Cybercrimes
are
illegal acts done through the use of the internet. People all over
the world use the Internet to commit a host of crimes, some of which
the public doesn't even know are capable of being done
electronically.
1. Phishing and Spoofing
Spoofing attack
is when a malicious party impersonates another device or user on a
network in order to launch attacks against network hosts, steal data,
spread malware or bypass access controls. There are several different
types of spoofing attacks that malicious parties can use to
accomplish this.
Phishing is the attempt to
acquire sensitive information such as usernames, passwords, and
credit card details (and sometimes, indirectly, money), often for
malicious reasons, by masquerading as a trustworthy entity in an
electronic communication.
Difference
Between Phishing and Spoofing
The
misconception that phishing and spoofing are synonymous, based on
nothing more than aesthetic similarities, pervades the Internet.
Phishing and spoofing are clearly different beneath the surface. One
downloads malware to your computer or network, and the other tricks
you into giving up sensitive financial information to a cyber crook.
Phishing is a method of retrieval, while spoofing is a means of
delivery.
2. Blackmail/Extortion
Extortion
(also called blackmail,
shakedown, out wresting, and exaction) is a criminal offence of
unlawfully obtaining money, property, or services from a person,
entity, or institution, through coercion. Refraining from doing harm
is sometimes euphemistically called protection. Using the
Internet to threaten to cause damage with the intent to extort from
any person any money or other thing of value.
3. Accessing Stored Communications
Accessing
Stored Communications or
hacking; Intentionally accessing, without authorization, a
facility through which an electronic communication service is
provided. The act of obtaining unauthorized access to data from
computer network. This is typically done to commercial and government
sites to threaten its owner. In late 2015, a group of Anonymous
Philippines
hacked
the Twitter account of actress Maine Mendoza, who plays the famous
character Yaya Dub of the popular AlDub tandem and posted links
and messages on the account.
4. Sports Betting
Sports
Beating is
engaging in the business of betting or wagering on any sporting event
or contest over the Internet. In some countries, gambling (including sports betting) is illegal even if you are doing it over the Internet.
5. Non-Delivery of Merchandise
Devising
any scheme to defraud, or for obtaining money or property by means of
false or fraudulent pretenses, or promises, and using the Internet
for the purpose of executing the scheme. The
non-delivery scam occurs when the scammer places an item up for sale
when there is actually no item at all. The item is subsequently never
delivered to the buyer after they purchase the item.
6. Electronic/ Cyber Harassment
Cyber harassment refers to online
harassment. Cyber harassment or bullying is the use of email, instant
messaging, and derogatory websites to bully or otherwise harass an
individual or group through personal attacks. Cyber harassment can be
in the form of flames, comments made in chat rooms, sending of
offensive or cruel e-mail, or even harassing others by posting on
blogs or social networking sites. Cyber harassment is often difficult
to track as the person responsible for the acts of cyber harassment
remains anonymous while threatening others online. This usually
applies to school-age children.
7. Child Pornography
Using the
Internet to transmit child pornography. Child
pornography is distributed nowadays mainly through the Internet.
Child pornography are produced not only on a professional scale by
commercial providers, but also privately using victims from the
producer’s own environment, from the exploitation of children by
clients of child prostitutes. Child pornography is sold over
commercial websites and also exchanged in closed groups or via
peer-to-peer networks. Criminal groups also use the Internet to make
big money selling child pornography.
8. Prostitution
9. Drug Trafficking
Delivering, distributing, or dispensing a controlled substance by means of the Internet. Darknet markets are used to buy and sell recreational drugs online. Some drug traffickers use encrypted messaging tools to communicate with drug mules. The dark web site Silk Road was a major online marketplace for drugs before it was shut down by law enforcement (then reopened under new management, and then shut down by law enforcement again)
10. Criminal Copyright Infringement
Criminal Copyright Infringement, the act of
piracy mainly for financial gain. In late 2014, the number one pirate
website, The PirateBay, was raided for the second time due to years
of pirating movies, music, games, books, and other software. These
kinds of websites earn money through advertsing.
