Amazines Free Article Archive
www.amazines.com - Tuesday, April 23, 2024
Read about the most recent changes and happenings at Amazines.com
Log into your account or register as a new author. Start submitting your articles right now!
Search our database for articles.
Subscribe to receive articles emailed straight to your email account. You may choose multiple categories.
View our newest articles submitted by our authors.
View our most top rated articles rated by our visitors.
* Please note that this is NOT the ARTICLE manager
Add a new EZINE, or manage your EZINE submission.
Add fresh, free web content to your site such as newest articles, web tools, and quotes with a single piece of code!
Home What's New? Submit/Manage Articles Latest Posts Top Rated Article Search
Google
Subscriptions Manage Ezines
CATEGORIES
 Article Archive
 Advertising (133573)
 Advice (161671)
 Affiliate Programs (34799)
 Art and Culture (73855)
 Automotive (145712)
 Blogs (75614)
 Boating (9851)
 Books (17223)
 Buddhism (4130)
 Business (1330639)
 Business News (426446)
 Business Opportunities (366518)
 Camping (10973)
 Career (72795)
 Christianity (15848)
 Collecting (11638)
 Communication (115089)
 Computers (241953)
 Construction (38962)
 Consumer (49953)
 Cooking (17080)
 Copywriting (6733)
 Crafts (18203)
 Cuisine (7549)
 Current Affairs (20319)
 Dating (45908)
 EBooks (19703)
 E-Commerce (48258)
 Education (185521)
 Electronics (83524)
 Email (6438)
 Entertainment (159855)
 Environment (28973)
 Ezine (3040)
 Ezine Publishing (5453)
 Ezine Sites (1551)
 Family & Parenting (111007)
 Fashion & Cosmetics (196605)
 Female Entrepreneurs (11853)
 Feng Shui (134)
 Finance & Investment (310615)
 Fitness (106469)
 Food & Beverages (63045)
 Free Web Resources (7941)
 Gambling (30227)
 Gardening (25202)
 Government (10519)
 Health (630137)
 Hinduism (2206)
 Hobbies (44083)
 Home Business (91657)
 Home Improvement (251211)
 Home Repair (46244)
 Humor (4723)
 Import - Export (5459)
 Insurance (45104)
 Interior Design (29616)
 International Property (3488)
 Internet (191031)
 Internet Marketing (146687)
 Investment (22861)
 Islam (1161)
 Judaism (1352)
 Law (80506)
 Link Popularity (4596)
 Manufacturing (20914)
 Marketing (99316)
 MLM (14140)
 Motivation (18233)
 Music (27000)
 New to the Internet (9496)
 Non-Profit Organizations (4048)
 Online Shopping (129734)
 Organizing (7813)
 Party Ideas (11855)
 Pets (38165)
 Poetry (2229)
 Press Release (12689)
 Public Speaking (5643)
 Publishing (7566)
 Quotes (2407)
 Real Estate (126700)
 Recreation & Leisure (95495)
 Relationships (87674)
 Research (16182)
 Sales (80350)
 Science & Technology (110291)
 Search Engines (23514)
 Self Improvement (153300)
 Seniors (6220)
 Sexuality (36010)
 Small Business (49312)
 Software (83034)
 Spiritual (23516)
 Sports (116155)
 Tax (7663)
 Telecommuting (34070)
 Travel & Tourism (308305)
 UK Property Investment (3123)
 Video Games (13382)
 Web Traffic (11790)
 Website Design (56919)
 Website Promotion (36663)
 World News (1000+)
 Writing (35843)
Author Spotlight
DESIGNPLUZ DIGITALAGENCY

Designpluz has steadily matured from a passionate graphics design start-up, into a full service digi...more
ELLIOT CHANG

Financial analyst and author writing on economy and business. ...more
TAL BARNEA

Tal is an electrical engineer with over 25 years of expertise with hardware, software, mechanical an...more
MANMOHAN SINGH

Digital marketing professional with 8 years of experience. A good listner, Stratgist and fun loving ...more
LEMUEL ASIBAL

Lemuel Asibal is a web content writer who also ventures on writing articles and blog posts about any...more


CyberCrime - How it works by Franklin Forest





CyberCrime - How it works by
Article Posted: 04/04/2013
Article Views: 82
Articles Written: 5
Word Count: 982
Article Votes: 0
AddThis Social Bookmark Button

CyberCrime - How it works


 
Computers
With the exponential increase in the number of people, young and old, using the web, it's become increasingly lucrative to be a cybercriminal. Billions of money is moved online amongst individuals and amongst firms everyday, its a massive market place and the stage appeared to be set for the larger players to come and play - The organized crime. No longer is the single wicked computer programmer the primary threat out there. The big crime bosses fairly quickly recognized the economic opportunity that’s in front of them and so they seized it. Today organized crime is far more sophisticated than what we’re used to see on TV. They hire hackers, they have fraud internet sites and also have R&D teams that constantly attempt to develop the next best way to steal cash. Here are several statistics from Symantec regarding the scale of cybercrime .

There are 556 Million cyber crime victims annually(156 Million a day!). The international cost of cybercrime is 110 Billion dollars.

2/3 of online adults have been victims of cyber crimes sometime in their lifetime.

OK, enough of the intro…Lets get down to business and check out more common cybercrime tactics.

Malware

Classification: Malware is general expression used to refer to a malicious software or script. Malware may be, a Virus, a worm (much like a virus, but with somewhat distinctive attributes) a Trojan horse or a rootkit.Trojans are programs specializing in taking control of the infected computer and Rootkits are the concealment professionals, specializing in embedding themselves in machines and hiding numerous mischievous processes from the user.

