Five most common computer crimes

Computer crime encompasses a wide range of criminal activity that is done through digital technology. Cybercrime is a growing threat to U.S. citizens. Last year, 71% of U.S. citizens reported that they were afraid of falling victim to cybercrime and nearly 30% were affected by data breaches.

In order to help keep your data safe, note the top five most common crimes.

  1. Computer virus/malware. Computer viruses, also known as malware, are the most common type of cybercrime. Malware is any system that is designed to damage or disable your electronic device. It is commonly used to take full or partial control of your computer, tablet, phone, or other device, giving the criminal full access to your device.
  2. Data breaches/identity theft. Your personal identity may be compromised through a data breach. This can happen through a company that has your personal information on file or through a breach on your own device. If a cybercriminal gains access to your personal information—address, phone number, birthdate, social security number, etc., they can open accounts in your name and spend your money.
  3. Debit or credit card fraud. In addition to traditional credit card fraud, there is electronic fraud. This type of fraud can occur from entering your credit or debit card number on an unsecure website. Your credit card does not have to be physically present in order for this type of fraud to happen.
  4. Stolen passwords. Passwords that are shared or easy-to-guess have a high risk of being stolen. A cybercriminal may have access to your bank account, credit card number, social security number and more if they figure out your password(s). In addition, if you forget to log out of any account, banking, social media, email or others, a cybercriminal may be able to gain access to your information.
  5. Phishing. Phishing is a computer crime that uses encrypted links to gain personal information. Phishers send out thousands of emails with clickbait, hoping that people will open the email with the encrypted link. When a person does click on the link it gives the phisher access to the person’s computer.

The first step in avoiding falling victim to cybercrime is to be aware of the ways in which these criminals can access your information. Once you are aware of the threat, you may be better equipped to protect yourself.

How do cybercriminals get caught?

Because cybercriminals can gain access to your information from any location, they may be difficult to catch. Someone that lives in another country may be able to access your device. Investigators can often track the cybercriminal’s electronic footprint or their IP address.

When that isn’t possible, cybercriminals may be caught spending your money. Since most cybercrimes are monetarily motivated, authorities may be able to flag your credit card or bank account and catch the criminal when they use that information.

No Comments

Leave a comment
Comment Information
    1. Charleston County | Bar Association
    2. South Carolina Association of criminal Defense Lawyers
    3. Rated By Super Lawyers | Rising Stars | Cameron J.Blazer | Superlawyers.com
    4. South Carolina Bar
    5. Liberty Fellowship
    1. Aspen Global Leadership Network | The Aspen Institute
    2. Justice 360 | Advancing Equality in the justice System
    3. Jefferson Awards Foundation
Email Us For A Response

Question About Criminal Charges?

Bold labels are required.

Contact Information
disclaimer.

The use of the Internet or this form for communication with the firm or any individual member of the firm does not establish an attorney-client relationship. Confidential or time-sensitive information should not be sent through this form.

close

Privacy Policy

Mount Pleasant Office
1037 Chuck Dawley Blvd d100
Mount Pleasant, SC 29464

Phone: 843-732-1440
Phone: 843-732-1440
Mount Pleasant Law Office Map

Charleston Office
192 E Bay St STE 202
Charleston, SC 29401

Charleston Law Office Map

Payments Accepted
  • Visa
  • Mastercard