Get it on Google Play
New! Download Unionpedia on your Android™ device!
Faster access than browser!


Index Cybercrime

Cybercrime, or computer oriented crime, is crime that involves a computer and a network. [1]

164 relations: Allyn & Bacon, Arizona, Arms race, Associated Press, Association of Southeast Asian Nations, Australian High Tech Crime Centre, Bank fraud, Bank of America, Barack Obama, Bluetooth, Botnet, Carding (fraud), Central Intelligence Agency, Charles Scribner's Sons, Child grooming, Child pornography, Classified information, Cloud computing, CNN, Computer, Computer fraud, Computer Fraud and Abuse Act, Computer network, Computer security, Computer trespass, Computer virus, Confidence trick, Confidentiality, Connecticut, Convention on Cybercrime, Copyright infringement, Council of Europe, Cyber Crime Unit (Hellenic Police), Cyber defamation law, Cyberattack, Cyberterrorism, Cyberwarfare, Dark web, Darknet market, Data Retention Directive, December 2015 Ukraine power grid cyberattack, Dell, Denial-of-service attack, Digital forensics, Domain hijacking, Domain name drop list, Dow Jones Industrial Average, E-Trade, EBay, EHarmony, ..., Electrochemistry, Email, Email spam, Email spam legislation by country, End-to-end encryption, Espionage, Estonia, European Union, Evidence, Extortion, Federal Bureau of Investigation, First Amendment to the United States Constitution, Fortune 1000, Fraud, Freedom of speech, Georgia (country), Greenwood Publishing Group, Harassment, Identity theft, Illegal drug trade, Industrial espionage, Information security, Information technology, Information warfare, Internet Crime Complaint Center, Internet fraud, Internet homicide, Internet police, Internet pornography, Internet service provider, Internet-related prefixes, IP address, IT law, J. P. Morgan, Karuppannan Jaishankar, Key derivation function, LinkedIn, List of computer criminals, Log file, MafiaBoy, Malware, Mass surveillance, McAfee, Melissa (computer virus), Member state, Metasploit Project, Methodology, Michigan, Misha Glenny, Mobile phone, Moral hazard, MPack (software), National Crime Agency, National White Collar Crime Center, New York (state), New York University Press, News Corporation, NYNEX, Obscenity, Online banking, Operation Delego, Oxford University Press, Pacific Bell, Pedophilia, Penetration test, Personally identifiable information, Philippines, Phishing, PNC Financial Services, Police Central e-Crime Unit, Prentice Hall, Privacy, Protected computer, Psychology, Ransomware, Recreational drug use, Revenge porn, Russian Business Network, S&P 500 Index, Security hacker, Sextortion, Silk Road (marketplace), Sky UK, Social engineering (security), Software as a service, Sony Pictures hack, South Carolina, Southwestern Bell, Stanford University, Storm botnet, Suicide pact, Supreme Court of the United States, Techno-thriller, Terabyte, Theft, Trespass to chattels, U.S. Bancorp, U.S. Immigration and Customs Enforcement, Union Dime Savings Bank, United States, United States Department of Defense, United States Department of Homeland Security, United States Department of Justice, United States Federal Sentencing Guidelines, United States Secret Service, United States v. Kramer, Verisign, Virginia, WannaCry ransomware attack, Wells Fargo, White-collar crime, Yahoo!, Zappos, Zombie (computer science). Expand index (114 more) »

Allyn & Bacon

Allyn & Bacon, founded in 1868, is a higher education textbook publisher in the areas of education, humanities and social sciences.

New!!: Cybercrime and Allyn & Bacon · See more »


Arizona (Hoozdo Hahoodzo; Alĭ ṣonak) is a U.S. state in the southwestern region of the United States.

New!!: Cybercrime and Arizona · See more »

Arms race

An arms race, in its original usage, is a competition between two or more states to have the best armed forces.

