Cybercrime in a post


We must prioritize security over performance and storage - Mayukh Datta



We dwell in a rapidly growing connected world, from banking sector to government infrastructure, from data center to your home’s computer. Protecting these networks is no longer optional. Technology is evolving daily with a high increment rate. While it brings huge benefits, it can also be an evil’s tool to cause havoc.

In today’s world, half of the globe’s population use internet; browsing websites, communicating with people online, buying stuff from e-commerce websites, backing up valuable data to cloud server storage, carrying out money transactions, operating businesses and many more. One negative aspect of leading a digital life is becoming a victim of cyber-crime, cyber attacks taking place daily in this “webbed” world. We all face cyber attacks, directly or indirectly, but most of the time we remain in denial. Companies, governments and IT security firms recruit cyber security experts, better known as white-hat hackers, to fight against devastation-causing cyber attacks and protect a commercial organization, a nation or any other domain that constitute a node in a network.

everything one needs to know about cybercrime - blog by Mayukh Datta

What is Cybercrime?

Cyber crime is any illegal activity that is carried over a computer or network-connected device, such as a mobile phone.

“Every system on a network is vulnerable to it”

Internet of things (embedded computers in everyday objects connected via the internet), automated home with smart appliances (such as a refrigerator, microwave oven, air conditioner), petrol stations, nuclear centrifuges and unmanned aerial drones, all fall under the prey list of cyber crime.

Basically, the advantages that a cyber criminal gets are vulnerabilities (weakness in design or a bug) in a software or hardware that they exploit to perform attacks, and unintentional decisions made by a person using a software helps them to bypass security. Research tells that the latter happens the most.

There are two ways in which cyber-crime is committed:-
  • The computer as a target: Using a computer to attack other computers. e.g. Hacking, Virus/Worm attacks, DOS attack etc.
  • The computer as a weapon: Using a computer to commit real world crimes. e.g. Cyber Terrorism, IPR (Intellectual property right) violations, Credit card frauds, EFT (Electronic funds transfer) frauds, Pornography etc.
Whatever be the way of committing cyber-crime, it always causes social, mental, financial and personal damage to the victim.

everything one needs to know about cybercrime - blog by Mayukh Datta
Yass!

What are the types of Cybercrime?

  • Online Identity Theft:- One of the most common types of cyber crime where a person purports to be some other person, with a motive to create a fraud for financial gains. Stealing identity information such as credit card info, address, email ID, bank credentials. Common technique followed is phishing.
  • Injecting Viruses and Malwares:- Binding viruses and malwares with files (can be audio, video, software-setup file). Hackers also webjack websites and insert malwares into them.
  • everything one needs to know about cybercrime - blog by Mayukh Datta
    • Ransomware Attacks:- Most dangerous and feared type of malware. Locks your computer and encrypts all data in it unless a ransom is paid. Recently, the world faced some high-profile ransomware attacks – Wanna-Cry and Petya.
      everything one needs to know about cybercrime - blog by Mayukh Datta
  • DDOS Attacks:- Multiple compromised systems (botnets), often affected by Trojans or worms, are used to bombard an online service with overwhelming traffic requests from multiple locations and sources. That results in a Distributed Denial of Service attack on victim.
    everything one needs to know about cybercrime - blog by Mayukh Datta
    Botnets bombarding a server

  • Spamming:- Sending unsolicited junk messages in bulk over the internet to large number of users, for the purpose of advertising, phishing, spreading malwares, etc. We all receive hundreds of spam emails, text messages and calls monthly.
    everything one needs to know about cybercrime - blog by Mayukh Datta
  • Malvertising:- Unintentional downloading of malwares by simply clicking on some advertisements on any website that is infected. Malvertising villains injects malicious codes into the website.
    everything one needs to know about cybercrime - blog by Mayukh Datta
  • Cyber Stalking and Bullying:- Harass an individual, a group or an organization in a repeated and deliberate manner using the internet. It may include blackmailing, false accusations and defamation.
  • Child Pornography:- Federal law defines child pornography as any visual depiction of sexually explicit conduct involving a minor (less than 18 years old). 50% of websites retain this category of cyber crime.
  • Click-jacking or User Interface redress attack:- Tricking a web user into clicking on something different from what the user perceives they are clicking on, thus potentially revealing confidential data or taking remote access of their computer while clicking on seemingly harmless websites. Examples can be found here.
  • Hacking:- Any unauthorized access to or control over a computer network security systems for some illicit purpose. It can be done by exploiting vulnerabilities or by sending malwares.
    everything one needs to know about cybercrime - blog by Mayukh Datta
    Hacking is an art of exploitation.

