Cybercrime refers to any crime that involves a computer and a network.
Cybercrime can be defined as “Offences that are committed against individuals or groups of individuals with a criminal motive to intentionally harm the reputation of the victim or cause physical or mental harm to the victim directly or indirectly, using modern telecommunication networks such as the Internet (Chat rooms, emails, notice boards and groups) and mobile phones “.
This includes hate crimes, telemarketing & internet fraud, identity theft & credit card account theft.
A study in Australia found that 2 out of 3 convicted cybercriminals were between 15 – 26 years old. Symantec has released a report indicating that cybercrime has surpassed illegal drug trafficking as a criminal moneymaker, and 1 in 5 individuals will become a victim.
Categories of cybercrime
Types of cybercrime:
Identity theft
Identity theft is a form of stealing someone’s identity in which someone pretends to be someone else by assuming that person’s identity, usually as a method to gain access to resources or obtain credit and other benefits in that person’s name. Identity theft occurs when someone uses another’s personally identifying information, like their name, identifying number, or credit card number, without their permission, to commit fraud or other crimes
Cyber fraud
The Internet is a useful way to reach a mass audience without spending a lot of time or money. A website, online message, or “spam” e-mails can reach large numbers with minimum effort. It’s easy for fraudsters to make their messages look real and credible and sometimes hard for investors to tell the difference between fact and fiction. That’s why you should think twice before you invest your money in any opportunity you find online.
Internet banking fraud
1. The Internet banking login details (account number, username, and password) of a victim are typically stolen through a phishing attack. Phishing is the attempt to acquire sensitive information such as usernames, passwords, and credit card details (and sometimes, indirectly, money) by masquerading as a trustworthy entity in an electronic communication.
2. Get a banking account/s to which money can be transferred and withdrawn
3. Clone the SIM card used by the person
4. Create beneficiaries (using the list of banking accounts) and transfer money to these beneficiaries
5. Withdraw the money from these accounts.
In each of these steps, the criminals can exploit different weaknesses in the system to achieve their goals.
For more on types of cybercrime: https://www.pandasecurity.com/mediacenter/panda-security/types-of-cybercrime/
#CyberAware Tips:
One small step can make a big difference in your online security.
- Keep a clean machine. Cybercriminals frequently exploit vulnerabilities in old software for their attacks, which is why it is essential to regularly update the software on your Internet-connected devices (including PCs, smartphones, and tablets) to reduce the risk of infection from viruses and malware.
• Make your passwords complex. Use a combination of numbers, symbols, and letters (uppercase and lowercase). Change your passwords regularly, especially if you believe your password has been compromised.
- Own your online presence. Control and limit who can see your information online by checking the privacy and security settings on your accounts and apps. Anything you post publicly could potentially be seen by a cybercriminal, so keep your personal information private. Your phone number, birth date, address, and even pictures that show the license plate on your vehicle should not be posted publicly. You should also turn off geotagging and location features on your mobile devices so criminals don’t know where you are in real-time.
• Share with care. Think before posting about yourself and others online. Once you post something publicly, it can never be fully deleted, so use caution. Consider what a post reveals, who might see it, and how it could be perceived now and in the future. Remember that future job recruiters and employers will likely look at your social media history and online presence, so make sure that you maintain a good reputation online.
- Lock down your login. Always opt to enable stronger authentication when available, especially for accounts with sensitive information including your email or bank accounts. A stronger authentication helps verify a user has authorized access to an online account. For example, it could be a one-time PIN texted to a mobile device, providing an added layer of security beyond the password.
• Beware of phishing emails. Take a moment to stop and consider whether or not an email that requests your personal information is from a legitimate source. Just as you would not open a door before being sure of who was on the other side, always be wary of unfamiliar email requests or links. Always delete any online communications (i.e., texts, emails, social media posts) that look suspicious, even if you think you know the source.
- Delete if in doubt. If you receive emails or messages from unknown sources, best delete them.
- Act immediately if you suspect your computer has been infected with a virus to get rid of the virus.
*Dr. Debarati Halder and Dr. K. Jaishankar (2011)
https://www.stopthinkconnect.org/campaigns/keep-a-clean-machine-campaign