"Extorted deliberate act"
Hacker or trusted insider steals information and demands compensation
for its return.

"types of computer extortion"
cybernetic extortion:

Hackers take over computers, send rescue notes in local language and users pay for them. "It's the new Nigerian scam," say the specialists.
For example:

* theft of data files
containing customer credit card information...
*Blocking the personal computer on request of economic rescue.
*Blocking personal accounts
in different social networks.
*Ransomware that does not encrypt
"Computer blakmail"
It is a malicius computer program that infects and blocks files
and asks for financial compensation in exchange for releasing
them.
cybercriminals blackmail the victim so that the victim pays a
certaim amount of money usually in the virtual currency
cortions.
For example:-Hacking accessing a system and damaging or destroying or
critical data.
For more information visit:
https://latam.kaspersky.com/resource-center/threats/computer-vandalism
https://www.youtube.com/watch?v=PcsssAXN4hA
/www.zonared.com/noticias/microsoft-registra-patente-contra-trampas-online/
No hay comentarios.:
Publicar un comentario