Cybercrimes: What are, types, examples and how to protect from cyber crimes

With the Internet it is facilitated to do almost everything: pay the accounts, make market, study or work.However, cybercrimes are also discussed on the world in the world.No one is exempt from being a victim of cyber crimes.But what are cyberdelites or what is cybercrime.Below is a wide scenario to know what cyberdelite is and some examples of cyber crimes.

The history of the Internet: past, present and future of the invention that changed everything

➥ Read article

Table of Contents

What are cybercrimes and what is cybercrime?

The definition of cyber crimes refers to those illegal activities that are executed with the use of a network, computer or device connected to a network, in order to commit fraud, theft of identities, identity violation, among others.

Although many of the cyber crimes have as its purpose the profit of cybercriminals;It can also be executed with the intention of damaging devices or interrupting the operation of online sites or services.

There are several types of cyber crimes.Individuals are linked to the propagation and dissemination of illegal or malicious information a person or group of people on the Internet.Pornography distribution or online extortion are some of the examples of individual computer crimes.

Property crimes are related to the theft of bank or financial data, access keys, credit cards, personal information or other data that allow cybercriminals to commit fraud, extortion or money subtractions on line online.

For their part, cyber crimes against the government, although less common, are still dangerous.It has to do with interference in official web portals, distribution of government propaganda or documentation of documents or classified information.

Who executes it?

In most cases, cybercrimes are executed by computer experts, fans and people with some experience and skills for the management of computer data and programming.But, they can also be carried out by highly qualified criminal organizations and developers.Many of these organizations have bases in countries with little or no regulation in cybercriminology and cybernetic crimes.

In any case, cybercriminals do not work alone.There are several factors that depend so that a cybercital cybercital data is carried out and devices connected to a network.To do this, malicious software or viruses that attack the victims' systems.They are always looking for new ways to attack without being discovered.How many and what are the most common computer crimes?

Types of cyber crimes

Computer crimes range from identity, data or valuable information;But it also consists of damage to the devices or blockages to online services.The definition of cybercrime covers all those illegal acts linked to computer science.

Hacking

Hacking is one of the most popular cyber crimes.It consists of accessing without authorization to data and systems of a computer or network to steal information, modify files or interrupt the normal functions of the site.

Social engineering

Social engineering attacks are one of the most common cybercrime examples.It consists of manipulating people to provide confidential information necessary to commit online fraud.Cybercriminal.

DDOS attacks

DDOS attacks are mostly aimed at web servers of large companies or government entities.These cybercrimes try to collapse and tear down the network so that an online service stops being available or does not work properly.

Malware

Malware are another type of current cybercrime.These are malicious software designed with the intention of attacking computer systems.With the use of malware, important files can be blocked to request a reward for your release.It works through viruses, Trojans and worms.

Phishing attacks

Phishing consists in obtaining valuable information from users in a deceptive way.Data collection is done through a fraudulent website but that has the same appearance as the victim so that this facilitates the information sought by the offender.

Trojan horses

Cibercrímenes: qué son, tipos, ejemplos y cómo protegerse de los delitos cibernéticos

Among the types of cyberdelites are known as Trojan horses.They are those types of malware program that are passed through legitimate and harmless software but that, when executing, are able to damage data files, steal information or interrupt the computer operation.They are one of the most dangerous cybercrimes examples.

Cybernetic harassment

Cyber bullying is another type of computer crimes today.Online harassment can be exercised through email or by social networks, in which the victim is attacked or defamed through comments, publications or direct messages.It is one of the cybernetic crimes with greater extension and growth in the world.

FTP password theft

When the starting information of the website is housed in poorly protected computers, pirates can have access to FTPPara passwords to enter and modify or alter the web content of the victims.

SQL injections

This is a type of cybercrime of malicious code that allows cybercriminals to attack any unprotected database.The attack consists of injecting SQL code portions into a web form, which provides the pirate easy access to the site backend.

