National Cyber Security Awareness Month 2021 Our society, personal lives, business transactions, and critical infrastructures have become largely dependent on computer networks and information communication technology. Almost everything from our web browsing to mobile devices and the Internet of Things (IoT) has the potential to invade our privacy and personal
At the end of Part 1, the bank requested for authentic documents. I contacted Wendy and she sent me the first three documents (Deposit Certificate, Death Certificate and Will Certificate). Together with edited copy of my passport, I sent it to the invisible bank, after which I ignored them. Remember:
Verify every information source. There is currently an overload of digitized information on COVID-19 outbreak purporting to be genuine and credible, and so the need to obtain authentic information cannot be over-emphasized. Since not all information out there is factual and correct, consumers of digital services must know who to follow in the cyberspace and where to search for the right information about coronavirus on digital platforms.
Cyber-criminal can also use the WhatsApp platform to carry out their operations. WhatsApp users will be receiving messages offering “surprised” gift cards that appear to be sent from your phone contacts. Following the link will take you through to another site that looks genuine and would be requesting your personal details.
In this third part of the series on Social Media security and privacy, I would like to further expose the reader to other unsuspecting pieces of information that attackers earnestly in order to advance their nefarious activities in the social cyberspace. New Credit Card It may sound a no-brainer, but
Social networking sites are online platforms that allow people to connect with each other and build interpersonal relations. It has become a vital part of our modern life and its use is increasing rapidly. Examples of such sites include LinkedIn, Facebook, MySpace, Twitter, Pinterest, Google+, Instagram and so on. It
Overview As discussed in our last publication, every form of criminal’s act has a technology aspect in it. Investigators and prosecutors struggle to find enough evidence for cybercrime prosecution. Besides multiple jurisdictional challenge in cybercrime investigations (as published earlier), expertise, technology, and investigation workflow present several challenges to cybercrime investigation
Overview As discussed in our last publication, every form of criminal’s act has a technology aspect in it. Investigators and prosecutors struggle to find enough evidence for cybercrime prosecution. Besides multiple jurisdictional challenge in cybercrime investigations (as published on 12 November 2018), expertise, and technology, reporting of cybercrime for investigation
Overview As Information Technology Communication (ICT) is integrated into daily functioning of businesses, organizations, governments, and individuals, almost everyone depends on ICT for a living, criminals also utilize ICT platforms to carry out crime activities. Computer related criminals use computer as the object of the crime (hacking, phishing, spamming) or
Overview The mass explosion of technology and high rate of adoption of internet and technology have resulted in the growing and modernization of cybercrime activities-which are threats to national, organization and personal security. Almost every form of criminal’s act has a technology aspect in it. As mentioned in our previous
Introduction Cybercrime has kept pace with technology advancement but, security practitioners and law enforcement agencies are yet to catch up with the criminals. This article highlights the current cybercrime activities, discusses the motivations behind cybercrime, and outlines steps of reducing cybercrime risks. Cybercrime Activities The Council of Europe Convention on
Overview Cybercrime has kept pace with technology advancement but, security practitioners and law enforcement agencies are yet to keep catch up with the criminals. The more technology advances and evolves, the more businesses and individuals adopt these technologies, and the more the attack surfaces of these technologies also increase. Cybercrime issues
The government has been charged to team up with the telecommunication companies and reduce international call rates to $0.19 in order to discourage Subscriber Identification Module (SIM) Box fraud in the country. A PhD candidate at the Department of Computer Science and Information, University of Energy and Natural Resources, Mr