Cybercrime Survival Guide
Cybercrime Survival Guide
Cybercrime Survival Guide
Disclaimer
Wolfpack Information Risk does not guarantee or offer assurance that this
document will completely protect or keep you 100% safe from cybercrime. The
information and applications mentioned in this document may contain errors and
are subject to change. Wolfpack Information Risk is not responsible for any loss,
damage, or disruption that may be caused by errors, omissions or the use of the
applications / software mentioned, whether such errors or omissions result from
negligence, accident, or any other cause. Moreover, Wolfpack Information Risk is
not responsible for the functioning of any of the links to related websites (including
ease of downloading programs, or purchase support and fulfilment).
The Cybercrime Survival Guide publication is owned by Wolfpack Information Risk
(Pty) Ltd. No part of this publication may be reproduced or transmitted in any form
without explicit prior permission from Wolfpack. The opinions expressed in The
Cybercrime Survival Guide are not those of the publishers, who accept no liability
whatsoever arising in connection with the contents of the publication.
2
Cybercrime Survival Guide 2014
Introduction
Cybercrime is a very real threat.
Victims today are losing substantial volumes
of money and data. In many instances
their privacy and even personal safety may be
compromised.
3
Cybercrime Survival Guide 2014
Cyber criminals are not just after
money - your personal information
may just be as valuable!
The goal of the Cybercrime Survival Guide is to firstly raise awareness of the
potential cyber risks you may face and to provide you with a non-technical
approach to PROTECT yourself online. The guidance offers valuable tips for
cloud users, personal computers and mobile devices to ensure that your own
private and financially sensitive information is kept safe.
Each Cyber Survival Tip (CST) has the Icon keys are used to indicate where each CST
following sections: can be used:
Quick Tips
This section gives you a number of things Personal Computer:
that you can do quickly in order to achieve
the goals of the CST.
Getting Hands On
This section provides more detailed
guidance on how to better protect
yourself and / or your device. Internet:
4
Cybercrime Survival Guide 2014
The matrix below gives you a quick reference to find the Cyber Security Tip (CST) that addresses a specific impact
given in the first column, for example, to prevent your identity from being stolen you should use CSTs 1 to 10. Impacts
are separated into four categories: Personal, Children, Devices and Data.
To return to this matrix, click on the arrow icon at the end of each tip.
CHILDREN
Images of you or your family can be harvested
without your permission and used on 1 2 3 4 5 6 10
unsavoury websites.
DEVICES
Criminals can implicate your device in a
cybercrime.
1 2 3 4 5 6 10
DATA
Devices that get stolen or misplaced risk having
their data compromised.
8
5
Cybercrime Survival Guide 2014
CST
1
Use your common sense
QUICK TIPS • Never share personal information such as your ID number on unverified
websites or via e-mail.
• Only engage people on social media you know personally, or referred by a
trusted contact. (verified)
• Limit personal information on your public social media accounts (for example
don’t make your home address publicly accessible on Facebook.)
• Review your privacy settings on your social media accounts.
• Be aware of who might be watching when entering pins and passwords.
• Use strong and unique passwords. (the more complex the password the better!)
• Do not enable GPS location tracking on social media i.e. don’t allow social media
sites or any other sites to automatically track your location.
• Do a background check (e.g. Google search) on people/companies before
engaging with them.
GETTING Avoid being scammed:
HANDS ON
1. Do not click on links in e-mails, especially e-mails that look as if they are from
your bank. (see CST 4)
2. Don’t make hasty decisions. Think about the “opportunity” before proceeding.
Don’t feel pressured to make an immediate decision even if the e-mail demands
immediate action from you.
3. Always read any fine print very carefully.
4. Do not believe everything you read online or in emails.
5. Ask for more information on the person/company to verify that the person
and / or the company is legit.
• SHOULDER SURFING: The social engineer peers over your shoulder while you
are typing in your pin or password. Defence: Always be aware of who is around
Social engineering you and cover the key pad or keyboard when typing in your pin/password.
is when a
cyber criminal • DUMPSTER DIVING: The social engineer scavenges through dustbins for
manipulates improperly disposed information they can use, for example, bank statements.
a person Defence: Never throw away confidential information in the dustbin - rather
psychologically
in order for that shred, burn or cut it into many pieces.
person to provide • BAITING (FREE USB): The social engineer leaves a USB where you are likely to
confidential find it, for example in in the parking lot of where you work, or hand them out for
information and /
or to do a task for free at your local coffee shop. These USB’s are usually loaded with what seems
them. to be information you might be interested in, but instead contains viruses.
