From a very primitive age, we have learnt to see things in a twin perspective where one stands as the Good and the other as the Bad. If something has about 99.9% good in it, it certainly shows a 0.1% of negative side which perhaps can never be avoided. It all depends on how much we are ready to compromise and of course, improvise to make it suit our needs. But all that was a thing of the past, surely in this age of flying machines and diving cars, we could get past through the evil side of our inventions?
Well, sorry to say but things didn’t go as planned and we are still stuck with Mr. Bad harassing us with its upgraded tactics. How does he do it this time? Let’s see.
If industries had a revolution, so did its mate, technology. Evolving to improved versions of machines, serving our needs better than yesterday, prompt service and fine quality have been some of our major breakthroughs. Computers have become integral to our work. We use them to store data, project movies, learn new things, pay bills, book a ticket, wish a friend and the merits go on and on. Really there is nothing we can’t do if we have this fine thing alongside us. However, since we already know that absolutely nothing can be 100% wholesome, aren’t you a little bit curious to know what exactly are its demerits? To be frank there are quite a bunch of those but a major demerit would be the term we all fear. It is Cyber Crime, crime that is done in virtual world and affects real life scenarios.
What exactly does Cyber Crime mean? It means that while we are comfortingly doing our work online, some evil guy secretly hacks into our system and steals all our data. He then uses them to pull us into a vicious trap where we end up losing our money, or worse our dignity.
Image Source: legal.xpertxone.com
How is done? It could be done in various ways. For example, while you are working, a certain window pops up saying your computer is being attacked by a certain virus and this might lead to irreparable damage. So to avoid that, click on this button. You believe whatever it is saying since it is from a trustworthy site and hit the block button. That gives the hacker the green signal and you actually permit him to enter your personal workspace in the guise of an anti-virus. This is called Phishing. Within no time, he efficiently does his job of stealing disk space, accessing personal information like name, PAN, password or credit card number, ruining data on the computer or sending information out to any other computer user's personal contacts. Pretty neat isn’t it?
All this happens without you knowing a bit. So the next day when you open your computer, it either sulks, showering you with a load of complaints or perhaps a number of its softwares don’t work properly or have developed a glitch. An even better job would be when you discover that all your confidential data have magically presented themselves to your competitor and perhaps you lose a deal!
Another way is Cyberstalking. The stalker uses Internet or electronics to stalk or harass an individual, an organization or a specific group. It can include monitoring your activity, live or realtime without your knowledge, of course. It could happen while you are working on your device or are offline. You are continuously harassed or blackmailed to do something against your wishes, most of the time it involves threatening you to obtain financial information. Women suffer from continuous sexually insulting comments and threats which crushes their self-esteem. Again, the stalker can put a recording or monitoring device on your computer or smartphone in order to save every keystroke or obtain your private life details and morph them to create an insulting video or audio. The stalker might post these media on web and tarnish the victim’s image on their social account despite being warned not to do so. An assuring thing is that Cyberstalking has the potential punishment of a prison sentence and that’s a little bit of relief.
If stealing your data, diskspace, information was not enough, beware of identity theft! One terrifying morning you discover that you have given your permission to a certain deal but really, you don’t have the slightest idea that you did. Blame it on this particular skill of the hacker. He steals your personal information pretending to be you. This is a common problem faced by women who are stalked day and night. Some cases even go to the point where a girl attempts suicide because of this pressure or her social image is destroyed by posting her pictures in a porn site. This is done by breaching the victim’s browser security or through software called spyware.
So with all these malwares, internet frauds, scams, viruses, how on earth are we supposed to do our work properly? How do we trust our mails? How do we prevent these wicked creatures called hackers from entering our life?
Frankly, hacking systems have become cheaper and much easier than it was before. So the best way you can protect yourself is install a good anti-virus and software security which alerts you in case of any malware. Installing a strong security enables you to have faith in it and not believe the worthless windows saying your disk space has virus or your computer has become slow and all those gibberish. Check twice, thrice before you give out your personal details and bank account numbers. Don’t accept friend requests from people you don’t know. Whenever you work or whoever you work with, intimate the other person what you are doing. Make sure the receiver is really the person who receives your info.
Keep these things in mind and let’s wait for some computer geek to develop a miracle software to erase the term Cybercrime from our lives.
Feature Image Source: gizmodo.com.au