New!!: Cybercrime and Arms race · See more »

Associated Press

The Associated Press (AP) is a U.S.-based not-for-profit news agency headquartered in New York City.

New!!: Cybercrime and Associated Press · See more »

Association of Southeast Asian Nations

The Association of Southeast Asian Nations (ASEAN) is a regional intergovernmental organization comprising ten Southeast Asian countries that promotes intergovernmental cooperation and facilitates economic, political, security, military, educational, and sociocultural integration amongst its members, other Asian countries, and globally.

New!!: Cybercrime and Association of Southeast Asian Nations · See more »

Australian High Tech Crime Centre

The Australian High Tech Crime Centre (AHTCC) is an Australia-wide policing initiative to coordinate the efforts of Australian law enforcement in combating serious, complex and multi-jurisdictional Internet-based crimes, particularly those beyond the capability of individual police agencies in Australia.

New!!: Cybercrime and Australian High Tech Crime Centre · See more »

Bank fraud

Bank fraud is the use of potentially illegal means to obtain money, assets, or other property owned or held by a financial institution, or to obtain money from depositors by fraudulently posing as a bank or other financial institution.

New!!: Cybercrime and Bank fraud · See more »

Bank of America

Bank of America Corporation (abbreviated as BofA) is an American multinational financial services company headquartered in Charlotte, North Carolina.

New!!: Cybercrime and Bank of America · See more »

Barack Obama

Barack Hussein Obama II (born August 4, 1961) is an American politician who served as the 44th President of the United States from January 20, 2009, to January 20, 2017.

New!!: Cybercrime and Barack Obama · See more »


Bluetooth is a wireless technology standard for exchanging data over short distances (using short-wavelength UHF radio waves in the ISM band from 2.4 to 2.485GHz) from fixed and mobile devices, and building personal area networks (PANs).

New!!: Cybercrime and Bluetooth · See more »


A botnet is a number of Internet-connected devices, each of which is running one or more bots.

New!!: Cybercrime and Botnet · See more »

Carding (fraud)

Carding is a term describing the trafficking of credit card, bank account and other personal information online as well as related fraud services.

New!!: Cybercrime and Carding (fraud) · See more »

Central Intelligence Agency

The Central Intelligence Agency (CIA) is a civilian foreign intelligence service of the United States federal government, tasked with gathering, processing, and analyzing national security information from around the world, primarily through the use of human intelligence (HUMINT).

New!!: Cybercrime and Central Intelligence Agency · See more »

Charles Scribner's Sons

Charles Scribner's Sons, or simply Scribner's or Scribner, is an American publisher based in New York City, known for publishing American authors including Ernest Hemingway, F. Scott Fitzgerald, Kurt Vonnegut, Marjorie Kinnan Rawlings, Stephen King, Robert A. Heinlein, Thomas Wolfe, George Santayana, John Clellon Holmes, Don DeLillo, and Edith Wharton.

New!!: Cybercrime and Charles Scribner's Sons · See more »

Child grooming

Child grooming is befriending and establishing an emotional connection with a child, and sometimes the family, to lower the child's inhibitions with the objective of sexual abuse.

New!!: Cybercrime and Child grooming · See more »

Child pornography

Child pornography is pornography that exploits children for sexual stimulation.

New!!: Cybercrime and Child pornography · See more »

Classified information

Classified information is material that a government body deems to be sensitive information that must be protected.

New!!: Cybercrime and Classified information · See more »

Cloud computing

Cloud computing is an information technology (IT) paradigm that enables ubiquitous access to shared pools of configurable system resources and higher-level services that can be rapidly provisioned with minimal management effort, often over the Internet.

New!!: Cybercrime and Cloud computing · See more »


Cable News Network (CNN) is an American basic cable and satellite television news channel and an independent subsidiary of AT&T's WarnerMedia.

New!!: Cybercrime and CNN · See more »


A computer is a device that can be instructed to carry out sequences of arithmetic or logical operations automatically via computer programming.