When someone hacked my account for example my Facebook, is there any chance to retrieve my personal account? How?
ReplyDeleteYes there is always a chance to retrieve it. If your facebook account was hacked by someone and you really want it back this tutorial would help you get it back. Click the button "Your account has been Compromised". Then type in your email address, Login name , Full Name or your specified Phone No. Then facebook would search for matching users.
DeleteMam Kat, How we can avoid this kind of crimes which are related to ICT?
ReplyDeleteWe can avoid cybercrimes by following this basic steps:
Delete*Keep your computer current with the latest patches and updates.
*Make sure your computer is configured securely.
*Choose strong passwords and keep them safe.
*Protect your computer with security software.
*Protect your personal information.
*Online offers that look too good to be true usually are.
*Review bank and credit card statements regularly.
If i got ban at Face Book , because of click bait can i retrieve my Face book Account?
ReplyDeleteAs far as I know, you're not being banned on Facebook if you click a bait. If you clicked a bait you will not see the content and without knowing your bait also send to your friends and they are soon to be a victim.
DeleteHow can i avoid hackers to get in my system? Can the authoritys's trace their location?
ReplyDeleteTo prevent hackers:
Delete1. Perform required software updates for your operating system and web browser.
2. Install a firewall on your computer.
3. Change your passwords often.
4. Purchase or download anti-virus software.
5. Install anti-spyware/adware programs onto your system.
6. Delete emails from unknown sources.
For your second question, yes the authorities had a way to track the location of hackers.
i was once a victim of malware, i received a notification in a social media website, and when i clicked it, there are apps automatically downloading on my smartphone, and it always restarts etc. how can i avoid that situation from happening again?
ReplyDeleteDo the step 6 above.
Delete6. Delete emails from unknown sources.
Think before you click :)
Is there a way to avoid cyber harassment or child pornography? In this terms of cybercrime, does the government make an action for this harassment? And in copyright issues, how will the government support the author or the artist?
ReplyDeleteWe can prevent it by following the rules of cybercrime law and yes, it is included in Cybercrime Prevention Act of 2012, officially recorded as Republic Act No. 10175. In copyright issues, I don't know if there an act or bill about it, but I hope we have to avoid cybercrimes.
DeleteI have a friend whose fb account had been hacked. What actions should we make in order to be safe from hackers and avoid the loss of privacy and account?
ReplyDeleteWHAT TO DO IF YOUR FACEBOOK ACCOUNT HAS BEEN HACKED
DeleteGo to https://www.facebook.com/hacked and follow the instructions on-screen. You’ll go through three steps:
1. Verify your account and change password. You’ll be asked to identify your account, change your password, and change the password associated with the e-mail account that you use for Facebook.
2. Review and fix anything the cybercriminal changed.
3. Unlock account.
HOW TO PREVENT YOUR FACEBOOK ACCOUNT FROM BEING HACKED
DeleteSecurity settings are the key. So stop what you’re doing and print out this article. Then log into Facebook and update these settings.
From Account settings, click on Security. I recommend the following settings for the highest level of security.
1. Secure Browsing – enabled.
2. Login Notifications – enabled.
3. Login Approvals – enabled. This feature requires that you have a cell phone capable of receiving text messages. When enabled, you will receive a code via text message if your account is accessed from an unrecognized location.
This is important for teens. They may use computers at a friend’s house, the library, or other public locations. As an example, if you are logging in to Facebook from a computer in the library, you’ll be asked to enter in a code. You’ll receive the text message, know that it’s YOU using Facebook, and enter the code. If you receive the text message and you WERE NOT trying to log into Facebook, you’ll know there is a problem. And the hacker trying to get into your account will not have the code.
