Cybercrime is illegal activities that involve the use of computers, networks or the internet.
Cybercrime involves a range of illegal activities, including hacking, phishing, malware distribution, identity theft and data breaches.
The dark web is a hidden part of the internet requiring special software for access, often used for illegal activities.
Criminals can buy and sell stolen personal information on the dark web.
A hacker is a person who uses their technical skills to break into computer systems or networks.
Hackers exploit vulnerabilities, steal data and disrupt systems.
Identity theft is using someone else's personal information to gain access to their financial or other sensitive data.
Identity theft can occur through phishing, data breaches, physical document theft or malware attacks.
Phishing is tricking people into giving away sensitive information through fake emails or messages.
Phishing attackers often impersonate trusted entities like banks or government agencies to trick victims.
A virus is a type of malware that is capable of replicating itself and spreading to other systems.
Opening suspicious email attachments can expose your computer to harmful viruses.
Malware is any software that is designed to harm computer systems or networks.
Examples of malware include: viruses, ransomeware, spyware, adware, trojans, rootkits and botnets.
Ransomware is a type of malware that prevents the victim from accessing their own data until a payment is made.
Ransomware attackers often demand payment in cryptocurrency to make it difficult to trace the transactions.
Spyware is a type of malware that collects information from a computer or device without the user's knowledge or consent.
Spyware can track your internet browsing habits, capture keystrokes and steal sensitive information like passwords or credit card details.
Adware is a type of malware that displays unwanted advertisements on a computer or device.
Adware can slow down your computer's performance and disrupt your browsing experience with pop-up ads.
A trojan is a type of malicious software that disguises itself as a legitimate program.
Trojans don't spread on their own like viruses do, they need someone to download or install them to start causing harm.
A cyberattack is an attempt to damage, disrupt or gain unauthorized access to a computer system or network.
Cyberattacks can come from individuals, criminal organizations or nation-states.
A rootkit is a type of malware that gives an attacker remote access to a computer or device without detection.
Detecting and removing rootkits can be challenging due to their advanced hiding techniques.
A botnet is a group of infected computers that are controlled by a hacker to carry out illegal activities, such as a cyberattack.
Devices infected with botnet malware often show signs of decreased performance and unusual network activity.
A data breach is a security incident where sensitive information is accessed without authorization.
Preventing data breaches requires strong security measures and careful monitoring.
Spam is any form of unwanted or unrequested messages or emails sent in bulk.
Spam emails can clog inboxes, waste time and potentially contain malicious links or attachments.
Piracy is unauthorized use or distribution of copyrighted material, such as software, music or movies.
Downloading movies or music from unauthorized websites is a form of piracy.
Social engineering is the use of psychological manipulation to trick people into giving away sensitive information.
Fake messages and impersonations are common in social engineering attacks.
Cyberbullying is the use of digital technologies to harass, intimidate or humiliate someone.
Cyberbullying can cause emotional distress, anxiety and even lead to offline harm or self-harm.
A deepfake is a type of manipulated media that uses artificial intelligence to create realistic but fake videos or images of people.
Detecting deepfakes requires advanced algorithms and ongoing research to stay ahead of evolving techniques.