Cybercrime is any criminal activity that includes a computer, either as the target of the crime or as a tool for it. Every year, the global economy loses hundreds of billions of dollars as a result of the activity of cybercriminals.

The number of cyber attacks has grown steadily in the past few years. Hackers now target governments, companies, and individuals around the world – and may inadvertently help them carry out these attacks.

If you ever clicked on a link in a suspicious email only to have a similar email automatically sent to all of your contacts, then you are likely a victim – and partner – of the botnet.

Categories of cybercrime.

The categories are divided into three:

1. Crimes that use computers as a weapon (such as hacker attacks).

2. Crimes that target a computer or other device (for example, to access a network).

3. Crimes in which the computer is neither the main tool nor the main element but still plays an important role (such as storing illegally downloaded files).

With the increase in Internet availability in recent years, the nature of cybercrime has evolved.

Not long ago, the bulk of cybercrime activities involved illegal downloads of copyrighted content or hate speech on the Internet.

Nowadays, cases of extortion, mass surveillance, financial theft, data breach, personal information theft and espionage are making headlines almost daily.

Although many law enforcement agencies around the world have begun to crack down on cybercrime, the growing trend is showing no signs of abating.

To avoid persecution, some cybercriminals have moved to countries with weak cybercrime laws and switched from dollars to untraceable cryptocurrencies.

_ Types of cybercrime that exist.

Cybercrime can come in many forms, and they may not necessarily be related to some of them.

For example, even theft of a physical computer can be considered cyber criminal activity if the perpetrator intends to use the information stored on the computer for personal gain.

If someone steals a flash drive containing valuable data that they plan to sell on the dark web, that is also considered a cybercrime.

Some of the more common types of cybercrime include:

1. DDoS attacks.

Distributed Denial of Service (DDoS) attacks are carried out by botnets, which are large groups of computers that are remotely controlled by a hacker who uses shared bandwidth and its resources to commit malicious acts on the Internet.

Once activated, these devices combine together to generate massive amounts of traffic to networks or websites, with the goal of overloading their resources and impeding their functions.

2. Deception tricks.

Phishing is perhaps the most common form of cybercrime, and it involves the mass sending of emails that contain links to malicious websites and / or attachments containing files infected with malware.

When a user clicks on the link or attachment, they may unbeknownst to them, download malware onto their computers. Hackers can then use malware to spy on the victim’s browsing activity, steal their personal information, or add their computers to a botnet and use them to attack other computers.

3. Identity theft.

Revealing your personal information to hackers by following the instructions in phishing emails or installing malware on your computer may make you a victim of identity theft.

When hackers obtain your personal data, they can use it to steal money from your account, gain access to confidential information that you can access, or create fake documents using your identity. Hackers can also use your personal information to plan criminal activities or claim tax benefits in your name.

4. Exploitation groups.

As the name suggests, exploit suites are collections of exploits, parts of software designed to take advantage of bugs and security deficiencies on computers. Instead of having to develop these kits from scratch, hackers can buy them ready-made on the dark web.Moreover, victims do not have to visit a malicious website in order for their computer to become infected. Cyber ​​criminals can hack into any legitimate site and embed an invisible HTML tag that neither the owner nor the victim will notice until it is too late.


Ransomware is malware that prevents the victim from accessing her computers or blocks access to files stored on the hard drive.

The only way for the victim to regain access to their files is to pay a few hundred dollars in ransom according to instructions given by the hacker.To prevent the victim from reporting the incident to the police, hackers will try to convince them that local law enforcement authorities are already involved by using their logos and other images in the ransom note.

_ Examples of cybercrime.

Some of the most notorious cybercrimes in recent years have included:

1. 2013 Yahoo! Data breach – In 2013, cyber criminals penetrated the Yahoo Mail service and gained access to the names, addresses and phone numbers of at least 500 million registered users. It was later revealed that hackers had breached all 3 billion registered accounts, making this the largest data breach yet.

2. 2016 Dyn Cyber ​​Attack – In October 2016, a series of DDoS attacks against Domain Name System provider Dyn removed several popular sites and services, including Twitter, Spotify, Netflix, PayPal, and Amazon.

How to protect yourself from internet crime.

The effects of cybercrime can be devastating, which is why you must take steps to protect yourself.

1. First of all, you need to use the best antivirus software to ensure your computer is protected from adware, spyware, ransomware, and all kinds of other malware.

2. Keep all programs on your computer regularly updated to prevent hackers from accessing your personal information.

3. If you find a suspicious email in your inbox, do not open any attachments or click on any links included in it.

4. Always use strong passwords that combine letters, numbers and symbols. Make sure you have a different password for each service you use. If you need help keeping your passwords organized, you can use a reliable password manager.

5. You might also consider using a paid virtual private network (VPN) to add an extra layer of protection when browsing the Internet from a public Wi-Fi connection.

6. Like all programs on your computer, you also need to update your antivirus program regularly. Using the best antivirus software will allow you to monitor the health of your computer in real time and schedule regular scans to ensure that no threat is detected.

These programs will also automatically check for database updates, thus keeping your computer protected from the latest threats.

References :


Leave a Reply

Your email address will not be published. Required fields are marked *

Back to top button