cycrime
Saturday 18 August 2012
›
Phishing/spoofing are two terms that are slightly similar to one another, where the former means – a technique of trying to seize informa...
Salami Attack
›
A salami attack is when small attacks add up to one major attack that can go undetected due to the nature of this type of cyber crime. It...
Cyber extortion
›
Cyber extortion is when an organized group of people (in most cases) seizes various databases of a company, while threatening to cause ha...
Cyberstalking
›
Cyberstalking is where individuals/groups use the Internet or other forms of communication, to harass a group of people, a single person,...
Cyber Defamation
›
Cyber defamation is when one uses the Internet as a source of passing offensive remarks, demeaning information, and slanderous accusat...
Seriousness of IRC Crime
›
IRC crime is often overlooked when computer crimes are being discussed. Perhaps when faced with other crimes like hacking or phishing e...
Software Piracy
›
Having been a victim himself, Software piracy and Raj B Lonsane are related quiet intimately with each other. Software Piracy is perhaps o...
›
Home
View web version