Cyber Terrosrism

Cyber-terrorism, it is illegal activities that use computer as a tool to steal individuals or organizations secret such as theft of confidential information of companies, money laundering, distortion of information, racketeering, decoding software, including sorties to the computer system as computer viruses, destruction and so on.

Identity theft and scams.


Every time you open the email, visit unfamiliar websites or download anything on the Internet you are subjected to the risk of the activities. A virus or malware that may steal your private information. The followings are the general characteristics of fraud on the computer system.

Attacks Phishing
Phishing is a fake website or email. Often pretends to be from reliable organizations such as banks and the use disguise to steal personal information.

Operation Aurora attacks
Attacked through a vulnerability in the browser.

The stolen information to purchase online
Hackers can use Cross Site Request Forgery (CSRF) to pose as you. And financial transactions on your behalf. But you will be safe. If you follow the simple instructions from the bank.

Phone fraud
One way that criminals use today is to call you and claim to be contacted by a bank or government agency. And try to intimidate the victim offers tips for smooth transactions with the bank.

The incidents have been occurred a lot in such this rapid changing technology. Learn how to observe and how to protect ourselves from the deceptions.

ไม่มีความคิดเห็น:

แสดงความคิดเห็น