With the usage of internet becoming wide spread, cyber crimes are also on the rise. Internet-based social
networking sites have created a revolution in social connectivity. Most common reason for these crimes is
the human element, which could be greed, carelessness or sheer innocence. Crimes are being
committed in banks, especially w.r.t credit card details and on social media. Most computer infections
come from websites. Crimes against women are on the rise on social media sites due to various reasons
including indiscriminate postings of pictures and status updates. Almost always, hackers are able to break
through because of the failure to change default login and passwords. Other times the use of Phishing /
spear phishing or social engineering techniques are being used. Usually an email that looks like it is from
a legitimate organization or person, but is not and contains a link or file with malware. Phishing attacks
typically try to snag any random victim. Spear phishing attacks target a specific person or organization as
their intended victim. The malware downloaded information from RSA that then helped the hackers learn
how to defeat RSA’s security token. In May and June 2011, a number of defense contractors’ networks
were breached via the compromised RSA token. Sometimes zero day defects are exploited by high tech
crackers. With the advent of IoT, security now shifts to a higher level, as a weak smart device can blow a
hole in the entire network. E.g. Target – was hacked because of a weak smart device on the same
network as that of the servers.
Basic precautions like a strong password, a well known antivirus, sensible postings on social media, selective accepting of friend requests and avoiding clicking on unknown links can go a long way in securing networks. For corporate, regular security audits and business continuity plans are a must, to ensure there is no breakdown in business in case of a hack. Always use high security settings on social networking sites, and be very limited in the personal information you share. Monitor what others are posting about you on their online discussions. Always use anti-virus and firewall software. Change your passwords regularly, and do not reuse old passwords. Beware of unsolicited contacts from individuals in person, on the telephone, or on the Internet who are seeking corporate or personal data. Monitor your bank statements, balances, and credit reports. Never share usernames, passwords, social security numbers, credit cards, bank information, salaries, computer network details, security clearances, home and office physical security and logistics, capabilities and limitations of work systems, or schedules and travel itineraries.
Some of the computer crimes done with the help of social media are:-
Vishing or Voice Phishing: - Personal details from sites such as Face book, Twitter and LinkedIn are used to scam customer.”Vishing involves fraudster calling and saying they are from bank. Here the customer is a weakest Link. companies.
Cyber Defamation:-The criminals send email containing defamatory matters to all concerned
Phishing
Net Extortion.
Basic precautions like a strong password, a well known antivirus, sensible postings on social media, selective accepting of friend requests and avoiding clicking on unknown links can go a long way in securing networks. For corporate, regular security audits and business continuity plans are a must, to ensure there is no breakdown in business in case of a hack. Always use high security settings on social networking sites, and be very limited in the personal information you share. Monitor what others are posting about you on their online discussions. Always use anti-virus and firewall software. Change your passwords regularly, and do not reuse old passwords. Beware of unsolicited contacts from individuals in person, on the telephone, or on the Internet who are seeking corporate or personal data. Monitor your bank statements, balances, and credit reports. Never share usernames, passwords, social security numbers, credit cards, bank information, salaries, computer network details, security clearances, home and office physical security and logistics, capabilities and limitations of work systems, or schedules and travel itineraries.
Some of the computer crimes done with the help of social media are:-
Vishing or Voice Phishing: - Personal details from sites such as Face book, Twitter and LinkedIn are used to scam customer.”Vishing involves fraudster calling and saying they are from bank. Here the customer is a weakest Link. companies.
Cyber Defamation:-The criminals send email containing defamatory matters to all concerned
Phishing
Net Extortion.
0 comments:
Post a Comment