Defence: Never use USB’s that were lying around or that are given out for free at
untrusted places.
6
Cybercrime Survival Guide 2014
WHY SHOULD I Personal Impact
CARE?
• Identity theft.
• Personal information theft.
• Your social media accounts can be compromised (hacked).
• You may suffer reputational damage should hackers post unsavoury content to
hacked accounts.
• Your bank accounts could be compromised and money stolen.
• Email account compromised (hacked) and used to send spam and scams to
everyone on your address book.
• Criminals can take pictures of you with your webcam / front camera.
• Criminals can make audio and / or video recordings of you and your
surroundings using your device.
• Criminals can use these recordings and pictures for extortion, blackmail or
misrepresentation.
• Your credit record can be damaged.
• Accounts can be opened in your name without your knowledge.
• Your email inbox could be flooded with unwanted emails. (Spam)
Children
• Images of you or your family can be harvested without your permission and
used on unsavoury websites.
• Untrusted people can track the movements of your family from geotags in
certain pictures posted on the web.
• Untrusted people (e.g. paedophiles) can gather intelligence on your family from
various online sources and attempt to contact your children.
Device Security
Data Security
• There are many incidents that could result in you losing some or all of your
valuable data.
HELPFUL • www.alertafrica.com
WEBSITES For general awareness, news and to report a scam or cybercrime.
• www.scambuster.co.za/report-a-scam
For reporting scams and getting news on the latest scams.
• www.cybertopcops.com/shpamee.php
For reporting scams and getting news on the latest scams.
• www.safps.org.za
To report Identity Fraud/Theft and how to protect your identity.
7
Cybercrime Survival Guide 2014
CST
2
Keep your software up to date
QUICK TIPS • Activate automatic updates for all your software, including your Operating
System (Windows), Antivirus, Adobe Reader, Adobe Flash and Java.
• Use helpful applications (listed below) to see if your other applications are up to
date.
8
Cybercrime Survival Guide 2014
WHY SHOULD I If any of your devices are infected with viruses (malware), the following could
CARE? happen:
Personal Impact
• Identity theft.
• Personal information theft.
• Your social media accounts can be compromised (hacked).
• You may suffer reputational damage should hackers post unsavoury content to
hacked accounts.
• Your bank accounts could be compromised and money stolen.
• Email account compromised (hacked) and used to send spam and scams to
everyone on your address book.
• Criminals can take pictures of you with your webcam / front camera.
• Criminals can make audio and / or video recordings of you and your
surroundings using your device.
• Criminals can use these recordings and pictures for extortion, blackmail or
misrepresentation.
• Your credit record can be damaged.
• Accounts can be opened in your name without your knowledge.
• Your email inbox could be flooded with unwanted emails. (Spam)
Children
• Images of you or your family can be harvested without your permission and
used on unsavoury websites
• Untrusted people can track the movements of your family from geotags in
certain pictures posted on the web
• Untrusted people (e.g. paedophiles) can gather intelligence on your family from
various online sources and attempt to contact your children.
Device Security
HELPFUL Commercial
APPLICATIONS Ninite: https://ninite.com/updater/
Freely Available
AppFresh: http://metaquark.de/appfresh/mac
Secunia PSI: http://secunia.com/vulnerability_scanning/personal/
SUMo: http://www.kcsoftwares.com/index.php?sumo
Update Checker: http://filehippo.com/updatechecker
9
Cybercrime Survival Guide 2014
CST
3
Install antivirus on all devices
WHY SHOULD I If any of your devices are infected with viruses (malware), the following could
CARE? happen:
Personal Impact
10
Cybercrime Survival Guide 2014
WHY SHOULD I Child Safety
CARE?
• Images of you or your family can be harvested without your permission and
used on unsavoury websites
• Untrusted people can track the movements of your family from geotags in
certain pictures posted on the web
• Untrusted people (e.g. paedophiles) can gather intelligence on your family from
various online sources and attempt to contact your children.
Device Security
Data Security
• There are many incidents that could result in you losing some or all of your
valuable data.
HELPFUL • You get more features and better security when using the commercial options.
APPLICATIONS Always download or purchase commercial security software from legitimate
sources, never pirate (illegally copy or install) security software!
Note: This is not a comprehensive
Commercial list of all software solutions.
