Cyber crime is something that has long been discussed, particularly since the advancement of technology and the capabilities of the internet. Something that might not be known to most people is that there are actually three different categories of cyber crime. Let’s delve deeper into those categories:
- Property – similar to possessing bank card information and bank account details of another individual. Information is stolen to access money, make online purchases or run phishing scams to encourage people to wire whole sums of money
- Individual – involves one criminal operating alone who is sharing illegal or malicious information online. This could include anything from cyberstalking to trafficking
- Government – the least common cyber crime category, this is a cyber crime that’s committed against the government and includes hacking their websites, hacking military websites or distributing propaganda
Now that we’re aware of the different categories of cyber crime, there are many different types of cyber crime out there that someone could fall victim to, whether you’re a domestic or commercial internet user. Not every type of cyber crime has the goal of stealing money, so let’s take a closer look at some of the cyber crimes that could be committed:
DDoS attacks
These are used to ensure an online service is unavailable. It does this by taking the network down by flooding it with site traffic from a number of different sources. They will then create entire networks of infected devices, known as botnets, to deposit malware on the user’s computer or another device they’re using. Once the network is down, the hacker will then hack into the system, rendering it useless and unsafe to outside users.
Identity theft
Cyber crime can also take the form of identity theft. In order for someone to steal your identity, they will need to acquire a range of personal information about you, including your name, your address, your date of birth and even a phone number. They will commit identity theft for a number of reasons, including:
- To steal funds from you
- To access confidential information
- To access online accounts
- To participate in tax fraud
- To participate in insurance fraud
- Open an online account in your name
- Plan criminal activity in your name
- Claim government benefits in your name
Cyberstalking
Cyberstalking is effectively the same thing as real world stalking, but this happens online. It’s considered to be online harassment as it often involves the victim being bombarded with a considerable and consistent amount of messages, phone calls and emails. Hackers can use social media, websites and search engines to instil fear or to intimidate the victim, bending them to their will. In most cases, the cyber stalker will know the victim, thus giving them more ammunition to use against them as they will know what scares them and what doesn’t.
Social engineering
These cyber criminals will make contact with you directly either using a telephone, a text message or an email. The idea of social engineering scams is that they’re used to gain your confidence and trust, making you believe that they’re legitimate by posing as a customer service agent.
They’ll learn a range of information surrounding the service they’re pretending to offer. Most often, they pose as companies who are selling mobile phone contracts. In order to set you up with an account or, just in case you already are a customer with the business they’re pretending to be, they’ll ask you for a series of personal information, including:
- Your name
- Your phone number
- Your address
- Your date of birth
- Your bank account information
- Your credit and/or debit card details
They will then take the information you’ve given them, no matter how detailed or vague you might have been, and they’ll find everything they can about you on the internet and will attempt to add you as a friend or follow you on your social media accounts. Once they have access, they’ll sell all of your information or they’ll take steps to secure any accounts you have in your name.
Phishing
Phishing is an online scam that is used by hackers to encourage recipients to hand over their personal information and sensitive data. They do this by offering big prizes or by scaremongering recipients, using emotive tactics to get them to submit, usually, bank account information. The name ‘phishing’ comes from the word ‘fishing’ because someone who catches fish uses bait to ensure the fish bites. This is what phishing scammers are doing in a digital, virtual capacity.
Creating and/or sharing illegal or prohibited content
Cyber criminals don’t always operate in a scamming or hacking capacity. There are crimes that are carried out over the internet that include sharing or creating illegal content. This could be anything from pornography to advertising illegal firearms, for example. Often, cyber crimes are carried out on the dark web. You can read about the dark web in one of our latest articles.
ICU IT are pleased to offer clients throughout Derby and the surrounding areas sterling IT support services. From IT maintenance and cloud hosting to round-the-clock monitoring when it comes to your IT security, you’ll always be able to count on us to support, maintain and manage your commercial IT systems. For further information about how we can help you today, get in touch with a member of our dedicated, professional team – we’re always pleased to hear from you.