How can we get infected: To get infected by Viruses, Trojans and Rootkits the user executes some action. We either mistakenly download them or someone sends them to us. The second we attempt to open the malware file, our complete system gets infected. The malware can be mounted on a normal software, for example an iTunes executable. After the infected file is opened, the malware hides itself inside the system. From now on, the malware has a considerable level of control over our system, depending on the sophistication of the malware.

Botnets

Botnets is a really terrifying problem. A botnet is a massive band of computers that are controlled by cyber criminals remotely. First the computer systems are infected by Malware which the user runs by mistake, once the computer is infected it will become a “zombie”. The zombie tries to set up communication with their controller, the owner of the malware. The zombies become slaves, they're within the total control of their operator. Cyber criminals can harvest the power of the botnet in various techniques in order to earn a decent profit. They generally utilize zombies to send spam to huge numbers of people. We’re dealing with Many billions of junk e-mail mail messages per day! Another widespread use of botnets is what’s referred to as a Distributed Denial Of Service attack or “DDOS attack” . DDOS occurs when the hacker that's controlling the zombies, instructs them to try and take down a website or online service. This is accomplished by ordering the zombies to create countless connections to the targets that the operator determines, rendering them not reachable for legit users.

Cybercrime earns money from botnets by renting out command over their botnets to clients in the illegal hacking community.

Although anti virus programs can usually detect the botnet malware, lots of people are unacquainted with this matter and don’t protect their computers properly. Can you imagine having your computer in your own home turning into a zombie and having it be a part of all types of illegal cyber crime or cyberwarfare activities all over the world? This has to be a alarming thought…

Fraud

Fraud has been around since the dawn of humankind, however the internet made it easier for fraud evolve into a whole new level. The key purpose of the frauders that reside online is straightforward: Get as much private data about as much individuals as possible. They use a wide variety of methods, some of the most common ones start from the spam that the botnets send. The mail usually says something regarding a cash prize that’s waiting for you if enter your own personal information. Often it contains a hyperlink to a website that pretends to be a website you trust, in hope to steal your details as soon as you submit this info to the fake website. The phony website scam is referred to as “Phishing”, and it’s seriously popular these days. The primary lesson to take from this is that you ought to pay extra attention to the websites that you are visiting, especially when you’re submitting your own personal information. as an example frauders like to use website URLs like twitter.shop.co instead of .com original name in an attempt to trick people. Avoiding this is simple, simply take a look at the URL and ensure it’s genuine.

There are many scams and techniques to take advantage of people. Be smart! Don’t give up your personal data to anything that appears suspicious.

So to summarize, the cybercrime process functions like so: Cyber criminals create Malware. Malware creates botnets and botnets create spam and with spam, more information is thieved from people. The spam also helps distribute even more malware which further increases botnets. The personal info that's taken from people might be sold in black markets and each and every form of information has a price, for example a credit card number might be worth X Dollars and a Facebook account name + password may be worth Y Dollars.

Cyber crime is an fast growing business.The hacker's techniques become more and more sophisticated as time goes on. We need to be informed of the risks if we wish to avoid becoming the next victims.

Here's a nice article about Botnets that I suggest you read if you'r interested.

Related Articles - cybercrime, viruses, malware, botnet, computer security,

Email this Article to a Friend!

Receive Articles like this one direct to your email box!
Subscribe for free today!

 Rate This Article  
Completely useless, should be removed from directory.
Minimal useful information.
Decent and informative.
Great article, very informative and helpful.
A 'Must Read'.

 

Do you Agree or Disagree? Have a Comment? POST IT!

 Reader Opinions 
Submit your comments and they will be posted here.
Make this comment or to the Author only:
Name:
Email:
*Your email will NOT be posted. This is for administrative purposes only.
Comments: *Your Comments WILL be posted to the AUTHOR ONLY if you select PRIVATE and to this PUBLIC PAGE if you select PUBLIC, so write accordingly.
 
Please enter the code in the image:



 Author Login 
LOGIN
Register for Author Account

 

Advertiser Login

 

ADVERTISE HERE NOW!
   Limited Time $60 Offer!
   90  Days-1.5 Million Views  

 

Great Paranormal Romance


TIM FAY

After 60-plus years of living, I am just trying to pass down some of the information that I have lea...more
LAURA JEEVES

At LeadGenerators, we specialise in content-led Online Marketing Strategies for our clients in the t...more
ALEX BELSEY

I am the editor of QUAY Magazine, a B2B publication based in the South West of the UK. I am also the...more
GENE MYERS

Author of four books and two screenplays; frequent magazine contributor. I have four other books "in...more
SUSAN FRIESEN

Located in the lower mainland of B.C., Susan Friesen is a visionary brand strategist, entrepreneur, ...more
STEVERT MCKENZIE

Stevert Mckenzie, Travel Enthusiast. ...more
STEPHEN BYE

Steve Bye is currently a fiction writer, who published his first novel, ‘Looking Forward Through the...more
SHALINI MITTAL

A postgraduate in Fashion Technology. Shalini is a writer at heart! Writing for her is an expression...more
ADRIAN JOELE

I have been involved in nutrition and weight management for over 12 years and I like to share my kn...more
JAMES KENNY

James is a Research Enthusiast that focuses on the understanding of how things work and can be impro...more

HomeLinksAbout UsContact UsTerms of UsePrivacy PolicyFAQResources
Copyright © 2024, All rights reserved.
Some pages may contain portions of text relating to certain topics obtained from wikipedia.org under the GNU FDL license