Cyber Criminals – Common Activities

Cyber criminal activity or cyber-terrorism used to be things that we read about occasionally or heard about but had never seen.  However, many people have seen reports, or may know someone (even themselves) who has been a victim of some type of cybercrime.

While the most common types include spam, which generally seems harmless and is more annoying than anything else, there are many types (including some kinds of spam) that can be very harmful and dangerous, and may affect you more than you even realize.

Here is a look at some of those types of crimes and what you can do to protect yourself against them.

Spam is the most common type of cybercrime in computer security.  While some spam seems harmless, often it is used to spread viruses, worms, and other types of malware or even spyware to give hackers access to your computer, or to destroy or delete your files.

Image courtesy of suphakit73 /

The best way to combat this is not to open messages that look spammy and not to, under any circumstances, download a file from someone you don’t know.

Even if you do know them, be very careful about downloading .exe files as they are programs.  Most email providers will automatically screen and may even block emails with .exe attachments.

One way that viruses can be used against you is to commit credit card fraud. Some of these viruses will keep track of every keystroke that you make on your keyboard and will send these to the hacker who created the virus.

They may be able to access your social security number, credit card number, home address or online banking passwords. Again, the best way to prevent this is not to open unknown attachments.

It’s also a good idea to get a high quality anti-virus program in place on your computer.  However, some estimate that these may catch less than 50% of viruses, so it’s good to have a secure firewall in place also.

Cyber bullying, while perhaps less directly engaged in with criminal intent, is still a reality.  Among teenagers, online harassment is very common, and some states in the U.S. have laws to punish those who engage in such activities.

Some sites, like Facebook or Myspace, allow reporting of activities that may be considered harassment in order to weed out online bullies.

A botnet is a group of hijacked computers that are all controlled by a single person on the internet.

Usually, they’ll use a virus to gain control of your home computer and may use the computers as a dead-drop – a hijacked computer or server which is used to store the personal data that they steal from others.

Normally the theft is committed by virus, keyloggers, or spyware tools and the data is loaded to the hijacked computers.  You can pick these types of viruses up in email attachments or even by visiting websites that contain viruses.

Sometimes this is called a ‘drive by download’ – a website that is set up to deliberately infect the computers of any visitor to the site.  Typically the malicious program installs automatically without the user’s knowledge.

Sometimes, computers send false data to a specific website in order to try to knock it off of the internet.  This is usually referred to as a DDOS – distribution denial of service.

Many times these types of attacks are used against banks or financial institutions in either an attempt to steal information, or as a threat where ransom is demanded.

One of the ways that the government and other agencies combat hackers and cybercrimes is to set up what is known as a honeypot.  This is a network or computer that looks poorly protected to the casual viewer, but has deliberately been set up to look that way to catch criminals.


About the Author:  Frank E. Mann is a Houston family lawyer who also writes about family-related law issues.

Build Your Own Security
Subscribe to my newsletter and get a copy of my eBook for free.
We hate spam just as much as you

Related posts:

  1. Is it Important to Get Malware Protection?
  2. 5 Things Cyber Insurance Covers
  3. Common Characteristics of Phishing


  1. Sophia Hampton says:

    I was a victim of cyber crime 2 years back. Somehow my email id was hacked & all my stored data in the email was destroyed & used by the hacker. I have to face bunch of troubles due to this. After that incident, I am so careful & anxious about the online world. It is one of the dangerous platform in the world where your valuable information can be used unethically at any moment. So everybody should be careful in this regard.
    Thanks for the well written post.

  2. Jeff

    I think cyber criminals are equally dangerous to a killer or organized theft walking in the streets. They can do really big damage and could even destroy your life. So always stay safe online.
    Jeff recently posted..WP Engine Review: The Truth Behind WP Engine Managed HostingMy Profile

  3. Kristine from Triathlon coaching says:

    Hi Frank! I want to thank you first and foremost for giving this matter the emphasis it urgently needs. Our online security is of utmost importance so it really pays to be wary of those who are out to take advantage. I think the best defense we have at the moment is to change our passwords on a regular basis and avoid suspicious attachments and downloads.
    Kristine recently posted..Hello world!My Profile

  4. Tony says:

    It’s amazing how many victims of cyber crime don’t even realized they’ve been victimized. It’s not that hard to protect yourself.
    Tony recently posted..Process Of Criminal JusticeMy Profile

Speak Your Mind


CommentLuv badge

This blog uses premium CommentLuv which allows you to put your keywords with your name if you have had 3 approved comments. Use your real name and then @ your keywords (maximum of 3)