How to Protect Yourself from Cybercrimes During Pandemics
Hello, everyone, my name is Salaudeen Amao. I shall be discussing HOW TO IDENTIFY POTENTIAL CYBERCRIMES AND PROTECT YOURSELF FROM SCAMMERS
2 How and why these scams are successful?
3. Identifying the forms these attacks take
4. How to combat it (summary)
I hope we are observing the necessary precautions in this unusual time. Please stay safe. I am going to be talking on the subject of identifying scams and hoxes and how to combat it or protect yourself.
2. The other reasons why Cybercrimes, scams and hoaxes are successful
- Knowledge Vacuum: In reference to the pandemic, Govts and health authorities must provide the right info else he bad guys will capitalize on it.
- It is more emotional than being arrogant (Naive): we are more inclined to believe what we see (even though it was not true).
People with the highest IQ & business acumen can also fall victim even in times of crisis. For example, A company was scammed of 6.6million euros for facemasks that never arrived.
- Social isolation and a sense of new purpose: Older people are easier to manipulate but younger people are not left out too (Both young and old are vulnerable).
They are socially lonely and are more susceptible to people offering supposed care for their own benefit. While young people want to have a sense of more purpose during a pandemic.
- Economic incentives and it costs nothing to try (it cost your life actually): There is nothing to be made shutting down the false claim. It won’t cost you a leg so why don’t you try it.
All I need to do is a retweet and I get the cash.
- A False call to action: Check if there is a sense of urgency to take immediate action. It could be to respond to a charity link that claims to be legit or clicking or donating to a charity via bitcoin that is Impersonating a govt org. or medical Organization, or receiving calls.
3. Identifying the forms of these attacks.
There are different attacks that can come in many forms and can cause so much disruption of business, loss of trust and reputation, and money. Viruses, Phishing, Spear phishing, ID Theft, Fraud. I will discuss a few of them
Viruses are harmful computer programs that can be transmitted in a number of ways. Although virus may differ in many ways, they are designed to spread themselves from one computer to another through the Internet and cause havoc.
Most commonly, they are designed to give the criminals who create them some sort of access to those infected computers.
- Phishing : Phishing attacks use email or malicious websites (clicking on a link) to collect personal and financial information or infect your machine with malware and viruses
- Spear phishing is highly specialized attacks against a specific target or small group of targets to collect information or gain access to systems.
Spam, phishing, and other scams aren’t limited to just email. They’re also prevalent on social networking sites and applications such as Facebook and Whatsapp.
Spyware: The terms “spyware” and “adware” apply to several different technologies.
The 4 important things to know about them are:
- They can download themselves onto your computer without your permission (typically when you visit an unsafe website or via an attachment)
- They can make your computer do things you don’t want it to do. That might be as simple as opening an advertisement you didn’t want to see.
In the worst cases, spyware can track your online movements, steal your passwords, and compromise your accounts.
- Botnets are networks of computers infected by malware (virus, keyloggers, and other malicious software) are controlled remotely by criminals, usually for financial gain or to launch attacks on websites.
- Computer/device infected with botnet malware can communicate and receive instructions about what it’s supposed to do from “command and control” computers located anywhere around the globe.
What your computer/device does depends on what the cybercriminals are trying to accomplish.
Every cybercriminal/Malicious attacker/scammer has his/her motivation as the driving force to get what he wants.
The manner or medium he uses does not matter to him. so far it would take maximum effect and deliver many casualties he is ready to execute.
4. ID Theft, Fraud & Victims in Cybercrimes
If you are one of the victims of cybercrimes, you need to know what to do and respond quickly.
When dealing with cybercrimes, an ounce of prevention is truly worth a pound of cure.
Cybercrimes in all its many forms (e.g., online identity theft, financial fraud, stalking, bullying, hacking, e-mail spoofing, information piracy and forgery, intellectual property crime, and more).
At worst, cybercrimes can lead to financial ruin and potentially threaten a victim’s reputation and personal safety. It’s always wise to do as much as possible to prevent cybercrimes.
5. How to combat Cybercrimes (summarised)
- Stop think before you connect or Verify
- Keep your computer or devices up to date: Free is better than none but it is better to invest in a good one.
There are Examples of good security software out there that are free and easy to use.
- Password management: Passwords are like underwear, change them, and don’t use transparent or weak ones.
- Sharing is caring: warn others. Just like a virus if you don’t warn people close to you about a piece of bogus information it is only a matter of time that info they aren’t aware of affects you.
The more surface area you establish (e.g devices connected to the outside world such as the internet ) the more susceptible you are to Cybercrimes.
PREPARED BY SALAUDEEN AMAO
How to master critical thinking by using professional Gamer strategy