What is cybercrime? 5 Types & how to protect yourself - Norton (2024)

Cybersecurity and cybercrime are undeniably important issues, with stories of hacks, online identity theft and the dark web never far from the headlines. Cybercrime has even been showcased on TV, in Mr Robot and in an arc on Grey’s Anatomy where the hospital was hacked and blackmailed.

Cybercrime is very definitely in the mainstream – and we’re all using devices more than ever, but many of us are still unprepared for a cyber-attack. We think it won’t happen to us – but cybercrime happens every day, and it could happen to you.

You’d never dream of leaving a house or car without locking it, but many of us do the digital equivalent every day with our phones or computers.

The good news is that there are ways to prevent many, if not most, cybercrimes with a little vigilance, some good habits and awareness of online vulnerabilities.

Here are five of the most common examples of cybercrime, and how to best prevent them.

What is cybercrime? A definition

Cybercrime refers to any illegal activity that uses, targets, or otherwise involves computers or computer networks. That can include digital identity theft, malware distribution, data theft, extortion, and online harrassment, to name a few.

Who are cybercriminals?

A cybercriminal is anyone who commits malicious or illegal acts using computers or information technology. While serious cybercrime is often perpetrated by organized groups of cybercriminals, it can also be committed by everyday individuals.

The word “hacker” is often used interchangably with “cybercriminal,” but not all cybercriminals have the technological skills of a hacker, and not all hackers are cybercriminals. Lots of so-called “white hat” hackers use their know-how to thwart “black hat” hackers engaging in criminality.

Types of cybercrime #1: Fake public networks

The crime

Yes, free Wi-Fi is always tempting, but a Wi-Fi network is notoriously easy to set up. Theoretically, someone could set up a fake Wi-Fi network under the name of the café or bar you’re in – and next thing you know, you’ve logged on to the network and someone is watching every single thing you’re doing.

That’s not great, is it?

Everything you do on the free network could be up for grabs – that means passwords, PINs and personal browsing information. Yikes.

What to do

When you’re out and about, it’s almost always worth taking the hit and paying for your own internet use (chances are you’re lucky enough to have 4G, so it shouldn’t be a big concern). If you don’t have data on your phone, you can use free Wi-Fi, but consider using a VPN (a network that hides everything you’re doing online).

If you still want to use free Wi-Fi, quickly talk to a staff member to ensure that the Wi-Fi provider is legit. You don’t even have to ask that question; instead ask for the password or the Wi-Fi name, so you can make sure everything matches up.

Never connect to a Wi-Fi network if you don’t know what it is or who it belongs to as it may be a trap.

Types of cybercrime #2: Password phishing on public computers

The crime

Public computers are notoriously vulnerable and they can store information on thousands of people. Hackers can install apps on public computers (either onsite or remotely) to source this information.

Think of it like a high-tech version of peeking at someone’s PIN at an ATM. Put it like this: if you wouldn’t want someone watching over your shoulder, then you don’t want to use a public computer without taking precautions.

What to do

Covering your tracks is much easier when you’re using your own device. Public computers aren’t as common as they used to be, but they’re still popular fixtures in airports and some cafés. Password-sourcing and memorising programmes are common (you might even use one in your office), and hackers can install them on public computers and use them to steal passwords for users.

If you’re using a public computer, try to avoid online banking and shopping, and if possible, social networks. The latter may leave you vulnerable to having personal information stolen.

If you have to log in to any of your accounts, make sure you have two-factor authentication set up so that you get a text to your phone to verify the activity with a PIN code – that way, a hacker would need both your phone and your password to log in as you.

Types of cybercrime #3: Password theft

The crime

Password theft is the most common type of cybercrime as it can give access to everything from your financial accounts (bank, credit union etc.) to any online shops you buy from. The latter is especially risky, because once a hacker has open access to your favourite shopping account they could be able to get to your credit card – and then you’re in big trouble!

What to do

It can be a nuisance remembering multiple passwords, but we strongly recommend using a different, strong password for every website you’re on. Use upper and lowercase letters, numbers and punctuation in passwords, and change them regularly.

If you find multiple passwords hard to remember, use a mnemonic. For instance, your Amazon password might be BtoimB99! (“Buying things online is my Bag”).

You could also consider using a safe password management app to remember your passwords for you.

Types of cybercrime #4: Identity theft

The crime

Like many cybercrimes, this is a modern reworking of an old scam: pretending to be the victim in order to source sensitive information. Disguises are still used, but this time, a computer or device is front and centre.