4. App Passwords – If you don’t have many apps associated with your Facebook account, you can probably leave this off. If you do enable login approvals as described above, and you do use apps such as Skype through Facebook, then you may want to set app passwords. You can read about this feature on Facebook Help and Inside Facebook.
5. Recognized Devices – if there is anything listed here that doesn’t look familiar, or the date is not recent, remove it.
6. Active Sessions – remove all except Current session.
As a last step, go to General Account settings and change your Facebook password. And finally, log out of Facebook when not in use.
Now with your Facebook account safe and secure, you can get back to important Facebook activities, such as post-election re-friending, without too much of a fear of hackers accessing your account.
Can you please enlighten me more about the 'Phishing and Spoofing.' I kinda don't get it.
ReplyDeletePhishing is the act of trying to trick someone into giving up valuable information to gain something, usually financial. As mentioned in one of my previous articles discussing social engineers, it could be through a variety of methods. A fake e-mail, call, Facebook message, text message, and the like, all to get you to expose your account details, such as your password or account numbers.
DeleteSpoofing is the act of creating a fake persona to make a person do something they normally wouldn't do. Would you intentionally download a virus? Intentionally send your friend a link to malware? Probably not. A malicious hacker would spoof their e-mail address to look like an official address and send an e-mail with a link for users to click. When a user clicks the link, the malware or a virus is installed automatically.
Phishing may, at times, require spoofing to trick the user into giving up information but spoofing does not necessarily result in phishing someone's account.
What must be the first thing that we should do as one of this cybercrimes happen to us?
ReplyDeleteReport it to the authorities.
DeleteWhat are the things that we must remember once we use or once we create our social media accounts in order to avoid this case ma'am?
ReplyDeleteTo prevent hackers:
Delete1. Perform required software updates for your operating system and web browser.
2. Install a firewall on your computer.
3. Change your passwords often.
4. Purchase or download anti-virus software.
5. Install anti-spyware/adware programs onto your system.
6. Delete emails from unknown sources.
For your second question, yes the authorities had a way to track the location of hackers.
What would be the best way to avoid getting you're account hacked?
ReplyDeleteTo prevent hackers:
Delete1. Perform required software updates for your operating system and web browser.
2. Install a firewall on your computer.
3. Change your passwords often.
4. Purchase or download anti-virus software.
5. Install anti-spyware/adware programs onto your system.
6. Delete emails from unknown sources.
How do we can prevent/avoid from cybercrimes ??
ReplyDeleteIn order to prevent cybercrime IT News Africa has come up with 8 tips to avoid cybercrime:
Delete*Constantly update passwords and login details
By changing your login details, at least once or twice a month, you can cut down your chances of being a target of cybercrime.
*A secure computer will deter cyber criminals
Always be sure to activate your firewall settings. Furthermore, installing anti-virus and anti-spyware software will protect your computer from various forms of malware, viruses, Trojan horses and other malicious software used to obtain your personal details.
*Be social media savvy
Make sure your social networking profiles (e.g. Facebook, Twitter, YouTube, MSN, etc.) are set to private. Check your security settings. Be careful what information you post online. Once it is on the Internet, it is extremely difficult to remove.
*Secure mobile devices
More often than not, we leave our mobile devices unattended. By activating the built-in security features you can avoid any access to personal details. Never store passwords, pin numbers and even your own address on any mobile device.
*Protect your Data
Use encryption for your most sensitive files such as tax returns or financial records, make regular back-ups of all your important data, and store it in a different location.
*Be aware of what you do while using public Wi-Fi Hotspots
While these access points are convenient, they are far from secure. Avoid conducting financial or corporate transactions on these networks.
*Protect your e-identity
Be cautious when giving out personal information such as your name, address, phone number or financial information on the Internet. Make sure that websites are secure (e.g. when making online purchases) or that you’ve enabled privacy settings (e.g. when accessing/using social networking sites).
