How To Protect Yourself From Cyber Crime?

Cyber Safety and Cyber Crime

Talking on one topic isn’t sufficient, as, without cyber safety, cyber crime isn’t possible; and without cyber crime, there is no point of cyber safety.

Before beginning, I think we all ought to know about the real meaning of cyber safety.

Cyber Safety

See the source imagesource

Cybersafety is the safe and responsible use of Information and Communication Technologies. Internet safety includes keeping one’s information safe, privacy controlled and tracking locked.

Nowadays, many teenagers succumb to the internet, and that leads to cyberbullying and/or harassment.

It is about keeping information safe and secure, but also about being responsible with that information, being respectful of other people online, and using good netiquettes (Netiquettes are internet etiquette as in manners).

Precautions

Here are some precautions one can use for cyber safety

  • The first, and best tip in creating a safe online world for a child is done by their parents.

A simple conversation can help in teenagers confiding things to their parents. When parents do a good job about telling their child to say NO to cyberbullying, the child gets more open.

  • Advice for everyone, if you think someone is acting suspiciously, like asking information that you aren’t comfortable in sharing, REPORT THEM.
  • If you think someone has the password to your social media, immediately update it. Make a strong password.
  • While playing virtual games, do not give out your personal information, such as your name, residence, contact numbers, email, etc.
  • Do not open game links sent from strangers. You must have heard of Blue Whale game right? Well, that’s why you should not open game links sent from strangers.

What happens when you are not cyber safe?

When you aren’t cyber safe, it leads to cyber crime. Here is a list of possible outcomes of not being cyber safe.

  • Theft of personal information
  • Passwords that can be used against you
  • Hacking
  • Stranger love
  • A lot of other things

Cyber Crimes

See the source imagesource

Offences that are committed against individuals or groups of individuals with a criminal motive to intentionally harm the reputation of the victim or cause physical or mental harm, or loss, to the victim directly or indirectly, using modern telecommunication networks such as the Internet.

Fighting a cyber crime can be very difficult to difficult, but never easy for a common individual.

Here are some crime cases.

Case 1: A bunch of people steal $45 million using gift cards

What really happened? Well, here is an extract from DHS government

This merry bunch of backpackers—eight in all—were, in reality, a malicious band of bank robbers. They were armed not with guns and hostages, but with specially-encoded bank cards with no withdrawal limits. Taking a leisurely stroll down Broadway, they stopped at 140 different ATM machines along the way and—using the modified cards—completely emptied each ATM they encountered. These individuals completed a staggering 750 fraudulent transactions, stuffing the $400,000 spat out by the machines into their bags—all in just 2 hours 25 minutes.”

Believe it or not, this did not happen in just one country, it happened in 20 countries, all in the same 2 hours 25 minutes.

How did they do it?

(extracted from DHS government portal)

“This sort of scheme is known in dark web circles as an “Unlimited Operation”. Here’s how it works:

  • First, a sophisticated cyber crime organization hacks into the computer system of a credit card processor and acquires the account and PIN information for prepaid debit card accounts.
  • Next, the hackers manipulate the account’s security features, dramatically increasing the account balance and eliminating withdrawal limits. This turns the once ordinary debit card into a carte blanche.
  • The compromised account information is then distributed to a trusted global network of cells (known as “cashers”), who encode the account data on magnetic stripe cards, such as an ordinary gift card.
  • Then, at a preordained date and time, the hacker releases the PIN numbers to the network of cashers and the cashing begins, continuing until the hacker shuts down the operation.
  • As the cashers empty ATMs around the world, the hacker remains inside the financial institution’s network, monitoring their progress and ensuring he gets his fair cut.
  • After the cards are shut down, cashers go about laundering their proceeds into portable assets such as luxury cars and expensive watches. The hackers receive their cut via digital currency, wire transfers, or personal delivery.
  • These cyber-attacks rely on highly sophisticated hackers working in close concert with organized criminal cells on the ground. By using prepaid debit card accounts, the scheme can steal money without depleting the bank accounts of real individuals, which would raise alarms much quicker.”

Stay cyber safe, always.

Leave a Reply