2. ONLINE CRIMES AND HAZARDS
• HACKING
• VIRUSES
• SPAMMING
• FRAUD AND SCAMS
• CYBER STALKING
3. HACKING
Hacking is unauthorized use of someone else's computer or online account. E-
mail hacking is one of the most common types of online hacking because it is
where most information on a user's online accounts can be found. Once a
hacker is able to enter your e-mail account, he or she would be ableto view
your personal information and access your other online accounts, giving him
the power to do unauthorized transactions or activities through your account.
There are many ways for hacking to happen. For one, if anyone has access to
a computer you are using, it's easy to install a keystroke logger (keylogger)
software, a program which allows the hacker to know everything you type, such
as passwords. Hackers can also use trial and error in the input of passwords,
relying on personal information they know about you such as birthdays or
names of loved ones. Viruses can also be used to get into your computer to
harvest information. Furthermore, there are many professional hackers online
whom people pay to hack any account. The first step for you to get hacked is to
be irresponsible in taking safety measures. The good news is that there are
many ways to lessen the risk of your computer or accounts from getting
hacked. Below are some of them
4. HACKING
• Use a password that is a combination of letters and numbers
in any online account you have. Never use personal
information as your password.
• Make sure you have a strong anti-virus or firewall program installed and
running on your computer.
• Never click on suspicious links in e-mail or download attachments you did
not expect to receive.
• As much as possible, don't give anyone access to your computer, or open
your account in someone else's personal computer
• Avoid keeping important accounts data in your e-mail inbox
• Be careful what you post and answer in your social networks. Many hackers
today use personal information posted on social networks to hack accounts
5. VIRUSES
As mentioned earlier, hacking can also occur through computer viruses. A computer virus is a
computer program that spreads from one computer to another computer and interferes with
computer operation. If your computer is infected with a virus, it can corrupt or delete any data you
have stored or even delete everything on your hard disk. Viruses are commonly spread through
attachments in e-mail messages, links in instant messages, or through files and programs you
download online.
Three of the most common types of computer virus are trojans, worms, and e-mail viruses. A trojan
is a computer program that appears to be an interesting or familiar application, file, or e-mail
attachment, but is only masquerading as such or hiding malware that causes damage when you
click and run it. Trojans can do a number of nasty things on your computer, the least of which tracks
your browsing habits, but in severe cases may even cause your computer from functioning properly.
The sneaky nature of trojans allows them to enter the victim's computer undetected, but once in,
they can be a nuisance, frequently making their presence known.
A worm is a small piece of software that uses computer networks and security flaws to replicate
itself. More complex than trojans (although they can be brought in by one), worms usually attack
multi-user systems and can spread over a network of computers through e-mail circulation.
An e-mail virus spreads as an attachment to e-mail messages and replicates itself by automatically
mailing itself to dozens of people in the victim's e-mail address book. Some e-mail viruses don't
even require you to double-click as they automatically launch when you preview an e-mail message
6. VIRUSES
Unsure if your computer has been infected by a virus? What follows are some
common signs of virus infection.
• Your computer runs slower than it used to be.
• Programs and applications take longer to load and sometimes refresh on
their own or disappear from the taskbar.
• Certain files and data are deleted.
• Unusual files or directories appear on your system.
• Disk space and file names change for no reason.
• Strange text, images, and messages appear on your screen.
• Your computer shuts down unexpectedly or crashes frequently.
7. VIRUSES
DID YOU KNOW!!
Two of the most controversial viruses in the history of the Internet are the Melissa
virus and the ILOVEYOU virus.
The Melissa virus spread in March of 1999 through Microsoft Word documents sent
via e-mail. The virus started in a Word document which was uploaded to an Internet
newsgroup. The virus was triggered whenever anyone downloaded the document.
It would send the infected document in an e-mail message to the first 50 people of
the person's address book. The e-mail message comes in a form of a friendly note
which included the person's name, making it look personalized and harmless. Once
opened again, the virus would create 50 new messages from the recipient's
machine. The Melissa virus gave a number of large companies no choice but to
shut down their e-mail systems.
The ILOVEYOU virus appeared in May 2000 and contained a piece of code as an
attachment. Anyone who clicked on the attachment launched the code, which would
send copies of itself to everyone in the victim's address book and corrupt files on
the victim's machine.
