What is Internet Crime?
- Computer Network Break-ins– This can comes from hackers who break in for “fun” to the thieves looking for things of value.
- Industrial Espionage – Companies do steal from each other, including vital information on what the competition is up to.
- Software Piracy– If you buy software at a greatly reduced price it could well be counterfeit. It’s the same as coping it without purchasing a legal copy.
- Child Pornography– They are out there, and in larger numbers then you could ever imagine. The vast majority of what is on the Internet is porn.
- Mail Bombings– Email Trojan horse that could blow up or crash your computer.
- Password Sniffers– Hackers have developed programs to record every keystroke you do and report it back to them, thus giving them your passwords.
- Spoofing- Web spoofing allows an attacker to create a " shadow copy" of the entire World Wide Web. Accesses to the shadow Web are funneled through the attacker's machine, allowing the attacker to monitor all of the victim's activities including any passwords or account numbers the victim enters. The attacker can also cause false or misleading data to be sent to Web servers in the victim's name, or to the victim in the name of any Web server.
- Credit Card Fraud – Hackers have broken in and stolen credit card number and run up large tabs on them. One just caught actually charged something to Bill Gates account. Funny until it happens to you, protect yourself. The U.S. Secret Service believes that half a billion dollars may be lost annually by consumers who have credit card and calling card numbers stolen from on-line databases.
- Phishing - (Pronounced “fishing”) the act of sending an e-mail to a user falsely claiming to be an established legitimate enterprise in an
attempt to scam the user into surrendering private information that will be used for identity theft. The e-mail directs the user to visit a Web site where they are asked to update personal information, such as passwords and credit card, social security, and bank account numbers, that the legitimate organization already has. The Web site, however, is bogus and set up only to steal the user’s information. See the email to the right? This was a phishing email sent to me. One of the easy ways to tell it is not legitimate is to hold the cursor over the link they want you to click on (by the way, never click on it). If it just displays numbers and not the name of the supposed company - such as usbank.com, then they are phishing for more information from you.
- Evil Twin - A bogus base station that an unsuspecting person connects on to. The cyber theft jams the connection to a legitimate base station by sending a stronger signal to the wireless client -- turning itself into an 'evil twin.' People think their laptops are connected to legitimate wireless internet connections. They may then transmit valuable details or personal information, not suspecting that they are being intercepted.
Personal Information
Be wary of sites or email that want more information than they should need such as
- Bank Account Numbers
- Social Security Number
- Mother’s Maiden Name
- Pin Numbers
Passwords
- Protect your passwords - Don't store them in a file named "Passwords"
- Don’t make it too easy - mix it up with characters and numbers
- Same password for different accounts - have a separate password for each account
- Change password at least twice a year
- ATM machines - watch out for "shoulder surfers" especially the ones talking on a cell phone. The new ones can record your card number and your entry code.
But there are some companies which provide real teach support....
Famously Known as Follow
www.gitsolutions.net
www.365techonline.com
www.log4support.com
www.log2rescue.com
etc.
this sites are well known to provide tech support in U.K, Canada and Australia.
But some of the scam are using there name to scam you so be careful...