New!!: Cybercrime and Computer · See more »

Computer fraud

Computer fraud is the act of using a computer to take or alter electronic data, or to gain unlawful use of a computer or system.

New!!: Cybercrime and Computer fraud · See more »

Computer Fraud and Abuse Act

The Computer Fraud and Abuse Act (CFAA) is a United States cybersecurity bill that was enacted in 1986 as an amendment to existing computer fraud law, which had been included in the Comprehensive Crime Control Act of 1984.

New!!: Cybercrime and Computer Fraud and Abuse Act · See more »

Computer network

A computer network, or data network, is a digital telecommunications network which allows nodes to share resources.

New!!: Cybercrime and Computer network · See more »

Computer security

Cybersecurity, computer security or IT security is the protection of computer systems from theft of or damage to their hardware, software or electronic data, as well as from disruption or misdirection of the services they provide.

New!!: Cybercrime and Computer security · See more »

Computer trespass

Computer trespass is a computer crime in Kansas, North Carolina, New York, Oklahoma, Pennsylvania, Rhode Island, Tennessee, Virginia, and Washington.

New!!: Cybercrime and Computer trespass · See more »

Computer virus

A computer virus is a type of malicious software program ("malware") that, when executed, replicates itself by modifying other computer programs and inserting its own code.

New!!: Cybercrime and Computer virus · See more »

Confidence trick

A confidence trick (synonyms include con, confidence game, confidence scheme, ripoff, scam and stratagem) is an attempt to defraud a person or group after first gaining their confidence, used in the classical sense of trust.

New!!: Cybercrime and Confidence trick · See more »


Confidentiality involves a set of rules or a promise usually executed through confidentiality agreements that limits access or places restrictions on certain types of information.

New!!: Cybercrime and Confidentiality · See more »


Connecticut is the southernmost state in the New England region of the northeastern United States.

New!!: Cybercrime and Connecticut · See more »

Convention on Cybercrime

The Convention on Cybercrime, also known as the Budapest Convention on Cybercrime or the Budapest Convention, is the first international treaty seeking to address Internet and computer crime by harmonizing national laws, improving investigative techniques, and increasing cooperation among nations.

New!!: Cybercrime and Convention on Cybercrime · See more »

Copyright infringement

Copyright infringement is the use of works protected by copyright law without permission, infringing certain exclusive rights granted to the copyright holder, such as the right to reproduce, distribute, display or perform the protected work, or to make derivative works.

New!!: Cybercrime and Copyright infringement · See more »

Council of Europe

The Council of Europe (CoE; Conseil de l'Europe) is an international organisation whose stated aim is to uphold human rights, democracy and the rule of law in Europe.

New!!: Cybercrime and Council of Europe · See more »

Cyber Crime Unit (Hellenic Police)

The Cyber Crime Unit (Υποδιεύθυνση Δίωξης Ηλεκτρονικού Εγκλήματος) of the Hellenic Police, was formed in 1995.

New!!: Cybercrime and Cyber Crime Unit (Hellenic Police) · See more »

Cyber defamation law

Cyber defamation is not a specific criminal offense, misdemeanor or tort, but rather defamation or slander conducted via digital media, usually through the Internet.

New!!: Cybercrime and Cyber defamation law · See more »


A cyberattack is any type of offensive maneuver that targets computer information systems, infrastructures, computer networks, or personal computer devices.

New!!: Cybercrime and Cyberattack · See more »


Cyberterrorism is the use of the Internet to conduct violent acts that result in, or threaten, loss of life or significant bodily harm, in order to achieve political gains through intimidation.

New!!: Cybercrime and Cyberterrorism · See more »


Cyberwarfare is the use or targeting in a battlespace or warfare context of computers, online control systems and networks.

New!!: Cybercrime and Cyberwarfare · See more »

Dark web

The dark web is the World Wide Web content that exists on darknets, overlay networks that use the Internet but require specific software, configurations or authorization to access.

