What is cybercrime?

What is cybercrime?

 

 They are illegal behaviors carried out by cybercriminals in cyberspace through electronic devices and computer networks.

 They are scams, theft of personal data, strategic commercial information, identity theft, computer fraud, attacks such as cyberbulling, grooming, phishing committed by cybercriminals who act in groups or work alone.

 

 What is cyberspace?

 

 It is an intangible area that anyone can access with a computer from their home, their workplace or mobile devices.

 

 

 What means do cybercriminals use to commit a cybercrime?

 

 They use technological means such as: Internet, computers, cell phones, 3G and 4G communication networks, fiber optic networks, and software.

 

 What are the most common cybercrimes and misdemeanors?

 

 Cybercrimes are committed through malicious programs developed to erase, damage, deteriorate, make inaccessible, alter or delete computer data without your authorization and for economic and damaging purposes.

 

 Some examples are:

 

 Browsing attacks:

redirect your browser to pages that cause infections with malicious programs such as viruses, worms and Trojans.  These programs can erase your operating system, infect your phone and computer, activate your webcam, extract data, etc.

 

 server attacks:

 

they can damage or steal your data and deny you access to your information.

 

 Database corruption:

 

they interfere with public or private databases to generate false data or steal information.

 

 computer viruses:

 

they encrypt files, block smart locks, steal money from cell phones with text messages that seem from the company,

 

 

 spyware:

 

some of the devices have software installed that allows you to turn on and record with the camera and microphone.  They can also access your personal information without authorization and without your knowledge.

 Cybercrimes that use social engineering to deceive, threaten you and take personal data or information from other people or organizations, get money from you, impersonate your identity, digitally and sexually harass you.

 

 Some examples are:

 

 

 Phishing or Vishing:

 

cyber criminals pose as service companies, government offices or friends of a relative and ask for the missing data to impersonate your identity and thus operate your bank accounts, profiles on platforms and social networks,  web services and applications.

 

 

 Cyberbullying:

 

it is harassment by instant messaging, stalking in whatsapp, Telegram, Messenger and on social networks with the intention of persecuting, stalking another person, defameting them, threatening their honor and moral integrity.  This is done through the discovery and disclosure of secrets, the publication of offensive or discriminatory comments or videos, the creation of memes or the tagging of your publications.

 

 Grooming:

 

these are adults who, in a veiled way, try to obtain sexual photographs or videos of minors for subsequent blackmail or prior to sexual abuse.

 

 Sextortion:

 

which consists of asking for money in exchange for not spreading images generated for a consensual erotic exchange on the networks.

 

 Cyberhate:

 

they are inappropriate content that can violate people.  Cyberhate is considered violence, messages that incite hatred, xenophobia, racism and discrimination or animal abuse.

 

 

 Child pornography:

 

this is the corruption of minors and their sexual exploitation to produce, commercialize images and videos of explicit sexual activity.

 Another dimension of cybercrime has to do with the violation of people's privacy:

 Illegal espionage on the private communications of citizens.

 Violation of privacy by Internet service provider companies without the consent of the user, to know their tastes and preferences and establish the aggressive sale of associated products and services.

 Illegal access to the private communications of a worker (emails, social networks, etc.)

 

 What do I do if I am a victim of cybercrime?

 

 Report it

 Do not delete any communication, image or pop-up window: when a cybercriminal connects to the Internet they will generate an IP address that can be traceable.

 Do not erase the history of the devices.

 Save the chats.

 Save your emails.

 Take screenshots.

 Save any type of digital evidence.

 The computer experts will carry out an investigation that will help preserve the evidence to present it to the prosecutor's office closest to your home.

Enjoyed this article? Stay informed by joining our newsletter!

Comments

You must be logged in to post a comment.

Related Articles
May 15, 2021, 11:37 AM - MOHAMMAD JAKEER HUSSAIN
Mar 13, 2021, 6:29 PM - Angel 😌
Nov 18, 2020, 4:19 PM - MD. ANWAR HOSSAIN
Apr 5, 2020, 12:39 PM - Chandrabhan singh chidar
About Author
Recent Articles
May 20, 2024, 12:32 AM Humaira Mohsin
May 20, 2024, 12:20 AM Hunza
May 20, 2024, 12:15 AM umar shoaib
May 19, 2024, 11:08 PM Muhammad Assad Ali Chishti