Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 1

Botnet

Don't be fooled by their cute name; botnets are networks from compromised computers
that are controlled externally by remote hackers. The remote hackers then send spam or
attack other computers through these botnets. Botnets can also be used to act as malware
and perform malicious tasks.

Identity Theft

This cybercrime occurs when a criminal gains access to a user’s personal information to
steal funds, access confidential information, or participate in tax or health insurance fraud.
They can also open a phone/internet account in your name, use your name to plan a
criminal activity and claim government benefits in your name

PUPs

PUPS or Potentially Unwanted Programs are less threatening than other cybercrimes, but
are a type of malware. They uninstall necessary software in your system including search
engines and pre-downloaded apps. They can include spyware or adware, so it’s a good
idea to install an antivirus software to avoid the malicious download.

Phishing

This type of attack involves hackers sending malicious email attachments or URLs to
users to gain access to their accounts or computer. Cybercriminals are becoming more
established and many of these emails are not flagged as spam. Users are tricked into
emails claiming they need to change their password or update their billing information,
giving criminals access

Individuals

The weight of consequences falls on individuals who use gadgets that can face
problems such as privacy breaches, malicious website access or identity theft. This
could result in losing access to financial accounts, noticing unusual purchases on credit
cards and other headaches. What's more, scammers can use data stored on
smartphones for their own devious purposes, including harassment and blackmail.

Businesses

Sensitive data loss, financial loss, and brand damage can inflict serious harm on
businesses. This can have a devastating impact on stock value, as well as a direct
effect on the reputation and customer base. The consequences spread far beyond mere
financial loss, resulting in damage to reputation and more.

Government

Government information is often targeted by cybercriminals for misuse. Their advanced


tools and techniques help them gain access to highly sensitive data. Their ultimate
objective is to either corrupt or sell national defence and security information. Breaching
data security in this way is a critical offense.

You might also like