Today, we are all connected to some technology in some way. Today, most people use Internet computer mobile etc. In this way many people unknowingly make such mistakes which come under Cyber Crime . In today's post, you will learn about cyber crime , how many types it is, and many things.
Misuse of technology under cyber crime, stealing personal information about someone's bank, manipulating someone's information, misusing someone's identity, (like many people make Facebook ID using someone else's identity Let's get cheated online, all this comes under Cyber Crime.
Example - If hackers have to hack your Facebook account, then they will try to log in to anyway by creating a duplicate page of the Facebook login page when you log in from the duplicate page created by hacker The Facebook id will go to the password hacker and then easily log in to your Facebook account.
There are also many cyber crime methods - like - Email Spoofing, Cyber P * rnography, Cookie Stealer, Online Gambling.
Here are some tips to help you avoid getting caught in cybercrime: If you liked this post, then share this post in social media.
Information about cyber crime
![]() |
What is Cyber crime Information about cyber crime |
What is Cyber crime
First of all we will talk about what is cyber crime or crime. If we say it in common terms" Cybercrime is a crime in which cybercrime or crime is a victim of any kind of harassment, using computer, internet, software, etc., any kind of damage to another person, etc." Whether it is stealing personal information or eliminating information.
Misuse of technology under cyber crime, stealing personal information about someone's bank, manipulating someone's information, misusing someone's identity, (like many people make Facebook ID using someone else's identity Let's get cheated online, all this comes under Cyber Crime.
Common Method
We will now know about some of the methods of cyber crime that are commonly used by cyber-criminals. We should be aware of these methods so that we can maintain our security to some degree.Phishing –
This method is most commonly used because it is the simplest way. The id passwords of any account can be detected by this method. In the phishing method, to know about the id password of any platform, the duplicate page of that platform is created. Whenever someone logs in with a duplicate page, its id password reaches the hacker.Example - If hackers have to hack your Facebook account, then they will try to log in to anyway by creating a duplicate page of the Facebook login page when you log in from the duplicate page created by hacker The Facebook id will go to the password hacker and then easily log in to your Facebook account.
Keylogging –
Keylogging method is very dangerous method. In this method, keylogger software is used, keylogger is software which is hidden, the type of keyboard that you type, it reaches the hacker. Hacker keylogger software can install Locally or Remotely in your computer. In this way hackers can easily steal all your accounts details easily.Viruses & Warms
All the computer viruses will be aware of this and all these are also used for the removal of somebody's data, stealing, etc. There are also many types of viruses that depend on their coding, how they work through entering your computer. There are some viruses and warms that are associated with system files.AD Clicker
Ad Clicker is a method in which victim is lured as if you have won i phone 6 click to take it, many such advertisements come in. Many users fall into greed and fall into their trap. After this hacker easily accesses his device and then many more information, data is stolen.There are also many cyber crime methods - like - Email Spoofing, Cyber P * rnography, Cookie Stealer, Online Gambling.
Quick tips for protecting your self from Cyber crime
Now I am going to tell you some tips from people who can help us get rid of cybercrime -Wireless Network
Many times we get to see the open wifi network on the public place, many users connect their device thinking free. Many hackers easily steal the data using wifi, so do not use free wifi unless you are sure that the wifi you are going to use is secure.Secure your computer
Always keep your computer secure, always use antivirus in the computer, as well as keeping the antivirus updated forever. So that no viruses, Warm etc. could not enter you. Always use reputable antivirus.Virtual keyboard
Whenever you use a public place computer and you have to fill out bank details, always use the virtual keyboard so that no keylogger can help you to know the id password.Phishing attack
To avoid a phishing attack, whenever you see the https before you log in to any account, if you get to see the https in the url, then you are secure. Specially note during bank-related transactions.Here are some tips to help you avoid getting caught in cybercrime: If you liked this post, then share this post in social media.
ConversionConversion EmoticonEmoticon