Pirate software

The distribution and use of pirate computer software is another of the most common cyber crimes.The unauthorized material can contain viruses, worms or Trojan that put at risk or damage the operation of computers.

10 famous cybercrimes of the world

In recent years, cybercrequence stories and images have filled world news.From large companies such as Sony, Uber or Yahoo to personalities of world politics or entertainment have been victims of cyber crimes and have known what cybercolin convenience is.Below the 10 most famous cybercrimes.

Twitter (2020)

During the Covid Pandemia, some celebrities and celebrities such as Barack Obama, Bill Gates and Kanye West were victims of kidnapping their Twitter accounts.Users of the social network were surprised in mid -July 2020, when these personalities offered cryptomendas in exchange for donations for a campaign linked to the Covid pandemic.It was one of the most disseminated Internet crimes of 2020.

Petróleos Mexicanos (2019)

In Mexico there have been several cybercrimes to state companies in recent years.In 2019, a ransomware attack interfered 5% of state -owned operations, Petróleos Mexicanos.The criminals managed to access the company's database and published about 6 GB of confidential information.

MARRIOTT (2018)

The American Marriott International Hotels Chain either managed to escape cybercriminality.In 2018 they were subject to one of the largest cybercrimes in history, when they stole personal data and financial information of more than 500 million customers.The robbery was a loss of more than 3.500 million euros and a decrease in the shares of 5.6%.

Wanna Cry (2017)

About 300.000 computers from hundreds of countries were attacked in May 2017 by a ransomware called Wanna Cry.This was another of the most popular cybercrimes in recent years.With the attack, banks, companies and even hospitals belonging to the National Health Service (NHS, its acronym in English) of the United Kingdom were affected.

Uber (2017)

Another of the greatest cyber crimes of the last decade has been the one that affected Uber in 2016.The attack harmed about 57 million users of the platform when a large amount of personal data and drivers were exhibited.Uber paid cybercriminals the sum of one hundred thousand dollars with the intention of avoiding the dissemination of records.

Presidential elections in the US (2016)

The United States government has not been immune to cybercrriminality.In 2016, he suffered a cyber attack during the presidential elections that consisted of the publication of emails of the National Democratic Committee (DNC).With the assault, the password of several members of the committee was able to steal and presented confidential information.

Sony Pictures (2014)

One of the largest cyber crimes in the film industry was the one suffered by Sony Pictures in 2014.The hacker group known as #GOP accessed Intranet and stole some unborn films and confidential information related to salaries and personal data of employees of the entertainment company.

EBay (2014)

Also in 2014 one of the greatest cybercrimes of the decade took place.It was a massive theft of data in the accounts of the American EBAY Electronic Commerce Company.On that occasion, data that included passwords, homes, telephone numbers, names and emails of about 145 million users were stolen.

Wikileaks (2010)

One of the most popular cases in the last decade on data filtration is, without a doubt, the case of Wikileaks, the network created by the Australian Julian Assange.More than 250 thousand diplomatic telegrams from the United States were leaked, and many political and financial scandals that involved governments and companies from several countries were taken to public light.

I love you (2000)

The computer virus that infected millions of devices worldwide is one of the most famous cybercrimes.Under the title "Iloveyou", the malicious file was disclosed by email in 2000 and managed to damage files and computers in the United States, Europe and Latin America.

How to protect yourself from cyber crimes?

One of the greatest risks of digital life is exposure to be subject to computer attacks.Cybercriminology experts who know well the definition of cybercrime and how it works, warn the need to maintain updated systems and equipment in cybersecurity to prevent and reduce cyber crimes.Next seven practical and simple tips to deal with cybercrimes.

Use strong access keys

The keys that combine at least 10 characters between numbers and letters and symbols are more difficult to hack.It is also recommended to change them regularly and avoid as much as possible to use them in several places at the same time.