Bitdefender:
http://www.bitdefender.com/solutions/internet-security.html
ESET: http://www.eset.co.za/za/home/
Kaspersky: http://www.kaspersky.com/internet-security
Freely Available
All three options listed offer commercial versions, with added features.
Avast: http://www.avast.com
Avira: https://www.avira.com/en/avira-free-antivirus
Bitdefender: http://www.bitdefender.com/toolbox/freeapps/desktop/
• Nedbank – Rapport
(http://www.nedbank.co.za/website/content/rapport/)
11
Cybercrime Survival Guide 2014
CST Continued... Install antivirus on all
3 devices
12
Cybercrime Survival Guide 2014
NCE
ELLIGE GO
NT PROJECTS VE
TI ION
RN
EA RAT A
BO
CO HR
NC KILL
T
E,
A
ICT
H&
LL
RIS
S
D
ARC
E
K&
SED
2.
S AS
RESE
COMP
1. P
ASS
SPECIALI
SESSMENTS
LIANCE ADV
ESS
Services Portfolio
3.
TR A
ISO
Level 2 BBBEE Contributor IM P
TAL
RY
ROVE
IN
G
EN
IN
&
We are trusted advisors to a growing number
TS
UR AW S
AR ME
O
of Government & Private organisations in CI ENES M
NG S PRO GR A
&G T
Africa R AD EN
UATE DEVELOPM
Advisory
+27 11 794 7322
IT Governance, Information Risk, Cyber
info@wolfpackrisk.com Security & Privacy Consulting
QUICK TIPS • Banks will never ask you to send your password or supply other personal
information in an email.
• If it sounds too good to be true it probably is - don’t click on the link.
• Look for obvious signs of tampering i.e. the sender email & web link are different
(i.e. Sender: MyBank.com, Link: www.hackerbank.com).
• Hover your mouse pointer over the link (without clicking) then…
• (A) compare it to the link (B) in the bottom left hand corner:
Google and the Google logo are registered trademarks of Google Inc., used with permission.
14
Cybercrime Survival Guide 2014
GETTING Inspect short links (Compressed Links)
HANDS ON
Periodically, you might encounter a short link or compressed link, such as:
http://is.gd/FZMBx2
WHY SHOULD I Clicking on a malicious link could result in you giving out personal information
CARE? and / or your device getting infected with malware which could result in the
following:
Personal Impact
Child Safety
• Images of you or your family can be harvested without your permission and
used on unsavoury websites
• Untrusted people can track the movements of your family from geotags in
certain pictures posted on the web
• Untrusted people (e.g. paedophiles) can gather intelligence on your family from
various online sources and attempt to contact your children.
Device Security
Data Security
• There are many incidents that could result in you losing some or all of your
valuable data.
15
Cybercrime Survival Guide 2014
CST
5
Don’t open email or attachments
from untrusted sources
QUICK TIPS • Always be suspicious when opening emails and their attachments.
• Business email accounts usually have a linked business-related domain
(i.e. nameofbusiness.com) and not Gmail or Yahoo accounts. For example,
abcBankSales@gmail.com would not be a legitimate e-mail address for ABC
Bank but sales@ABCBank.com would be.
• Banks will never send you emails requesting that you send your password via
e-mail or that you click on a link to reset your password
16
Cybercrime Survival Guide 2014
GETTING Spot dangerous attachments (continued)
HANDS ON • If your Antivirus flags it as dangerous, do not open it.
• For added safety, even if receiving an attachment from a known source, do the
following:
• Go to www.virustotal.com.
• Click on “Choose File”.
• Choose the file you want to scan and click on Ok.
• Click on “Scan It!” The results of the scan will be shown, delete the
file immediately if any antivirus product indicated the file is a virus
(malicious) i.e. the detection ratio is greater than 0.
• NOTE: Always click on “Reanalyse” if VirusTotal indicates that the file has
already been analysed.
WHY SHOULD I Clicking on a malicious link could result in you giving out personal information
CARE? and / or your device getting infected with malware which could result in the
following:
Personal Impact
Child Safety
• Images of you or your family can be harvested without your permission and
used on unsavoury websites
• Untrusted people can track the movements of your family from geotags in
certain pictures posted on the web
• Untrusted people (e.g. paedophiles) can gather intelligence on your family from
various online sources and attempt to contact your children.
Device Security
Data Security
• There are many incidents that could result in you losing some or all of your
valuable data.