New!!: Cybercrime and Dark web · See more »

Darknet market

A darknet market or cryptomarket is a commercial website on the web that operates via darknets such as Tor or I2P.

New!!: Cybercrime and Darknet market · See more »

Data Retention Directive

The Data Retention Directive, more formally "Directive 2006/24/EC of the European Parliament and of the Council of 15 March 2006 on the retention of data generated or processed in connection with the provision of publicly available electronic communications services or of public communications networks and amending Directive 2002/58/EC" was a Directive issued by the European Union and related to telecommunications data retention.

New!!: Cybercrime and Data Retention Directive · See more »

December 2015 Ukraine power grid cyberattack

The December 2015 Ukraine power grid cyberattack took place on 23 December 2015 and is considered to be the first known successful cyberattack on a power grid.

New!!: Cybercrime and December 2015 Ukraine power grid cyberattack · See more »


Dell (stylized as DELL) is an American multinational computer technology company based in Round Rock, Texas, United States, that develops, sells, repairs, and supports computers and related products and services.

New!!: Cybercrime and Dell · See more »

Denial-of-service attack

In computing, a denial-of-service attack (DoS attack) is a cyber-attack in which the perpetrator seeks to make a machine or network resource unavailable to its intended users by temporarily or indefinitely disrupting services of a host connected to the Internet.

New!!: Cybercrime and Denial-of-service attack · See more »

Digital forensics

Digital forensics (sometimes known as digital forensic science) is a branch of forensic science encompassing the recovery and investigation of material found in digital devices, often in relation to computer crime.

New!!: Cybercrime and Digital forensics · See more »

Domain hijacking

Domain hijacking or domain theft is the act of changing the registration of a domain name without the permission of its original registrant, or by abuse of privileges on domain hosting and registrar(s) software systems.

New!!: Cybercrime and Domain hijacking · See more »

Domain name drop list

A domain name drop list is a list containing the expired domain names that will be deleted from the domain name registry in the near future.

New!!: Cybercrime and Domain name drop list · See more »

Dow Jones Industrial Average

The Dow Jones Industrial Average (DJIA), or simply the Dow, is a stock market index that shows how 30 large, publicly owned companies based in the United States have traded during a standard trading session in the stock market.

New!!: Cybercrime and Dow Jones Industrial Average · See more »


E-Trade Financial Corporation (stylized as E*TRADE) is a financial services company organized in Delaware and headquartered in New York City.

New!!: Cybercrime and E-Trade · See more »


eBay Inc. is a multinational e-commerce corporation based in San Jose, California that facilitates consumer-to-consumer and business-to-consumer sales through its website.

New!!: Cybercrime and EBay · See more »


eharmony is an online dating website.

New!!: Cybercrime and EHarmony · See more »


Electrochemistry is the branch of physical chemistry that studies the relationship between electricity, as a measurable and quantitative phenomenon, and identifiable chemical change, with either electricity considered an outcome of a particular chemical change or vice versa.

New!!: Cybercrime and Electrochemistry · See more »


Electronic mail (email or e-mail) is a method of exchanging messages ("mail") between people using electronic devices.

New!!: Cybercrime and Email · See more »

Email spam

Email spam, also known as junk email, is a type of electronic spam where unsolicited messages are sent by email.

New!!: Cybercrime and Email spam · See more »

Email spam legislation by country

The following table represents laws in respective countries which restrict the use of Email spam.

New!!: Cybercrime and Email spam legislation by country · See more »

End-to-end encryption

End-to-end encryption (E2EE) is a system of communication where only the communicating users can read the messages.

New!!: Cybercrime and End-to-end encryption · See more »


Espionage or spying, is the act of obtaining secret or confidential information without the permission of the holder of the information.

New!!: Cybercrime and Espionage · See more »


Estonia (Eesti), officially the Republic of Estonia (Eesti Vabariik), is a sovereign state in Northern Europe.

