"Extorted deliberate act"
Hacker or trusted insider steals information and demands compensation
for its return.
Extortion is a crime that consists of forcing a
person, through the use of violence or intimidation, to make or omit a legal
act or legal business with profit motive and with the intention of producing an
injury of a patrimonial nature or of the passive subject.
"types of computer extortion"
cybernetic extortion:
Hackers take over computers, send rescue notes in
local language and users pay for them.
Hackers take over computers, send rescue notes in local language and users pay for them. "It's the new Nigerian scam," say the specialists.
For example:
Hackers take over computers, send rescue notes in local language and users pay for them. "It's the new Nigerian scam," say the specialists.
For example:
* theft of data files
containing customer credit card information...
*Blocking the personal computer on request of economic rescue.*Blocking personal accounts
in different social networks.
“computer blackmail”
It is a malicious computer program that infects and blocks
files and computer systems and asks for financial compensatio
in exchange for releasing them.
For example:
-Hacker accessing a system and damaging or destroying critical
data.
-theft of the database .
-access to credit card.
-theft in advertisements of commercial promotions.
No hay comentarios.:
Publicar un comentario