{"id":2179,"date":"2019-05-06T10:42:55","date_gmt":"2019-05-06T10:42:55","guid":{"rendered":"http:\/\/www.guyanapoliceforce.gy\/?page_id=2179"},"modified":"2022-03-12T20:46:18","modified_gmt":"2022-03-12T20:46:18","slug":"suicide-hotline","status":"publish","type":"page","link":"https:\/\/guyanapoliceforce.gy\/?page_id=2179","title":{"rendered":"Cyber Crime Report"},"content":{"rendered":"<div class=\"wpb-content-wrapper\"><p>[vc_row][vc_column][vc_custom_heading text=&#8221;Types of Cyber Crime &#8221; font_container=&#8221;tag:h1|text_align:center&#8221;][\/vc_column][\/vc_row][vc_row][vc_column][vc_column_text]<\/p>\n<div>\n<div>\n<div>\n<h3>DDoS Attacks<\/h3>\n<\/div>\n<\/div>\n<div>\n<p>These are used to make an online service unavailable and take the network down by overwhelming the site with traffic from a variety of sources. Large networks of infected devices known as Botnets are created by depositing malware on users\u2019 computers. The hacker then hacks into the system once the network is down.<\/p>\n<\/div>\n<\/div>\n<div>\n<div>\n<div><\/div>\n<div>\n<h3>Botnets<\/h3>\n<\/div>\n<\/div>\n<div>\n<p>Botnets are networks from compromised computers that are controlled externally by remote hackers. The remote hackers then send spam or attack other computers through these botnets. Botnets can also be used to act as malware and perform malicious tasks.<\/p>\n<\/div>\n<\/div>\n<div>\n<div>\n<div><\/div>\n<div>\n<h3>Identity Theft<\/h3>\n<\/div>\n<\/div>\n<div>\n<p>This cyber crime occurs when a criminal gains access to a user\u2019s personal information to steal funds, access confidential information, or participate in tax or health insurance fraud. They can also open a phone\/internet account in your name, use your name to plan a criminal activity and claim government benefits in your name. They may do this by finding out user\u2019s passwords through hacking, retrieving personal information from social media, or sending phishing emails.<\/p>\n<\/div>\n<\/div>\n<div>\n<div>\n<div><\/div>\n<div>\n<h3>Cyber stalking<\/h3>\n<\/div>\n<\/div>\n<div>\n<p>This kind of cyber crime involves online harassment where the user is subjected to a plethora of online messages and emails. Typically cyber stalkers use social media, websites and search engines to intimidate a user and instill fear. Usually, the cyber stalker knows their victim and makes the person feel afraid or concerned for their safety.<\/p>\n<\/div>\n<\/div>\n<div>\n<div>\n<div><\/div>\n<div>\n<h3>Social Engineering<\/h3>\n<\/div>\n<\/div>\n<div>\n<p>Social engineering involves criminals making direct contact with you usually by phone or email. They want to gain your confidence and usually pose as a customer service agent so you\u2019ll give the necessary information needed. This is typically a password, the company you work for, or bank information. Cyber criminals will find out what they can about you on the internet and then attempt to add you as a friend on social accounts. Once they gain access to an account, they can sell your information or secure accounts in your name.<\/p>\n<\/div>\n<\/div>\n<div>\n<div>\n<div><\/div>\n<div>\n<h3>PUPs<\/h3>\n<\/div>\n<\/div>\n<div>\n<p>PUPS or Potentially Unwanted Programs are less threatening than other cyber crimes, but are a type of malware. They uninstall necessary software in your system including search engines and per-downloaded apps. They can include spyware or adware, so it\u2019s a good idea to install an <a href=\"https:\/\/www.pandasecurity.com\/en-us\/\" target=\"_blank\" rel=\"noopener noreferrer\">antivirus<\/a>\u00a0software to avoid the malicious download.<\/p>\n<\/div>\n<\/div>\n<div>\n<div>\n<div><\/div>\n<div>\n<h3>Phishing<\/h3>\n<\/div>\n<\/div>\n<div>\n<p>This type of attack involves hackers sending malicious email attachments or URLs to users to gain access to their accounts or computer. Cyber criminals are becoming more established and many of these emails are not flagged as spam. Users are tricked into emails claiming they need to change their password or update their billing information, giving criminals access.<\/p>\n<\/div>\n<\/div>\n<div>\n<div>\n<div><\/div>\n<div>\n<h3>Prohibited\/Illegal Content<\/h3>\n<\/div>\n<\/div>\n<div>\n<p>This cyber crime involves criminals sharing and distributing inappropriate content that can be considered highly distressing and offensive. Offensive content can include, but is not limited to, sexual activity between adults, videos with intense violent and videos of criminal activity. Illegal content includes materials advocating terrorism-related acts and child exploitation material. This type of content exists both on the everyday internet and on the dark web, an anonymous network.<\/p>\n<\/div>\n<\/div>\n<div>\n<div>\n<div><\/div>\n<div>\n<h3>Online Scams<\/h3>\n<\/div>\n<\/div>\n<div>\n<p>These are usually in the form of ads or spam emails that include promises of rewards or offers of unrealistic amounts of money. Online scams include enticing offers that are \u201ctoo good to be true\u201d and when clicked on can cause malware to interfere and compromise information.<\/p>\n<\/div>\n<\/div>\n<div>\n<div>\n<div><\/div>\n<div>\n<h3>Exploit Kits<\/h3>\n<\/div>\n<\/div>\n<div>\n<p>Exploit kits need a vulnerability (bug in the code of a software) in order to gain control of a user\u2019s computer. They are ready made tools criminals can buy online and use against anyone with a computer. The exploit kits are upgraded regularly similar to normal software and are available on dark web hacking forums.<\/p>\n<\/div>\n<\/div>\n<p>[\/vc_column_text][vc_empty_space height=&#8221;50px&#8221;][\/vc_column][\/vc_row][vc_row][vc_column][vc_column_text][wpforms id=&#8221;4058&#8243;][\/vc_column_text][vc_empty_space height=&#8221;50px&#8221;][\/vc_column][\/vc_row]<\/p>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>[vc_row][vc_column][vc_custom_heading text=&#8221;Types of Cyber Crime &#8221; font_container=&#8221;tag:h1|text_align:center&#8221;][\/vc_column][\/vc_row][vc_row][vc_column][vc_column_text] DDoS Attacks These are used to make an online service unavailable and take the network down by overwhelming the site with traffic from a variety of sources. Large networks of infected devices known as Botnets are created by depositing malware on users\u2019 computers. The hacker then hacks into [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"categories":[],"tags":[],"class_list":["post-2179","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/guyanapoliceforce.gy\/index.php?rest_route=\/wp\/v2\/pages\/2179","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/guyanapoliceforce.gy\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/guyanapoliceforce.gy\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/guyanapoliceforce.gy\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/guyanapoliceforce.gy\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=2179"}],"version-history":[{"count":12,"href":"https:\/\/guyanapoliceforce.gy\/index.php?rest_route=\/wp\/v2\/pages\/2179\/revisions"}],"predecessor-version":[{"id":4059,"href":"https:\/\/guyanapoliceforce.gy\/index.php?rest_route=\/wp\/v2\/pages\/2179\/revisions\/4059"}],"wp:attachment":[{"href":"https:\/\/guyanapoliceforce.gy\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=2179"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/guyanapoliceforce.gy\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=2179"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/guyanapoliceforce.gy\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=2179"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}