*Avoid being scammed
Always think before you click on a link or file of unknown origin. Don’t feel pressured by any emails. Check the source of the message. When in doubt, verify the source. Never reply to emails that ask you to verify your information or confirm your user ID or password.
How can we protect ourselves when using internet?
ReplyDeleteJust follow the tips above Justin :)
Deletehow can we avoid hackers? why do they have to hack other people's account?
ReplyDeleteTo prevent hackers:
Delete1. Perform required software updates for your operating system and web browser.
2. Install a firewall on your computer.
3. Change your passwords often.
4. Purchase or download anti-virus software.
5. Install anti-spyware/adware programs onto your system.
6. Delete emails from unknown sources.
Other Tips:
Social Networking Security Tips
Panda Security offers 4 very simple social networking security tips:
1. Don’t post everything about your life.
2. Use strong passwords, with upper case letters and numbers.
3. Configure your profile privacy settings.
4. Keep your antivirus and operating system up-to-date.
From a hackers perspective, it's because they have nothing to do. Theres no way to hack facebook.
What they did is keylogged you. Make sure you have virus programs on your computer. SCAN everything. Then change your password. If you can, have someone else change your password.
Maam. What is the easiest way to avoid those disadvantages?
ReplyDeleteAs I listed above, you must practice it to avoid those disadvantages.
DeleteSo, we all know that commitment of cybercrimes have been interfering with the netizens. A lot of ways for the crimes to spread have been invented. So, now that that's the case, how can you assure the people that we can still use the internet safely? And is there a way to sue the criminals?
ReplyDeleteYou can prevent it by doing the safety tips above and there is always a way to sue the criminals.
DeleteMa'am, what if i receive a blackmail what should i do first?
ReplyDeleteTake this as an initial step:
Delete1.Inform the authorities that you are being blackmailed.
2.Keep in mind that paying is unlikely to stop the blackmailer's demands.
3.Don't confront the person (online or otherwise); end all contact with them immediately.
4.Place filters on your email account(s) to block their email address.
5.Block them from your social networking accounts and change the privacy settings to try to keep them accessing from your list of friends.
6.Change all of your passwords with strong, unique alphanumeric codes if you think you were hacked.
7.Consider starting new email accounts. Let contacts know that your old accounts were hacked and they should not open any message from them.
8.Password protect all of your devices.
Now, we learn more different struggles we face using the internet, so my question maam is how can protect ourselves from internet? specifically to the hackers?
ReplyDeleteKate also asked it to me. You can read my answer above.
Deleteif there is an disadvantage in ict then is it possible to have some advantages in ict? what are those advantages?
ICT had a lot of advantages but I listed some advantages:
DeleteICT encompasses telephone, wireless and computer technology, which are industries which have changed the way the world operates. Among its advantages:
Utility - communications can take place instantaneously, 24 hours a day, 365 days a year across the globe. Messages can be sent to one or multiple recipients.
Shared resources - groups of users can access the same programs, applications and even hardware such as printers and faxes using networking and wireless technology.
Education - used in schools, ICT has motivated students as well as facilitating completion of work and the communications between teachers and students. It is an equalizing agent in that all students can have access to it and work together.
Control - network set-up can control access to specific information and processes. It is also easy to monitor work as well as communications
When I read this, I prefer to follow the 10 commandments of using social media. Thanks for teaching :)
ReplyDeleteYes, you must follow it to avoid for being a victim of cybercrimes.
DeleteCan you give some examples of what are the effective solutions to avoid this issue?
ReplyDeleteIn order to prevent cybercrime IT News Africa has come up with 8 tips to avoid cybercrime:
Delete*Constantly update passwords and login details
By changing your login details, at least once or twice a month, you can cut down your chances of being a target of cybercrime.
*A secure computer will deter cyber criminals
Always be sure to activate your firewall settings. Furthermore, installing anti-virus and anti-spyware software will protect your computer from various forms of malware, viruses, Trojan horses and other malicious software used to obtain your personal details.