17
Cybercrime Survival Guide 2014
CST
6
Review app permissions before
installing an application
Do the permissions
requested by the app make
sense?
QUICK TIPS • Read app permissions before accepting or installing the app.
• Do the permissions requested by the app make sense? For example, a weather
app should not have access to your contact list.
• Only install apps from trusted sources (Google Play Store, iTunes Store etc.)
• Do not Jail Break (Apple) or Root (Android) your device
After installation
• Use apps like “App Permissions” to review permissions other apps have.
• As you review these permissions, think about what the app does and if the
permissions it has fits its use.
HELPFUL Commercial
APPLICATIONS • NOTE: Disabling app permissions can cause apps to stop working properly
(crash), thus these apps are recommended for use by Advanced users ONLY.
Adv Permission Manager (Pro)
Permission Manager Pro
Permissions Viewer
Freely Available
• These apps allow you to see the permissions of the other apps installed on your
device. They do not disable any permissions and can be used without worrying
that you might break something.
• App Permissions
• Clueful
• Permission Manager - App ops
18
Cybercrime Survival Guide 2014
WHY SHOULD I Clicking on a malicious link could result in you giving out personal information
CARE? and / or your device getting infected with malware which could result in the
following:
Personal Impact
Child Safety
• Images of you or your family can be harvested without your permission and
used on unsavoury websites
• Untrusted people can track the movements of your family from geotags in
certain pictures posted on the web
• Untrusted people (e.g. paedophiles) can gather intelligence on your family from
various online sources and attempt to contact your children.
Device Security
Data Security
• There are many incidents that could result in you losing some or all of your
valuable data.
19
Cybercrime Survival Guide 2014
CST
7
Ceate strong and unique passwords
QUICK TIPS • Enable passwords on all your devices laptops, cell phones and tablets.
• Ensure passwords are longer than 7 characters.
• Use a combination of numbers and special characters (e.g. @ # $ % ! ?)
• Use different passwords for all your different accounts and devices
• Do not share your password with anyone
• Never write your password down
• Example 1: Take the phrase “Online banking saves me so much time and effort
every day” and then use numbers and letters to recreate it:
• Password “Obsmsmt&eed!2014” The password was created by taking the
first letter of each word. *Do not use this example
20
Cybercrime Survival Guide 2014
GETTING Remember PIN’s
HANDS ON • Spell a word using the keyboard/keypad
• Example: Risky -> 74759 *Do not use this example
HELPFUL Commercial
APPLICATIONS • The following applications can be used to automatically generate secure
passwords for each service that you use. The applications typically require that
you set one master password that must be entered to unlock the “vault” storing
all the other passwords. Ensure you set a strong master password according to
the guidelines provided in the previous section.
• 1Password: https://agilebits.com/onepassword
• F-Secure Key: http://www.f-secure.com/en/web/home_global/key
• Password Manager: http://www.kaspersky.com/password-manager
Freely Available
• Identity Safe: https://identitysafe.norton.com/
• Last Pass: https://lastpass.com/
• KeePass : http://keepass.info/download.html
21
Cybercrime Survival Guide 2014
CST
8
Protect your data
QUICK TIPS • Back-up your most valuable information first (e.g. Documents, family pictures)
• Do not keep your back up drive (“External Hard drive”) close to your computer
when you are not using it.
• Encrypt your hard drive
• Back up valuable information to reputable cloud storage providers (e.g.
Dropbox)
• Shred:
• Paper documents that may contain personal information
• Old credit and loyalty cards
• CDs that may contain personal information.
• Delete emails that contain personal information.
• Remember to “Empty” the Recycle Bin (Windows) or Trash (Mac)
• Password protect ALL your devices
Distribute back-ups
• Don’t keep back up drives in your laptop bag or next to your computer.
• Back-up critical (most valued) information to trusted Cloud services like
Dropbox or Google Drive
• Duplicate critical backups to USB’s or DVD’s and store safely elsewhere.
22
Cybercrime Survival Guide 2014
GETTING Empty the “Recycle Bin”
HANDS ON • Right click on the Recycle Bin icon (image)
• Choose Empty Recycle Bin
Set a lock pattern or pin on your mobile devices (including your phones). This can be
typically set on the mobile device’s settings menu under security settings.