  • Data Diddling:- Unauthorized altering of data before or during entry into a computer system, and then changing it back after processing is done. Example:- Inside a database, holding accounting data of an enterprise, one may change data using this technique about themselves or someone else showing that they are paid in full.
  • Software Piracy:- Illegal copying, distributing, downloading or use of software, disregarding copyright laws. 60% of computers run pirated softwares.
  • Cyber Terrorism or Cyber War:- According to the U.S. Federal Bureau of Investigation, cyber terrorism is any “premeditated, politically motivated attack against information, computer systems, computer programs, and data which results in violence against non-combatant targets by sub-national groups or clandestine agents.” It is designed to cause physical violence or extreme financial harm. According to the U.S. Commission of Critical Infrastructure Protection, possible cyber terrorist targets include the banking industry, military installations, power plants, space stations, satellites, air traffic control centers, and water systems.

Healthy habits to follow to stay safe:-

everything one needs to know about cybercrime - blog by Mayukh Datta
Safer You, Safer World.

  • Educate yourself. Every Internet user must have basic knowledge of Internet.
  • Change your Internet surfing habits. Be careful.
  • Never ever share any kind of unique codes or numbers with anyone. Such as,
    • Passwords and OTPs
    • Aadhaar card number
    • Passport or Driving license number
    • Credit card or Debit card details
  • Don’t save credit/debit card information on any website.
  • Install a security software. I recommend Quick Heal (Paid. Never use pirated anti-virus softwares). Run regular scans.
  • Always update your installed softwares to the latest version. This patches the bug in the previous version.
  • Use smart and safe browsers such as Google Chrome or Mozilla Firefox.
  • Configure Firewall.
  • Configure OS/Browser security and privacy settings properly.
  • Choose strong and different passwords for all of your online accounts.
  • Instead of managing passwords with a password manager, I advise to write all your passwords in a diary.
  • Turn off GPS and Bluetooth when not in need.
  • Don’t click on any pop-ups or ads claiming free offers at websites.
The old saying “there’s no such thing as a free lunch” still rings true today.
  • Try to avoid using public Wi-Fi hot-spots.
  • If an online service offers Two-step verification, then enable it.
  • Click only on links/URLs you know are safe.
  • Try to ignore emails from unknown senders, don’t open them.
  • To avoid unwanted call and messages on phone, activate DND. Call 1909.
  • Expand short URLs before opening them. It may redirect you to some harmful websites.
  • Only shop online on secure websites.
  • Double check Plugins/Login gateways/Apps asking you to authorize it with your social media account.
  • Don’t accept unknown Friend/Follow/Invitation requests in social media.

A little homework for my blog readers!

Biohacking – Quite a new term in the digital world.

Try to learn what it is and how it works. I found it to be an interesting thing, you may too.

Edited by Jhilam Mukherjee.


Hope you found this article worthful and useful. Kindly share this post on your social circles.
If you have a query or want to give a feedback, comment below.

Comments

  1. The tips are very useful. Thank you for enlightening us technologically impaired people.

    ReplyDelete
  2. The tips are really useful for us. Thanks for creating awareness. We need to educate ourselves in our busy lives.
    Thank you.

    ReplyDelete
    Replies
    1. Thanks. I, through my blog, will always try to update you all with vital tech informations.

      Delete
  3. Compact and informative…

    ReplyDelete
  4. Thanks for the tips

    ReplyDelete
  5. Sharing this article must be the primary priority rather than sharing a meme.
    “Chotta Packet Bada Dhamaka”.
    Keep writing brother and keep encouraging towards digitally safe world.

    ReplyDelete
    Replies
    1. “Sharing this article” – This is exactly what I want. So, that common people can educate themselves.

      Delete
    2. 😄😄

      Delete
  6. Congo bhai..nice one
    Written quite nicely
    Carry on the good work

    ReplyDelete
  7. Have you took any IT security course?

    ReplyDelete
  8. One word – Wonderful.
    Keep it up!

    ReplyDelete
  9. Thanks for this blog….it contains a lot of interest….once again thank you bro

    ReplyDelete
    Replies
    1. “Interest” will be “information”….sorry for d mistake

      Delete
  10. Much needed information…all in one place … awesome ..keep it up😀😀

    ReplyDelete
  11. This blog post is tremendously informative and I think every internet user should maintain these guidelines.

    ReplyDelete
    Replies
    1. Oh, my gosh! Appreciation from father. 😍😌

      Delete

Post a Comment

Popular Posts

How to dive into programming?

Inside Data Structures and Algorithms

Stacks

How to dual-boot Kali Linux and Windows 10 in a UEFI System