John C. Post
posted a blog.
Before we look at the top cyber crimes, lets’ determine what exactly is this crime all about? Read our post here.
Here is a list of the top 5 cybercrimes to stay away from and to look out for!
1.Phishing
“Phishing†is the attempt to gain access to someone’s or some company’s sensitive and/or
personal information by and from the use of a computer. This is most often done, not by
hacking software, but by simply tricking the unfortunate person into entering their real
information. For instance, they will create a website that looks like/mimics a real website,
like a banking website. For instance, they can gain your email and phone number in minutes
by simply having you create an account n their webpage (if that is what they’re offering.) and
by doing so you will enter your information.
2. Identity Theft
Cyber hackers that have gained access to your banking information, personal accounts,
email, phone number, credit cards, etc… will most likely use this information to make
credit/debit card purchases online. The best thing you can do is to contact your bank to have
them temporarily shut down your credit/debit card. However, by making purchases, the
police can look at the areas in which the purchases were made via online receipt or contact
the manufacturer/distributer of the goods that were purchased online and look at the
billing/shipping address and from there are able to prosecute the cyber thief.
3. Online Bullying and Harassment
Online bullying is commonly connected to your online social profile. If you chose to use
online social media, for instance Facebook and Twitter, you are eligible to be
harassed/bullied online. This cyberbullying consists of messages, alerts or emails sent from
somebody to your email, phone or social media account. It’s easy to report threats and
harassments to a company. For instance, if someone sent you a Facebook message with a
threat in it, just report their account. State your reason, too, and they will be banned or sent a
strict warning.
4. Cyberstalking
Online cyber stalkers will try to monitor and follow someone’s online activity through
careful examination and monitoring software. One of the most popular methods of doing this
is to infect the victim’s computer with malware or a phishing bot that disables their computer
to do anything but post, or tracks their logins, passwords, screens, and even webcam.
5. Invasion of Privacy
The invasion of someone’s privacy online is what is defined as somebody online attempting
and sometimes succeeding to gain access to documents, information, and records of
somebody’s personal life. This includes sometimes infecting the victim’s computer with a
virus, hacking into it via remote hacking software, monitoring their webcam, screen, and
activities. If you believe or have proof that someone is invading your personal privacy online,
do not hesitate to report it to jail authorities as this crime, like all of the other cybercrimes
listed in this article, are fineable and punishable under lawsuit by the correct authorities.
1 LIKED
1 person likes this.