Freely Available
• AOMEI Backupper: http://www.aomeitech.com/
• EaseUS Todo Backup:
http://www.todo-backup.com/products/home/free-backup-software.htm
• FBackUp: http://www.fbackup.com/
• Time Machine (Installed on Mac )
CLOUD STORGAGE:
Commercial
• SugarSync: www.sugarsync.com
The service providers below offer an initial quota of free storage, with additional
space available on subscription basis
• Dropbox: https://www.dropbox.com/ (2GB Storage Free)
• Google Drive: https://drive.google.com/ (15GB Storage Free)
(If you have a Gmail account you already have Google Drive.)
• Microsoft One Drive : https://onedrive.live.com/about/en-us/
(7GB Storage Free) (Can link to your Microsoft account if you
have one, if not signing up will create one.)
• Spider Oak: https://spideroak.com/ (2GB Storage Free)
(Spider Oak Encrypts your data on the fly to ensure your privacy)
23
Cybercrime Survival Guide 2014
CST
8
Protect your data (continued)
WHY SHOULD I The following can happen if you do not adequately protect your data on all
CARE? your devices:
Personal Impact
Data Security
• Devices that get stolen or misplaced risk having their data compromised.
• There are many incidents that could result in you losing some or all of your
valuable data.
24
Cybercrime Survival Guide 2014
CST
9
Log off
Do NOT check
‘Keep Me Logged In’ or
‘Remember Me’
QUICK TIPS • Do NOT check ‘Keep Me Logged In’ or ‘Remember Me’, especially on public
computers!
Log out
• When you are finished with your emails or social media, click the Log Out or Sign
Out button / link. It is normally in the top right hand corner of the webpage.
HELPFUL • Password managers (as mentioned in CST 7, Helpful Applications), can centralise
APPLICATIONS and automate your logins across multiple websites with one central “Master”
password - which is safer than staying logged into accounts when idle or not
used.
WHY SHOULD I Personal Impact
CARE ?
• Your identity can be stolen.
• Your personal information can be stolen.
• Your social media accounts (Facebook, Twitter etc) can be compromised.
• You may suffer reputational damage should hackers post unsavoury content to
hacked accounts.
• Your bank accounts could be compromised and money stolen...
• Criminals may gain access to all information in your email accounts. They may
also attempt to illicit further information or money from your contacts.
25
Cybercrime Survival Guide 2014
CST
10
Be cautious when using Bluetooth
& Wi-Fi
QUICK TIPS • Do not connect to “Free” (open) Wi-Fi networks that public stores offer.
• Do not accept unknown Bluetooth pairing requests.
• Secure your Wi-Fi at home.
Child Safety
• Images of you or your family can be harvested without your permission and
used on unsavoury websites
Device Security
• Criminals can implicate your device in cybercrime.
• Your device can become infected with viruses (malware).
26
Cybercrime Survival Guide 2014
Africa’s Leading Cyber
Security Publication
Missed an Edition?
Previous editions can be downloaded for free at:
27
www.wolfpackrisk.com/publications Cybercrime Survival Guide 2014
Where to apply the
Cybecrime Survival Tips
Online Banking, Shopping and Social Media:
Cybercrime Survival Tips:
• Use your common sense
• Keep your software up to date
• Install antivirus on all devices
• Inspect links before clicking
• Don’t open email or attachments from untrusted sources
• Review app permissions before installing an application
• Create strong and unique passwords
• Log off
• Be cautious when using Bluetooth and Wi-Fi
General Tips
• Type the address yourself
• Always type out the address (URL) of your bank i.e. www.yourbank.co.za
• Secure Connection:
• Ensure that you have a secure connection: https over http.
• Look for the lock icon ()
STAYING SAFE
ON SOCIAL
MEDIA
How to keep your
Implement the above mentioned CSTs to keep your account secure
account secure.
Built in Security Facebook has a range of Twitter has security features Gmail has security features
Features. security features users can users can activate to help users can activate to help
activate to better protect their protect their account. protect their account.
account.
http://www.facebook.com/
help ->Security -> Extra
Security Features
© 2012 Google Inc. All rights reserved. Gmail™ is a trademark of Google Inc.
28
Cybercrime Survival Guide 2014
STAYING SAFE
ON SOCIAL
MEDIA
How do you know if You cannot access your You cannot access your You cannot access your
your account has been account with your normal account with your normal account with your normal
login credentials. login credentials. login credentials.
hacked.
There are posts on your news There are Tweets from your People receive emails from
feed that you never posted. account that you didn’t you that you didn’t send.
personally make.
These posts encourage your
friends to click on the links.