Updated software

Keeping updated software, systems and applications is a simple way to avoid carrimes.It is important to acquire official license software that provides the protection and assistance of developers.

Use VPN in public networks

When I use a public Wi -Fi such as libraries, hotels or airports;It is recommended to use a private virtual network (VPN), this will allow the data that comes out of their devices and protects them from any cyber attack.

Do not share personal information

Keep your personal and financial information safe.Do not provide keys, personal, banking data or email, unless they are totally sure they are official sites.

Do not open unknown attachments

Do not open unwanted emails or click on unknown websites.Many attachments of the spam mail can contain malicious software, worms or other viruses that put the security of devices at risk.

Apply SSL certificates and keys to your website

Use a safe protocol for your website to avoid cyber attacks.Apply the use of SSL/TLS certificates to ensure encrypted communication on personal or business websites.

Security software

Although alone it is not enough, it is always necessary to have reliable security software installed on the computer.Prefer recognized brand developers that offer a high cybersecurity quality in their antivirus, firewalls and advertisement blockers.

Where to go?

Spain has two specialized authorities in the fight against cybercriminals and cyber crimes: the Telematic Crimes Group (GDT) of the Civil Guard and the Technological Investigation Brigade of the National Police.

The GDT specializes in cases of cybercriminality and has the operational center in the national level;And in each province a technological research team works (edite).

To make a complaint, a form must be filled for it on the GDT website, the qualifier must be printed and submitted personally by the complainant or his legal representative before a court or.Police Center, according to the Criminal Procedure Law.

For its part, the Technological Research Brigade is competent to learn about scams, fraud, child pornography, hackeos, piracy and other cyber crimes.The victim can formalize his complaint through the web form, or in person at the offices of the Canillas Police Center.C/ Julián González Segador of Madrid.

Mexico and Latin America

In Latin America, the Computer Crimes Observatory (Odila) is responsible for informing and guiding the victim about the applicable legislation and the authorities where it can formalize the complaint of cybercrimes in your country.To do this, Odila has a brief form on its website where the interested party can request the information.

With the aim of preventing, attending and combating cybercrimes, the Mexican government created the cyber police that offers service 24 h 365 days a year.

The complainants can communicate through the email [email protect] or by the telephone number (722) 275 8300

Mexican citizens also have 088, 24 hours a day to report cyber crimes.

In short, you have to remain alert to cyber attacks or crimes, protect confidential information and update cybersecurity systems is key to reduce cybercrimes in the world.

Rate this content

Score: 0/5.Votes: 0

ComparteFacebookTwitterPinterestWhatsAppDiggTelegramReddItEmail

Recommended content

Cultura

Secret societies that dominate the world in silence

RedacciónDinero

Creative advertisements: 35 original and inspiring examples for different communication channels

Carmina MartosCultura

When the numbers become literary protagonists

Pedro GargantillaCultura

Why are the EC and Zeta pronounced like that in America?

Redacción

The last

Biological or genetic determinism: what is, characteristics, examples and differences with other types (social, cultural ...)

Iliana Contreras

Types of statistical variables: classification, definition and examples of statistics and probability variables

Nieves Lozsan

No places: definition, difference between place and no place and 8 examples of Marc Augé's theory

Carlos Cedeño

Examples of Latinisms: meaning of 120 phrases, expressions, words and phrases in Latin

Yossimar Rodríguez

The Eiffel Tower: History and 5 curiosities of the most emblematic monument in France

Diego Almao

Celeste vault: definition, elements, constellations and properties of the celestial sphere

Bernardo Vernaez

Others are seeing ...

Lifestyle

These are the most expensive clothing brands in the world

RedacciónCiencia &

How to be hacker from scratch.Complete guide, advice and resources for beginners

RedacciónLifestyle

The 10 most incredible tattoos of celebrities and their meanings

RedacciónDesarrollo

200 famous motivating phrases that will make you want to eat the world

Redacción