What to do

Think of a stolen identity as combined pieces of a puzzle, and the more pieces you give away, the easier it is to put that puzzle together. So be especially careful on social networks, where the answers to “forgot password” questions might be lurking, such as your mother’s maiden name, pet names or first schools.

Also never give away your full postal address, any kind of ID numbers (which show up if you’re taking a picture of packing for holidays, for instance, and your passport is in shot) or other information that might be useful to hackers.

Types of cybercrime #5: Malware

The crime

With malware (a word that combines “malicious” and “software” so you know it’s nasty), a hacker can unleash a virus onto your device. This malware can be installed via a website or app, and can steal personal, financial or business information.

It can also be used to “brick” your device (making it completely useless), sometimes for blackmailing purposes – with hackers demanding a fee for returning the device (or even numerous devices, like an office network) to its original condition. In some extreme cases, malware can even be used to house criminal material.

What to do

Firstly, be careful about what you do online. It’s an obvious tip, but it’s one a lot of people take for granted. A lot of malware can be avoided by being smart online. Before you download or install anything onto your phone or computer, read the user reviews, check out the screenshots and try to find reviews beyond Google Play or the App Store.

Reliable antivirus and antimalware solutions are also invaluable for avoiding any nasty surprises.

Protect yourself online

As cybercrime evolves and becomes more sophisticated, you must be careful online. Your information is precious so keep up to date with threats, update your devices, and install a comprehensive security suite that keeps you safe online.

What is cybercrime? 5 Types & how to protect yourself - Norton (2024)
Top Articles
Is India safe to Travel? Latest Safety Updates
Browse the Glossary - T
Craigslist Cars And Trucks For Sale By Owner Indianapolis
Linkvertise Bypass 2023
Fnv Turbo
Mlifeinsider Okta
Top Golf 3000 Clubs
Cvs Devoted Catalog
William Spencer Funeral Home Portland Indiana
Bros Movie Wiki
Hssn Broadcasts
Programmieren (kinder)leicht gemacht – mit Scratch! - fobizz
Persona 4 Golden Taotie Fusion Calculator
Dump Trucks in Netherlands for sale - used and new - TrucksNL
065106619
Honda cb750 cbx z1 Kawasaki kz900 h2 kz 900 Harley Davidson BMW Indian - wanted - by dealer - sale - craigslist
Aspen Mobile Login Help
CANNABIS ONLINE DISPENSARY Promo Code — $100 Off 2024
Mission Impossible 7 Showtimes Near Marcus Parkwood Cinema
Ukc Message Board
Halo Worth Animal Jam
Quick Answer: When Is The Zellwood Corn Festival - BikeHike
Clare Briggs Guzman
Suspiciouswetspot
Saxies Lake Worth
Truvy Back Office Login
The Fabelmans Showtimes Near Baton Rouge
San Jac Email Log In
Mawal Gameroom Download
FSA Award Package
Proto Ultima Exoplating
Nicole Wallace Mother Of Pearl Necklace
Supermarkt Amsterdam - Openingstijden, Folder met alle Aanbiedingen
Manatee County Recorder Of Deeds
The best Verizon phones for 2024
Stanford Medicine scientists pinpoint COVID-19 virus’s entry and exit ports inside our noses
Tugboat Information
Cdcs Rochester
Cal Poly 2027 College Confidential
Craigslist Free Manhattan
Aita For Announcing My Pregnancy At My Sil Wedding
Danielle Ranslow Obituary
Deepwoken: How To Unlock All Fighting Styles Guide - Item Level Gaming
Advance Auto.parts Near Me
Das schönste Comeback des Jahres: Warum die Vengaboys nie wieder gehen dürfen
Spn 3464 Engine Throttle Actuator 1 Control Command
Used Auto Parts in Houston 77013 | LKQ Pick Your Part
Westport gun shops close after confusion over governor's 'essential' business list
Spongebob Meme Pic
Otter Bustr
라이키 유출
Secondary Math 2 Module 3 Answers
Latest Posts
Article information

Author: Eusebia Nader

Last Updated:

Views: 5976

Rating: 5 / 5 (80 voted)

Reviews: 95% of readers found this page helpful

Author information

Name: Eusebia Nader

Birthday: 1994-11-11

Address: Apt. 721 977 Ebert Meadows, Jereville, GA 73618-6603

Phone: +2316203969400

Job: International Farming Consultant

Hobby: Reading, Photography, Shooting, Singing, Magic, Kayaking, Mushroom hunting

Introduction: My name is Eusebia Nader, I am a encouraging, brainy, lively, nice, famous, healthy, clever person who loves writing and wants to share my knowledge and understanding with you.