Skip to main content

Home/ Classroom 2.0/ Group items tagged cybercrime

Rss Feed Group items tagged

mananiftikhar

Understanding CyberCrime and Types of Cybercrime - 0 views

  •  
    Cyber and Internet Crime Introduction Cybercrime is growing at a very fast pace in the world today. There are many more criminals surging up and exploiting the convenience, speed, as well as the anonymity of the use of the Internet for the purpose of committing different types of criminal activities
Roland Gesthuizen

Social Media Safety - Don't Compromise Your Home to Criminals | Credit Sesame Blog - 0 views

  •  
    Does your social media activity affect your home's security and safety? The answer might be "Yes,"  ... For more details on the role of social media in your home's security and how to protect yourself, see our infographic.
J Black

Vast Spy System Loots Computers in 103 Countries - NYTimes.com - 0 views

  • The malware is remarkable both for its sweep — in computer jargon, it has not been merely “phishing” for random consumers’ information, but “whaling” for particular important targets — and for its Big Brother-style capacities. It can, for example, turn on the camera and audio-recording functions of an infected computer, enabling monitors to see and hear what goes on in a room. The investigators say they do not know if this facet has been employed.
  • The electronic spy game has had at least some real-world impact, they said. For example, they said, after an e-mail invitation was sent by the Dalai Lama’s office to a foreign diplomat, the Chinese government made a call to the diplomat discouraging a visit. And a woman working for a group making Internet contacts between Tibetan exiles and Chinese citizens was stopped by Chinese intelligence officers on her way back to Tibet, shown transcripts of her online conversations and warned to stop her political activities.
  • “This could well be the C.I.A. or the Russians. It’s a murky realm that we’re lifting the lid on.”
  • ...2 more annotations...
  • “The Chinese government is opposed to and strictly forbids any cybercrime.”
  • two computer researchers at Cambridge University in Britain who worked on the part of the investigation related to the Tibetans, are releasing an independent report. They do fault China, and they warned that other hackers could adopt the tactics used in the malware operation.
  •  
    The malware is remarkable both for its sweep - in computer jargon, it has not been merely "phishing" for random consumers' information, but "whaling" for particular important targets - and for its Big Brother-style capacities. It can, for example, turn on the camera and audio-recording functions of an infected computer, enabling monitors to see and hear what goes on in a room. The investigators say they do not know if this facet has been employed.
1 - 3 of 3
Showing 20 items per page