New!!: Cybercrime and Estonia · See more »

European Union

The European Union (EU) is a political and economic union of EUnum member states that are located primarily in Europe.

New!!: Cybercrime and European Union · See more »


Evidence, broadly construed, is anything presented in support of an assertion.

New!!: Cybercrime and Evidence · See more »


Extortion (also called shakedown, outwrestling and exaction) is a criminal offense of obtaining money, property, or services from an individual or institution, through coercion.

New!!: Cybercrime and Extortion · See more »

Federal Bureau of Investigation

The Federal Bureau of Investigation (FBI), formerly the Bureau of Investigation (BOI), is the domestic intelligence and security service of the United States, and its principal federal law enforcement agency.

New!!: Cybercrime and Federal Bureau of Investigation · See more »

First Amendment to the United States Constitution

The First Amendment (Amendment I) to the United States Constitution prevents Congress from making any law respecting an establishment of religion, prohibiting the free exercise of religion, or abridging the freedom of speech, the freedom of the press, the right to peaceably assemble, or to petition for a governmental redress of grievances.

New!!: Cybercrime and First Amendment to the United States Constitution · See more »

Fortune 1000

Fortune 1000 is a reference to a list maintained by the American business magazine Fortune.

New!!: Cybercrime and Fortune 1000 · See more »


In law, fraud is deliberate deception to secure unfair or unlawful gain, or to deprive a victim of a legal right.

New!!: Cybercrime and Fraud · See more »

Freedom of speech

Freedom of speech is a principle that supports the freedom of an individual or a community to articulate their opinions and ideas without fear of retaliation, censorship, or sanction.

New!!: Cybercrime and Freedom of speech · See more »

Georgia (country)

Georgia (tr) is a country in the Caucasus region of Eurasia.

New!!: Cybercrime and Georgia (country) · See more »

Greenwood Publishing Group

ABC-CLIO/Greenwood is an educational and academic publisher (middle school through university level) which is today part of ABC-CLIO.

New!!: Cybercrime and Greenwood Publishing Group · See more »


Harassment covers a wide range of behaviors of an offensive nature.

New!!: Cybercrime and Harassment · See more »

Identity theft

Identity theft is the deliberate use of someone else's identity, usually as a method to gain a financial advantage or obtain credit and other benefits in the other person's name, and perhaps to the other person's disadvantage or loss.

New!!: Cybercrime and Identity theft · See more »

Illegal drug trade

The illegal drug trade or drug trafficking is a global black market dedicated to the cultivation, manufacture, distribution and sale of drugs that are subject to drug prohibition laws.

New!!: Cybercrime and Illegal drug trade · See more »

Industrial espionage

Industrial espionage, economic espionage, corporate spying or corporate espionage is a form of espionage conducted for commercial purposes instead of purely national security.

New!!: Cybercrime and Industrial espionage · See more »

Information security

Information security, sometimes shortened to InfoSec, is the practice of preventing unauthorized access, use, disclosure, disruption, modification, inspection, recording or destruction of information.

New!!: Cybercrime and Information security · See more »

Information technology

Information technology (IT) is the use of computers to store, retrieve, transmit, and manipulate data, or information, often in the context of a business or other enterprise.

New!!: Cybercrime and Information technology · See more »

Information warfare

Information warfare (IW) is a concept involving the battlespace use and management of information and communication technology (ICT) in pursuit of a competitive advantage over an opponent.

New!!: Cybercrime and Information warfare · See more »

Internet Crime Complaint Center

The mission of the Internet Crime Complaint Center, also known as IC3, is to provide the public with a reliable and convenient reporting mechanism to submit information to the Federal Bureau of Investigation (FBI) concerning suspected Internet-facilitated criminal activity and to develop alliances with law enforcement and industry partners.

New!!: Cybercrime and Internet Crime Complaint Center · See more »

Internet fraud

Internet fraud is a type of fraud which makes use of the Internet.

