair Removal for Women's Body Arm Legs Face Lips and Bikini
    Ultimate Absorbency Period Pads

Add Comment
comment url