*Be social media savvy
Make sure your social networking profiles (e.g. Facebook, Twitter, YouTube, MSN, etc.) are set to private. Check your security settings. Be careful what information you post online. Once it is on the Internet, it is extremely difficult to remove.
*Secure mobile devices
More often than not, we leave our mobile devices unattended. By activating the built-in security features you can avoid any access to personal details. Never store passwords, pin numbers and even your own address on any mobile device.
*Protect your Data
Use encryption for your most sensitive files such as tax returns or financial records, make regular back-ups of all your important data, and store it in a different location.
*Be aware of what you do while using public Wi-Fi Hotspots
While these access points are convenient, they are far from secure. Avoid conducting financial or corporate transactions on these networks.
*Protect your e-identity
Be cautious when giving out personal information such as your name, address, phone number or financial information on the Internet. Make sure that websites are secure (e.g. when making online purchases) or that you’ve enabled privacy settings (e.g. when accessing/using social networking sites).
*Avoid being scammed
Always think before you click on a link or file of unknown origin. Don’t feel pressured by any emails. Check the source of the message. When in doubt, verify the source. Never reply to emails that ask you to verify your information or confirm your user ID or password.
how can we avoid to those hackers?
ReplyDeleteTo prevent hackers:
Delete1. Perform required software updates for your operating system and web browser.
2. Install a firewall on your computer.
3. Change your passwords often.
4. Purchase or download anti-virus software.
5. Install anti-spyware/adware programs onto your system.
6. Delete emails from unknown sources.
These are serious cases that we should really avoid and now i feel a lot cautious in my social media accounts. Thanks for the blog maam.
ReplyDeleteYou're welcome Laarnie :)
DeleteWhat steps/tips can we use to prevent hackers from getting to our system?
ReplyDelete7 Tips to prevent from hackers:
Delete1. Be suspicious of emails
2. Check link locations
3. Never open attachments (unless you’re really sure)
4. Use two-factor authentication
5. Use advanced passwords
6. Be wary of the cloud
7. On public Wi-Fi? Don’t share personal data
As of now i think most of the people are not using the technology well
ReplyDeleteIt depends in the user April. Technology had a big role in our life and we must use it in a good way.
DeleteCan you give me some tips on how to prevent cyber crime?
ReplyDeleteI mentioned it above. It is Ruwan's question also.
Deleteit has too many disadvantages for example the smugglers in the philippines can communicate faster on what they do
ReplyDeleteI didn't get your point Patrick. I'm sorry. Would you please make it clearer to me :)
DeleteEverything has disadvantages and advantages. What do you think are the advantages of cyber bullying?
ReplyDeleteI think cyberbullying doesn't have advantages because it is also part of cybercrimes in other countries. I hope the bill about cyberbullying in our country will be approved.
Deletemaam I think there are a lot of information can internet give to us but my question is how can we know if is it true? it is an example of disadvantages of ict right? because we all know that most on the internet was a garbage right?
ReplyDeleteSome information above came from your book Empowerment Technology and some from the internet. I think they are reliable because it is coming from Ma'am Juliet's book :) And not all information on the internet is a garbage. What do you think?
DeleteI think the advantages of ICT can help diminish these disadvantages. We can use ICT to send opinions and campaign against illegal and unfair actions being made by some netizens and we can also make people aware and inform them and call their attention through social media. But how maam can we really keep ourselves away from these disadvantages?
ReplyDeleteWe can keep away from the disadvantages from doing the safety tips in using ICT. It will help us a lot, so we must practice for being secure in the disadvantages.
DeleteIs Torrent downloader an example of criminal copyright infringement?