New!!: Cybercrime and Internet fraud · See more »

Internet homicide

Internet homicide refers to a killing in which victim and perpetrator met online, in some cases having known each other previously only through the Internet.

New!!: Cybercrime and Internet homicide · See more »

Internet police

Internet police is a generic term for police and government agencies, departments and other organizations in charge of policing Internet in a number of countries.

New!!: Cybercrime and Internet police · See more »

Internet pornography

Internet pornography is any pornography that is accessible over the Internet, primarily via websites, peer-to-peer file sharing, or Usenet newsgroups.

New!!: Cybercrime and Internet pornography · See more »

Internet service provider

An Internet service provider (ISP) is an organization that provides services for accessing, using, or participating in the Internet.

New!!: Cybercrime and Internet service provider · See more »

Internet-related prefixes

Internet-related prefixes such as e-, i-, cyber-, info-, techno- and net- are added to a wide range of existing words to describe new, Internet- or computer-related flavors of existing concepts, often electronic products and services that already have a non-electronic counterpart.

New!!: Cybercrime and Internet-related prefixes · See more »

IP address

An Internet Protocol address (IP address) is a numerical label assigned to each device connected to a computer network that uses the Internet Protocol for communication.

New!!: Cybercrime and IP address · See more »

IT law

Information technology law (also called "cyberlaw") concerns the law of information technology, including computing and the internet.

New!!: Cybercrime and IT law · See more »

J. P. Morgan

John Pierpont Morgan Sr. (April 17, 1837 – March 31, 1913) was an American financier and banker who dominated corporate finance and industrial consolidation in the United States of America in the late 19th and early 20th centuries.

New!!: Cybercrime and J. P. Morgan · See more »

Karuppannan Jaishankar

Karuppannan Jaishankar (born 15 June 1973) is an Indian criminologist who teaches at Raksha Shakti University.

New!!: Cybercrime and Karuppannan Jaishankar · See more »

Key derivation function

In cryptography, a key derivation function (KDF) derives one or more secret keys from a secret value such as a master key, a password, or a passphrase using a pseudorandom function.

New!!: Cybercrime and Key derivation function · See more »


LinkedIn is a business and employment-oriented service that operates via websites and mobile apps.

New!!: Cybercrime and LinkedIn · See more »

List of computer criminals

Convicted computer criminals are people who are caught and convicted of computer crimes such as breaking into computers or computer networks.

New!!: Cybercrime and List of computer criminals · See more »

Log file

In computing, a log file is a file that records either events that occur in an operating system or other software runs, or messages between different users of a communication software.

New!!: Cybercrime and Log file · See more »


Michael Calce (born 1986, also known as MafiaBoy) was a high school student from Île Bizard, Quebec, who launched a series of highly publicized denial-of-service attacks in February 2000 against large commercial websites, including Yahoo!, Fifa.com, Amazon.com, Dell, Inc., E*TRADE, eBay, and CNN.

New!!: Cybercrime and MafiaBoy · See more »


Malware (a portmanteau for malicious software) is any software intentionally designed to cause damage to a computer, server or computer network.

New!!: Cybercrime and Malware · See more »

Mass surveillance

Mass surveillance is the intricate surveillance of an entire or a substantial fraction of a population in order to monitor that group of citizens.

New!!: Cybercrime and Mass surveillance · See more »


McAfee, Inc. (formerly known as Intel Security Group from 2014–2017) is an American global computer security software company headquartered in Santa Clara, California and claims to be the world's largest dedicated security technology company.

New!!: Cybercrime and McAfee · See more »

Melissa (computer virus)

The Melissa virus was a mass-mailing macro virus.

New!!: Cybercrime and Melissa (computer virus) · See more »

Member state

A member state is a state that is a member of an international organization or of a federation or confederation.

New!!: Cybercrime and Member state · See more »

Metasploit Project

The Metasploit Project is a computer security project that provides information about security vulnerabilities and aids in penetration testing and IDS signature development.