8. SPAMMING
A spam is the electronic equivalent of junk mail. Spamming is flooding message
accounts over the Internet with copies of the same message, mostly to
advertise, campaign something, and distribute jokes or words of wisdom to a lot
of people at the same time. Spam costs very little to send, hence "spammers"
use this method to advertise their products, services, or schemes to as many
people as possible. Below are some of the most common types of spam and
their definitions
9. SPAMMING
TYPES OF SPAM DESCRIPTION
E-MAIL SPAM Junk mail or unsolicited commercial e-mail
INSTANT MESSAGING SPAM
Also called spim, instant messaging sends unsolicited
messages and links to millions of users through advanced
software
ONLINE GAME MESSAGING
SPAM
All forms of message flooding in chat rooms, public
discussion areas, and private messaging functions of online
games
SEARCH ENGINE SPAM
Spam sent via black hat or questionable search engine
optimization techniques to increase chances of ranking high
in search engines
BLOG AND GUESTBOOK
SPAM
Template messages repeatedly posted in the comment
sections and guest books of blogs and websites
10. SPAMMING
TYPES OF SPAM DESCRIPTION
VIDEO SITE SPAM
Messages posted with enticing text and images, usually
promising videos of a sexually suggestive nature, to random
users' online profile
VIRUS SPAM
Spam automatically received from someone else's computer,
usually through an e-mail message, or the kind that opens
with a type of file
11. FRAUDS AND SCAMS
There are many variations of frauds and scams on the Internet created by fake
sellers who use computer services to promote bogus services products, and
investment opportunities, among others. The common goal is to fool you into
giving away money and/or bank information. But you have to find a balance
berween caution and adopting a go-for-it attitude. The overly cautious trait of
people can actually prevent them from finding new legitimate opportunities. Not
everything suspicious you encounter on the Internet is a scam. Some are
actually worthwhile checking out.
12. FRAUDS AND SCAMS
What follows is a list of guidelines to give you a nose for online frauds or
scams:
1. If something is too good to be true, then most likely it is.
If a certain site says you can get an unbelievably large amount of money
quickly with the least effort or investment, then it is likely bogus as no such kind
of business opportunity exists in the real world. Indeed, such offers will
generate big money quickly, but only for the scammer and not for you!
Legitimate offers are usually those that come from companies that have been in
the business for a long time, promise reasonable returns, have other financial
interests, and have earned credibility with members through the years.
2. Be wary of products that are offered too cheap.
If a certain product is offered too cheap than usual, don't rush into buying as
there may be a catch, particularly if the product is a physical object and not just
a digital file that can be downloaded.
13. FRAUDS AND SCAMS
3. Be cautious of buyers or sellers who have insufficient contact
information provided on their sites.
Legitimate and certified businesses are registered and often provide complete
contact information such as phone numbers, office location, and e-mail
addresses. They also have well-written copy in English. Petry scammers often
work alone (or with a handful of cronies), are often careless (in spite of their
technical know-how), write poorly, and design pages hastily with little regard for
taste or the target customers.
4. Research will go a long way.
Just because a seller has logos of affiliations or certifications from "credible
organizations" doesn't mean you can already trust it outright. These so-called
credentials are not assurances you will not be duped. Check to see if those
organizations indeed exist. Check for any feedback on the company and try
calling or e-mailing support. Verify the seller's street address, zip codes, and
other posted information.
14. FRAUDS AND SCAMS
ONLINE FRAUD/SCAM DESCRIPTION
GET RICH OR DEPOSIT
SCAMS
Scams that generally ask you to send money as "initial
deposit" which allow you to earn much more
PHISHING E-MAIL AND
WEBSITE SCAMS
E-mails and websites that resemble legitimate credit or bank
authorities. They will frighten you into visiting a phony
webpage (e.g., by saying there is a problem with your bank
account). Once you visit the phony website, it will ask you to
enter your ID and password. Information you enter is
intercepted by the scammers who will later access your
account.
WINNER OR CLAIM SCAM
All forms of message flooding in chat rooms, E-mail saying
you've won, inherited, or are the recipient of something
great (such as a huge amount of money) and you have to
send a claim fee and/or provide your bank details for shipping
and handling costs public discussion areas, and private
messaging functions of online games
15. SPAMMING
ONLINE FRAUD/SCAM DESCRIPTION
CREDIT CARD SCAM
Incredible offers of advanced fees paid for a guaranteed loan or
credit card
AUCTION FRAUD
You never get the product promised or bid on; the promises don't
match the product you actually received
EMPLOYMENT SCAM
Bogus job offers asking you to provide your personal data such as
bank account information or work samples so you can get started or
paid upfront
LOTTERY SCAM
Intriguing e-mails saying you won a huge amount of money and that
you must pay the processing fee to collect your winnings
TRAVEL SCAM
E-mail with the offer of an amazing low airfare to an exotic
destination and you must book immediately because the offer
expires immediately. The truth is, the airfare is free or low but hotel
rates are highly overpriced. Some offer rock-bottom prices but hide
high fees.
DISASTER RELIEF SCAM
Fake charity websites that ask people to donate money for the
victims of disasters such as tsunamis and hurricanes
16. CYBER STALKING
Cyber stalking is the use of the Internet by an individual or a group of individuals to
harass another individual, group of individuals, or organization. Cyber stalking can
involve threats, identity theft, false accusations, solicitation of minors for sexual
purposes, and gathering of information for harassment purposes. Cyber stalkers
often meet or target their victims through search engines, online forums, bulletin
boards, chat rooms, and social networks. They attempt to track or follow the victim's
Internet activity. They can also post derogatory statements about their stalking
target on websites to harass the victim. Victims of cyber stalking may not even
know they are being stalked. Cyber stalking can disrupt the lives of victims and
cause a lot of fear and a feeling of being threatened.
Cyber stalking can affect both young and old and is often perpetrated by predators
or stalkers. Stalkers can be located on the opposite side of the world or be close by
in the same neighborhood or room. Stalkers can also be of either sex, but over 75%
of the victims are females. Cyber stalking is not just threatening but also dangerous
because it can lead to serious offline harassment.