ReplyDeleteYes, maybe. But I read this conclusion in the internet that
Delete"One thing for sure, torrent is not equal to piracy. The torrent protocol is just a transmission mean for users to download files more easily. It is the content (not the protocol) that makes the act illegal. When it comes to downloading through the torrent protocol, there’s no real way to stay completely safe. However, it remains one of the most effective peer-to-peer protocols in the world."
So I'm not really sure if it is an example of criminal copyright infringement.
How can we protect our internet/social media in hackers?
ReplyDelete7 Tips to prevent from hackers:
Delete1. Be suspicious of emails
2. Check link locations
3. Never open attachments (unless you’re really sure)
4. Use two-factor authentication
5. Use advanced passwords
6. Be wary of the cloud
7. On public Wi-Fi? Don’t share personal data
I often believe that everything has its advantages and disadvantages. These disadvantages are caused mostly by the improper use of people or their unwise approach to it. It is so unavoidable in this society but of course, the advantages of it is what truly matters.
ReplyDeleteYes, I agree with you. Although there is a negative effect of ICT, we must always focus in the positive side and practice to be safe in the cyber criminals.
DeleteIt is normal for everything in this world to have its pros and cons. Yes, this is inevitable so what are best thing to do to lessen these things ?
ReplyDeleteJust be aware of the cyber criminals and practice some tips to keep secured in surfing in the internet.
DeleteWhat are things need to consider if we're browsing or using Internet ?
ReplyDeleteThere are a lot of things to consider in surfing in the internet and it is like preventing from the hackers also, so this the tips for that:
Delete7 Tips to prevent from hackers:
1. Be suspicious of emails
2. Check link locations
3. Never open attachments (unless you’re really sure)
4. Use two-factor authentication
5. Use advanced passwords
6. Be wary of the cloud
7. On public Wi-Fi? Don’t share personal data
If I am being blackmailed, is calling the police a right move?
ReplyDeleteTake this as an initial step:
Delete1.Inform the authorities that you are being blackmailed.
2.Keep in mind that paying is unlikely to stop the blackmailer's demands.
3.Don't confront the person (online or otherwise); end all contact with them immediately.
4.Place filters on your email account(s) to block their email address.
5.Block them from your social networking accounts and change the privacy settings to try to keep them accessing from your list of friends.
6.Change all of your passwords with strong, unique alphanumeric codes if you think you were hacked.
7.Consider starting new email accounts. Let contacts know that your old accounts were hacked and they should not open any message from them.
8.Password protect all of your devices.
So, the answer in your question JC is a yes.
Hacking is a Cybercrime?
ReplyDeleteYes, it is.
DeleteI was once a victim of a hacker, is there a way to prevent/avoid it?
ReplyDelete7 Tips to prevent from hackers:
Delete1. Be suspicious of emails
2. Check link locations
3. Never open attachments (unless you’re really sure)
4. Use two-factor authentication
5. Use advanced passwords
6. Be wary of the cloud
7. On public Wi-Fi? Don’t share personal data
The Pirate Bay (commonly abbreviated TPB) is an online index of digital content of mostly entertainment media, founded in 2003, where visitors can search, download and contribute magnet links and torrent files, which facilitate peer-to-peer file sharing among users of the BitTorrent protocol.
ReplyDeleteIn 2009, the website's founders were found guilty in Sweden for assisting in copyright infringement. In some countries, Internet service providers have been ordered to block access to the website. Subsequently, proxies have been providing access to it, and its content is being provided by multiple round-robin servers, collectively nicknamed the "TPB hydra"
I don't know if torrent can be shut down also. I think it is in the process of the court.
The site is reporting an illegal sports betting site in Korea.먹튀
ReplyDeleteChannels made redirection beguilement structures to sports and more data online have moved sports. 토토
ReplyDeleteEverything about the site reports illegal sports betting site in Korea. 토토
ReplyDeletePlace more disadvantage or tell us u don't have anything
ReplyDeleteWhat are the possible means of curtailing the harmful effects of ICT
ReplyDelete