• Latest
  • All
  • News
  • Business

Cybercriminals – Who They Are and What They Do

Nov 15, 2016

What is Environmental Monitoring and Why is it Important?

Sep 29, 2023

How Technology Has Revamped the Classic Solitaire Experience

Sep 27, 2023
Five cyber-security tools to look out for in 2022

Navigating the CVE Database – Tips for Efficient Vulnerability Research

Sep 26, 2023
How to Invest in Software and Security for Your Business

Unleashing Innovation: The Power of Custom Web Application Development

Sep 9, 2023
How to install and use a proxy for Instagram with OnlineProxy?

How to install and use a proxy for Instagram with OnlineProxy?

Sep 4, 2023
Unlocking the Power of Image Resizing in the Digital Era

Unlocking the Power of Image Resizing in the Digital Era

Sep 4, 2023
Top Benefits of Learning Salesforce for Beginners

Top Benefits of Learning Salesforce for Beginners

Sep 2, 2023

The Benefits of Implementing the SBG Bond Program in Your Organization

Sep 1, 2023
How Handheld Radios Improve Communication Efficiency in Industries

How Handheld Radios Improve Communication Efficiency in Industries

Sep 1, 2023
Impact and Importance of AI in Businesses

Revolutionizing Tech: Unveiling the Power of Specialized IT Solutions

Aug 29, 2023
Salesforce Training Best Practices: Strategies for Enhanced User Adoption

Salesforce Training Best Practices: Strategies for Enhanced User Adoption

Aug 29, 2023
Worldcoin (WLD) Price Today and Market Liquidity: Understanding Trading Volume

Worldcoin (WLD) Price Today and Market Liquidity: Understanding Trading Volume

Aug 29, 2023
  • Guest Posts
  • Advertise
  • Contact Us
  • Privacy Policy
Wednesday, October 4, 2023
Tech Featured
  • Home
  • Latest Tech
  • Apple
  • How to’s
  • Apps
  • Automobiles
  • Gadgets
  • Gaming
  • Reviews
  • Tech Tips
No Result
View All Result
No Result
View All Result
Tech Featured
No Result
View All Result
Home News

Cybercriminals – Who They Are and What They Do

by techfeatured
Nov 15, 2016
in News
0
0
SHARES
5
VIEWS
Share on FacebookShare on Twitter

[ad_1]

Cybercriminals are clever, organized in gangs, well-funded, and very tech savvy. The goal of these criminals is can be explained in two words: make money. They have hundreds of clever ways to accomplish their goal. They may capture sensitive data such as user names and passwords, credit card numbers, or e-mail addresses. They then either sell this information over the Internet in bulk to other cybercriminals or use the data themselves to make money.

Their crimes fall into two general types that often work together.

The first type of Internet crime is called social engineering. It is often an attempt to convince a user to open an email attachment or click on a link in an e-mail. These links may lead to a forged website where the user is asked to provide their username and password. This practice is called ‘phishing.’ Another example of social engineering is the scam that tries to convince a victim to send money.

The second type of crime takes advantage of software vulnerabilities to install malware. The e-mail links in the example above may lead to a malicious website that installs malware.

A few examples:

– Suppose cybercriminals break into a number of existing social media accounts – Facebook, MySpace, etc. and capture the usernames and passwords of those accounts. Access to those accounts allows them to capture the names and details of friends of those accounts. One way to monetize that information directly is to pose as the account holder and e-mail their friends with an imaginary emergency and ask those friends to wire money to a specific address or account immediately.

– Suppose they are able to download malware into your computer. This malware captures usernames and passwords of bank accounts, along with e-mail addresses from your address book. They the cybercriminals proceed to empty your bank accounts and send spam to everyone in your address book in your name attempting to infect them with the same malware.

– Maybe they are able to download malware that opens a backdoor to your computer. More malware is then downloaded to take control your computer remotely. Without your knowledge it has then become a ‘bot’ or ‘zombie,’ one of thousands, or even hundreds of thousands of computers in a network known as a ‘botnet.’ Hundreds of botnets are known to exist. These botnets may be used by cybercriminals either to send out billions of spam messages per day or rented out to attack other websites, or even other countries.

The fact is that these methods of Internet crime work. According to the Anti-Phishing Working Group, good credible estimates of the direct financial losses due to “phishing” alone exceed $1 billion dollars per year. And that is just one small slice of the Internet crime pie.

How many botnets exist? It is hard to tell. Several dozen large botnets are known to exist according to many experts. The number of smaller botnets is more difficult to determine. A 2009 post on SecureList.com estimates that at least 3600 botnets exist.

[ad_2]

Source: http://ezinearticles.com/?Cybercriminals—Who-They-Are-and-What-They-Do&id=4379613

Tags: androidapple iphonetechnology news
ShareTweetShareSendShare

For any queries, you can reach us at [email protected]

Latest Posts

  • What is Environmental Monitoring and Why is it Important?
  • How Technology Has Revamped the Classic Solitaire Experience
  • Navigating the CVE Database – Tips for Efficient Vulnerability Research
  • Unleashing Innovation: The Power of Custom Web Application Development
  • How to install and use a proxy for Instagram with OnlineProxy?
Tech Featured

© 2022. All Rights Reserved.

Navigate Site

  • Guest Posts
  • Advertise
  • Contact Us
  • Privacy Policy

Follow Us

No Result
View All Result
  • Home
  • Latest Tech
  • Apple
  • How to’s
  • Apps
  • Automobiles
  • Gadgets
  • Gaming
  • Reviews
  • Tech Tips

© 2022. All Rights Reserved.