Cyber Crime


Cyber crime

Cyber crime refers to any crime that involves a computer and a network.


Cyber crime can be defined as:  “Offences that are committed against individuals or groups of individuals with a criminal motive to intentionally harm the reputation of the victim or cause physical or mental harm to the victim directly or indirectly, using modern telecommunication networks such as Internet (Chat rooms, emails, notice boards and groups) and mobile phones “.


This includes hate crimes, telemarketing & internet fraud, identity theft &  credit card account theft.

A study in Australia found that 2 out of 3 convicted cyber criminals were between 15 – 26 years old. Symantec has release a report indicating that cyber crime has surpassed illegal drug trafficking as a criminal money maker, and 1 in 5 individuals will become a victim.

Identity theft


Identity theft is a form of stealing someone’s identity in which someone pretends to be someone else by assuming that person’s identity, usually as a method to gain access to resources or obtain credit and other benefits in that person’s name. Identity theft occurs when someone uses another’s personally identifying information, like their name, identifying number, or credit card number, without their permission, to commit fraud or other crimes

Cyber fraud

The Internet is a useful way to reach a mass audience without spending a lot of time or money.  A website, online message, or “spam” e-mails can reach large numbers with minimum effort.  It’s easy for fraudsters to make their messages look real and credible and sometimes hard for investors to tell the difference between fact and fiction.  That’s why you should think twice before you invest your money in any opportunity you find online.

Internet banking fraud


1. The Internet banking login details (account number, username, and password) of a victim are typically stolen through a phishing attack. Phishing is the attempt to acquire sensitive information such as usernames, passwords, and credit card details (and sometimes, indirectly, money) by masquerading as a trustworthy entity in an electronic communication.

2. Get a banking account/s to which money can be transferred to and withdrawn
3. Clone the SIM card used by the person
4. Create beneficiaries (using the list of banking accounts) and transfer money to these beneficiaries
5. Withdraw the money from these accounts.

In each of these steps the criminals can exploit different weaknesses in the system to achieve their goal

#CyberAware Tips:

One small step can make a big difference in your online security.

Keep a clean machine. Cyber criminals frequently exploit vulnerabilities in old software for their attacks, which is why it is essential to regularly update the software on your Internet-connected devices (including PCs, smartphones, and tablets) to reduce the risk of infection from viruses and malware.

Make your passwords complex. Use a combination of numbers, symbols, and letters (uppercase and lowercase). Change your passwords regularly, especially if you believe your password has been compromised.

Own your online presence. Control and limit who can see your information online by checking the privacy and security settings on your accounts and apps. Anything you post publicly could potentially be seen by a cyber criminal, so keep your personal information private. Your phone number, birthdate, address, and even pictures that show the license plate on your vehicle should not be posted publicly. You should also turn off geotagging and location features on your mobile devices so criminals don’t know where you are in real time.

• Share with care. Think before posting about yourself and others online. Once you post something publicly, it can never be fully deleted, so use caution. Consider what a post reveals, who might see it, and how it could be perceived now and in the future. Remember that future job recruiters and employers will likely look at your social media history and online presence, so make sure that you maintain a good reputation online.

Lock down your login. Always opt to enable stronger authentication when available, especially for accounts with sensitive information including your email or bank accounts. A stronger authentication helps verify a user has authorized access to an online account. For example, it could be a one-time PIN texted to a mobile device, providing an added layer of security beyond the password.

• Beware of phishing emails. Take a moment to stop and consider whether or not an email that requests your personal information is from a legitimate source. Just as you would not open a door before being sure of who was on the other side, always be wary of unfamiliar email requests or links. Always delete any online communications (i.e., texts, emails, social media posts) that look suspicious, even if you think you know the source.

*Dr. Debarati Halder and Dr. K. Jaishankar (2011)


Comments are closed.