What is data privacy breach? A data breach is an incident where information is stolen or taken from a system without the knowledge or authorization of the system’s owner. A small company or large organization may suffer a data breach. A privacy breach occurs when someone accesses information without permission. It starts with a security […]
Read More
Hacking and cyber extortion
Hacking is an attempt to exploit a computer system or a private network inside a computer. Simply put, it is the unauthorized access to or control over computer network security systems for some illicit purpose. Cyber extortion is an internet crime in which someone holds electronic files or your business data hostage until you pay […]
Read More
Identity thefts
Identity theft is the crime of obtaining the personal or financial information of another person to use their identity to commit fraud, such as making unauthorized transactions or purchases. Identity theft is committed in many different ways and its victims are typically left with damage to their credit, finances, and reputation. Identity theft occurs when […]
Read More
Cyberbullying
Cyberbullying can be defined as an aggressive, intentional and repeated act carried out by a group or individually, performed via electronic means such as mobile phones or the internet, against a victim who cannot easily defend himself or herself (Slonje, Smith and Frisén, 2013). Bullying, in general, is separated from other aggressive behaviors based on two […]
Read More
Phishing techniques
Phishing – fraudulent activities designed to steal personal and / or other confidential information (e.g. identity data, passwords, payment card details, etc.). Usually, the main goal of phishing is to get personal data and login credentials for online banking. User IDs, passwords and other credentials enable fraudsters to access individuals’ bank accounts and dispose of […]
Read More
Financial crimes and investments frauds
Financial crimes are crimes in which criminal organizations benefit financially. In financial crimes, usually, one party provides a financial benefit, and the other party suffers a financial loss. These are frequently committed for the personal benefit of the criminal and involve the illegal conversion of ownership of the property involved. When we talk about ‘consumer […]
Read More
Fake news and propaganda
Propaganda is defined as deliberate and consistent dissemination of theories and ideas in philosophy, science, religion, etc., in order to educate people using them, influence people’s views, moods, manipulate with, promote certain actions that would contribute to the goals pursued by the propagandist. Propaganda aims to affect the emotions and opinions of the target group. […]
Read More
Fraud advertising (fake products, supplements)
Whenever money is involved, there is always an opportunity for a fraud. From a technical perspective, online advertising fraud has been relatively easy (and yes – lucrative) business for fraudsters and a financial disaster for advertisers, publishers and online ad platforms themselves. Online ad business was built on a number of Internet Open Standard technologies […]
Read More
PC/online gaming, casino, addiction
Play is an innate human drive, which appears in early childhood (Kuss & Griffiths, 2012, p. 5). After the millennium internet gaming has increased significantly because of the huge technological development. PC gaming and, in general, online gaming gives players the opportunity to experience different gaming environments simultaneously, to design and develop virtual characters they […]
Read More