What to do if your Clean your computer from Clean your computer from Clean your computer from
account has been malicious software before malicious software before malicious software before
changing your password changing your password changing your password
hacked.
Scan your computer for any Scan your computer for any Scan your computer for any
malicious software and make malicious software and make malicious software and make
sure your antivirus is up to sure your antivirus is up to sure your antivirus is up to
date. date. date.
Do not change your password Do not change your password Do not change your password
until you are certain the until you are certain the until you are certain the
computer you are using is free computer you are using is free computer you are using is free
of all malicious software. of all malicious software. of all malicious software.
If you still have access to If you still have access to If you still have access to
your account change your your account change your your account change your
password (have a look at password (have a look at password (have a look at
Password management). Password management). Password management).
If you do not have access If you do not have access If you do not have access
to your account, reset your to your account, reset your to your account, reset your
password by clicking on the password by clicking on the password by clicking on the
Forgot your password link on Forgot your password link on Forgot your password link on
the log in page. the log in page. the log in page.
© 2012 Google Inc. All rights reserved. Gmail™ is a trademark of Google Inc.
29
Cybercrime Survival Guide 2014
Glossary
419 Scam Government grant scam Remote access tools (RAT’s)
Claim that your help is needed Usually advertisements, claiming Malicious software used to control
to access a large sum of money, that you qualify for a ‘free’ grant your computer remotely.
usually millions of dollars. When to pay for housing or education
in fact the money does not exist. costs. Perpetrators may pose as a Rootkit
Attempt to trick people into ‘government’ or an organisation Malicious software used to control
believing that they had a wealthy with official name. The claim is your computer.
uncle or aunt from overseas who always that your application for
has left a fortune that needs to be a grant is accepted - that you Spy ware
claimed by a person with the same will never have to pay back the Malicious software that monitors
surname. money. computer activities without the
user’s knowledge, and the intent to
Adware Investment scam get private information.
Malicious software that allows Includes investment opportunities
unwanted advertisements on your and expert tip-offs on rising shares. Telemarketing scam
computer. Deals often sound tempting, Targets of this type of fraud are
resulting in victims losing large usually those aged 60-upwards,
Antivirus sums of money. coerced to buy bogus products
Software designed to protect your offerings by telephone including
computer from harmful software Key logger free prizes, low-cost vitamins and
(Malware, Viruses, Trojan, etc.). Malicious software or device that health care products and vacations.
captures everything you type.
Charity scam Criminals can use this to get your Traveling/Holiday scam
Swindling of money by scammers password. Unsuspecting victims are targeted
in the disguise of a worthy cause. by fraudulent holiday/travel
Victims are asked to donate for a Lottery scam tour agents - offered a tempting
‘special cause’. But the charity turns Proceeds hardly go towards holiday at a fraction of normal cost.
out to be a fraud, or a scammer the cause and when they do, it Even though there are genuine
pretending to be a real charity. is usually just a fraction of the holiday discounts it is important to
proceeds. Lottery and competition research holiday vouchers, booking
Classified scam scams also come in varied forms, via accommodation online, or sorting
Scammers enjoy tricking people email, texts, or through social media out a visa for your trip.
into purchasing non-existent and is often a lottery or competition
or sub-standard goods online. that you did not enter. Trojan
Scammers are not always on Malicious software hidden in a
the selling side but also act as Malware normal application or software that
interested parties (clients). Is used to describe all the malicious claims to be legitimate.
software like Viruses, Trojans and
Employment scam Worms. The term Virus is often Operating System
Employment scams are conducted wrongly used to describe all The software that manages
by unscrupulous people that malicious software, the correct term your computer and operation. (
pose as employers. The scammers is Malware. Windows, Mac OS X and Linux. )
may ask you to pay a recruitment
administration fee to assist you Phishing Virus
in getting a job or will ask for When criminals pursue sensitive Malicious software created with
money for visa processing or travel information about you like intent to harm your computer or
expenses. usernames, passwords and ID to be used for cybercrime. The
numbers. term Virus is often confused with
Encryption Malware
Computer algorithms that encode Ransomware
your data, making it unreadable Malicious software that locks Worm
unless you have the correct (encrypts) the computer it infects, Malicious software that can spread
password. and demands payment to unlock itself on computers without user’s
(decrypt) it. interaction. Once a virus is able
to do this it is now classified as a
worm.
30
Cybercrime Survival Guide 2014
31
Cybercrime Survival Guide 2014