The 10 Most Widespread Cyber Crime

Cyber Crime Censored Nudity



The contribution of cyber crime in the criminal industry is one of the important things to discuss. With growing number of victims, it can't be denied that it's one of fastest growing criminal industries today.

Many of the stories involving cyber crimes, are only heard on well known institutions and governments, in fact, it's part of our everyday lives and without noticing, we are participating on some of the crime in cyber world.

This article will list down  the "10 Most Widespread Cyber Crime" that create mess in the cyber world.







CYBER DEFAMATION


Cyber Defamation is similar to slander except the involvement of computer as a medium of communication. The  primary intention of criminal is to lower the person reputation or standing in the member of society by saying untruthful statement about a person.

CYBERBULLYING


The increasing numbers of users of social networking sites today also lead to the increasing numbers of victims of cyberbullying. This is the same as bullying in which, harming people is the primary objective but no physical harassment involved instead the victim is tormented, threatened, harassed, humiliated, embarrassed. 

INTERNET FRAUD 


Internet Fraud generally refers to any attempt of doing fraud scheme using electronic media. Using online services (instant messaging or Internet forum), criminals formed a group where they are asking fraudulent transaction to its victim for their own personal gain.

DISTRIBUTED DENIAL OF SERVICE ATTACK 


Distributed Denial of Service (DDoS) is an attack where the criminal sends tremendous amount of data in which computer networks can't handle the amount of data received. This attack is commonly used to shutdown or make the networks unavailable to its intended user.
 

EMAIL SPOOFING


Since Serial Mail Transfer Protocol (SMTP) Gateway do not support authentication, email spoofing become one of the problem in the cyber world. This is an attempt to collect sensitive information by sending an email to a person in which the sender used other identity (commonly friends or famous artist).

ONLINE PIRACY


When the Internet was developed, piracy became a serious issue. Widespread distribution of products illegally became mainstream. Some issue associated in online piracy are: software piracy, copyright infringement, trademark and service mark violation, stealing of computer source code and many more. What is very alarming to this issue is, many people do it unintentionally because they thought that it's legal just because it's accessible without any payment. In order to reduce the number of cases about online piracy, Stop Online Piracy Act (SOPA) and Protect IP Act (PIPA) bills are proposed but fortunately did not accepted by congress.

HACKING


Hacking is the understanding on how secured the computer network is. The hackers look for vulnerabilities and  exploit it. Overtime, the term hacker began to evolve and split into many classification. Hacking also became ethical in which some of the notable and most wanted hackers in the history of computing built there own security company. This company perform a series of penetration test to improves the security of computer network.

SPAM


Started from a viking who repeatedly said the word "Spam, Spam, Spam",  spamming became a big pain in the ass for many. It s the distribution of unsolicited message by the use of electronic media. The most common tool for spamming is email but in the broader thinking it uses other electronic media such as instant messaging, personal messaging, commenting and many more. The name spam is originated from the distribution of unsolicited message by the company who produces SPAM luncheon meat.

PHISHING


Phishing is an attempt to collect sensitive information such as personal, financial and security information. Criminal deceived its victim by developing a website which is identical from well-known and trusted businesses, financial institutions and government agencies.

VIRUS DISSEMINATION


Computer virus is a program  that can replicate themselves to a computer networks. The theory of John von Neumann about "Self-Reproducing Automata" is now the most widespread tools used for cyber crime. In thousands of viruses uploaded in a computer networks daily (malware, adware and spyware), hundreds has possibilities to succeed in  bypassing the network securities that cause minimal up to maximum damage to every computer it affected. Some of the worst various attacks are Love Letter (ILOVEYOU virus), Klez, Melissa, Nimda, Anna Kournikova worm.

Comments (10)

Loading... Logging you in...
  • Logged in as
I´m running several websites and I´m concerned about security. As a normal user everybody gets affected my spam. A good spam filter and antivirus is essential.
My first website has been afected by spam, hacking and DOS. I think that it is possible to prevent a website from being hacked or an account from beeing spamed. But there is no sollution if a website is attacked by DOS.
How do you manage a DOS attack?
1 reply · active 675 weeks ago
This website is hosted in blogger so I don't have to worry with DDOS. Although, I own a hosted website, that website is not created for commercial purposes. I think you can prevent it by also denying it to access your web server. I searched on the Internet and find many result. You can try too.
My recent post Making Money By Selling Your Own Products Online
Nowadays,I thinks there were lot of this crime happened especially Internet fraud. I have been this situation before. Beware Internet users because there are many fraud on the Internet.
1 reply · active 675 weeks ago
Yeah! There is! Too bad, you experience this kind of crime. I think there's nothing we can do but learn from our mistakes and make improvement. Wishing you luck on your future in cyber world. Thanks for commenting!
My recent post Making Money By Selling Your Own Products Online
Cyber security is huge challenge in today's cyber world as criminals try the move faster
than the authorities. Anti crime solutions such as Internet security softwares, hotspot billing softwares can be beneficial to prevent Internet fraud and Internet hacking.
My recent post TEST JON
1 reply · active 675 weeks ago
Well said! Being unprepared to attack, can lead to the exploitation of a website. Now, putting a high level of security is a must .
My recent post Infographic: If Web Browsers Were Celebrities
security for our website is very essential..if we do not care enough about it,just wait n see..just like my site..how painful are me..
My recent post 7 RECOMMENDATIONS METHOD TO SPEED UP YOUR PC
1 reply · active 674 weeks ago
Yes it is! Leaving the security of you website is like leaving on your home without wearing any clothes.
My recent post Infographic: If Web Browsers Were Celebrities
I hate people who do ddos attacks :( what's the point?
myself being a poor kid, can only afford shared web-hosting. so my sites are often affected not through my own fault. The worst thing is I can't do anything about it till I can afford my own server.
Wew! That's why some are also supporting CyberCrime Law in the Philippines

Post a new comment

Comments by

10