Table of Contents |
Cybercrime refers to criminal activities that are carried out using digital technology or the internet. These crimes can take various forms, and they continue to evolve as technology advances. There are many types of cybercrime, and we will discuss some of the more common forms in this lesson. It can be difficult to determine the amount of cybercrime due to its global nature, lack of standardized reporting, and the ability to conceal one’s identity in cyberspace, among other challenges.
Phishing is a type of cyberattack in which attackers attempt to deceive people into disclosing sensitive information, such as login credentials, personal details, or financial information. The attackers often pretend to be trustworthy entities, such as banks, government agencies, or reputable companies, to trick the victims into providing this information. Phishing is one of the most common types of cybercrime. In 2022, approximately 300,000 people in the United States fell victim to a phishing attack (Petrosyan, 2023).
Phishing attacks typically involve the use of emails, messages, or websites that appear legitimate, often replicating the look of authentic communication from a trusted source. These messages usually contain language to create a sense of urgency or fear, prompting the recipient to act quickly without thoroughly verifying the authenticity of the communication.
Phishing is a widespread and evolving threat, and people and organizations need to be vigilant to avoid falling victim to these scams. Security measures, such as using two-factor authentication, regularly updating passwords, and being cautious about clicking on links or providing personal information, can help avoid the risks associated with phishing attacks.
Hacking has different meanings depending on the context, but in a general sense, it refers to the act of gaining unauthorized access to computer systems or networks, typically with the goal of exploiting vulnerabilities for malicious purposes. Hacking can involve various activities, such as breaking into computer systems or networks without permission or taking advantage of weaknesses in software, hardware, or security protocols. It is often associated with malicious activities, such as stealing sensitive information or disrupting operations.
EXAMPLE
In 2022, there was a cyberattack on Crypto.com, targeting nearly 500 people’s cryptocurrency accounts. Hackers stole approximately $18 million worth of Bitcoin and $15 million worth of Ethereum, among other cryptocurrencies. They were able to bypass the two-factor authentication and access the users’ accounts. After this attack, Crypto.com reimbursed users who were affected. They also heightened security for their systems to prevent the likelihood of this type of attack happening in the future (LeClerc Sveinsson, n.d.).It is important to note that not all hacking is malicious. There are ethical hackers who use their skills to identify and fix security vulnerabilities. They work to improve security and help protect systems from malicious hackers.
Malware, or malicious software, refers to any software designed to harm computer systems, networks, or users. It is often installed by hackers. In 2022, there were over 5.5 billion malware attacks around the world (Petrosyan, 2024). Malware is a broad term that encompasses various types of malicious software, each with its own set of functions and purposes. Malware can take many forms, including viruses, worms, Trojans, ransomware, spyware, adware, and more.
Here is a brief overview of some common types of malware:
| Type | Definition |
|---|---|
| Viruses | These are programs that can replicate themselves by attaching to other programs or files. They often spread through infected files and can damage or corrupt data. |
| Worms | These are self-replicating programs that can spread across networks without any human intervention. They can consume a system's resources, leading to performance issues. |
| Trojans | These are programs that disguise themselves as legitimate software but contain malicious code. Once installed, they can perform a variety of harmful actions, such as stealing sensitive information or providing unauthorized access to a system. |
| Ransomware | This is a program that encrypts the victim's files and demands a ransom in exchange for the decryption key. Its attacks can have severe consequences, as they can lead to data loss and financial damage. |
| Spyware | This is a program that is designed to spy on the user's activities without their knowledge. It can capture keystrokes, take screenshots, and collect information, which is then sent to a remote server. |
| Adware | This is a program that displays unwanted advertisements on a user's computer, often in the form of pop-ups. While not always harmful, it can be annoying and may impact system performance. |
Malware is typically distributed through malicious email attachments, infected websites, and compromised software downloads. To protect against malware, it is important to use antivirus and anti-malware software, keep software and operating systems up to date, and exercise caution when clicking on links or downloading files from the internet.
Identity theft, or online identity theft, is a type of crime in which an individual's personal information is stolen and used for fraudulent purposes in cyberspace. This stolen information can include the person's name, Social Security number, credit card details, bank account information, passwords, and other sensitive data. The Federal Trade Commission received over 1.1 million reports of identity theft in 2022 (Lever, 2023).
EXAMPLE
Abraham Abdallah fooled credit score companies into providing him with information in 2001. He then used the identities of some of the country’s richest people, including Warren Buffet and Steven Spielberg, to steal millions of dollars (DataShield, n.d.).People who engage in identity theft typically use the stolen information to commit fraudulent activities, such as financial fraud, medical identity theft, criminal activity, or tax fraud. Here are some ways to reduce the risk of falling victim to cyber identity theft:
Cyberbullying refers to the use of digital technologies, social media, or smartphones to harass, intimidate, or harm individuals. It involves the use of electronic communication to bully someone, often repeatedly and with the intention of causing emotional distress or embarrassment. Young people are often on social media and other digital technologies and are the most likely to experience cyberbullying. A recent poll indicates that almost 60% of teens have been the victim of cyberbullying (Anderson, 2018).
EXAMPLE
Fifteen-year-old Nate Bronstein, a student in Chicago, was the victim of relentless cyberbullying by his classmates. They sent him texts and Snapchats encouraging him to kill himself. As a result, he took his own life (Hickey, 2022).It is important to note that cyberbullying is not always a crime. However, it can escalate to criminal activity in some situations where harassment or stalking have gone too far. It can also be a crime when it is associated with hate crimes, which we discussed in the previous lesson.
Cyberbullying can have serious consequences, including emotional and psychological distress for the victims. To prevent and address this issue, it is essential to raise awareness about cyberbullying, promote digital literacy, and encourage positive online behavior.
Source: THIS TUTORIAL HAS BEEN ADAPTED FROM KWANTLEN POLYTECHNIC UNIVERSITY’S “INTRODUCTION TO CRIMINOLOGY.” ACCESS FOR FREE AT kpu.pressbooks.pub/introcrim/. LICENSE: CREATIVE COMMONS ATTRIBUTION 4.0 INTERNATIONAL.
REFERENCES
Anderson, M. (2018, September 27). A majority of teens have experienced some form of cyberbullying. Pew Research Center: Internet, Science & Tech. www.pewresearch.org/internet/2018/09/27/a-majority-of-teens-have-experienced-some-form-of-cyberbullying/
DataShield (n.d.). Five worst cases of identity theft ever. datashieldcorp.com/5-worst-cases-of-identity-theft-ever/
Hickey, M. (2022, April 5). A 15-year-old boy died by suicide after relentless cyberbullying, and his parents say the Latin school could have done more to stop it. CBS News. www.cbsnews.com/chicago/news/15-year-old-boy-cyberbullying-suicide-latin-school-chicago-lawsuit/
LeClerc Sveinsson, R. (n.d.). Top 10 data breaches so far in 2022. ERMProtect. ermprotect.com/blog/top-10-data-breaches-so-far-in-2022/
Lever, R. (2023, September 12). U.S. News & World report identity theft survey 2023. U.S. News. www.usnews.com/360-reviews/privacy/identity-theft-protection/identity-theft-fraud-survey
Petrosyan, A. (2023, August 29). Most reported cybercrime in the U.S. 2022, by number of individuals affected. Statista. www.statista.com/statistics/184083/commonly-reported-types-of-cyber-crime-us/#:~:text=In%202022%2C%20the%20most%20common,the%20IC3%20during%20that%20year
Petrosyan, A. (2024, January 10). Malware - Statistics & facts. Statista. www.statista.com/topics/8338/malware/#topicOverview