New!!: Cybercrime and Metasploit Project · See more »


Methodology is the systematic, theoretical analysis of the methods applied to a field of study.

New!!: Cybercrime and Methodology · See more »


Michigan is a state in the Great Lakes and Midwestern regions of the United States.

New!!: Cybercrime and Michigan · See more »

Misha Glenny

Misha Glenny (born 25 April 1958) is a multilingual British journalist, specialising in southeast Europe, global organised crime, and cybersecurity.

New!!: Cybercrime and Misha Glenny · See more »

Mobile phone

A mobile phone, known as a cell phone in North America, is a portable telephone that can make and receive calls over a radio frequency link while the user is moving within a telephone service area.

New!!: Cybercrime and Mobile phone · See more »

Moral hazard

In economics, moral hazard occurs when someone increases their exposure to risk when insured.

New!!: Cybercrime and Moral hazard · See more »

MPack (software)

In computer security, MPack is a PHP-based malware kit produced by Russian crackers.

New!!: Cybercrime and MPack (software) · See more »

National Crime Agency

The National Crime Agency (NCA) is a national law enforcement agency in the United Kingdom.

New!!: Cybercrime and National Crime Agency · See more »

National White Collar Crime Center

The National White Collar Crime Center, also known as NW3C, is a congressionally funded non-profit corporation which trains state and local law enforcement agencies to combat emerging economic and cyber crime problems.

New!!: Cybercrime and National White Collar Crime Center · See more »

New York (state)

New York is a state in the northeastern United States.

New!!: Cybercrime and New York (state) · See more »

New York University Press

New York University Press (or NYU Press) is a university press that is part of New York University.

New!!: Cybercrime and New York University Press · See more »

News Corporation

The original News Corporation or News Corp. was an American multinational mass media corporation headquartered in New York City.

New!!: Cybercrime and News Corporation · See more »


NYNEX Corporation was a telephone company that served five New England states (Maine, Massachusetts, New Hampshire, Rhode Island and Vermont) as well as most of New York state from 1984 through 1997.

New!!: Cybercrime and NYNEX · See more »


An obscenity is any utterance or act that strongly offends the prevalent morality of the time.

New!!: Cybercrime and Obscenity · See more »

Online banking

Online banking, also known as internet banking, it is an electronic payment system that enables customers of a bank or other financial institution to conduct a range of financial transactions through the financial institution's website.

New!!: Cybercrime and Online banking · See more »

Operation Delego

Operation Delego is a major international law enforcement investigation launched in 2009, which dismantled an international pedophile ring that operated an invitation-only Internet site named Dreamboard which featured incentives for images of the violent sexual abuse of young children under twelve, including infants.

New!!: Cybercrime and Operation Delego · See more »

Oxford University Press

Oxford University Press (OUP) is the largest university press in the world, and the second oldest after Cambridge University Press.

New!!: Cybercrime and Oxford University Press · See more »

Pacific Bell

The Pacific Bell Telephone Company (Pacific Bell) is a telephone company that provides telephone service in California.

New!!: Cybercrime and Pacific Bell · See more »


Pedophilia, or paedophilia, is a psychiatric disorder in which an adult or older adolescent experiences a primary or exclusive sexual attraction to prepubescent children.

New!!: Cybercrime and Pedophilia · See more »

Penetration test

A penetration test, colloquially known as a pen test, is an authorized simulated attack on a computer system, performed to evaluate the security of the system.

New!!: Cybercrime and Penetration test · See more »

Personally identifiable information

Personal information, described in United States legal fields as either personally identifiable information (PII), or sensitive personal information (SPI), as used in information security and privacy laws, is information that can be used on its own or with other information to identify, contact, or locate a single person, or to identify an individual in context.

New!!: Cybercrime and Personally identifiable information · See more »


The Philippines (Pilipinas or Filipinas), officially the Republic of the Philippines (Republika ng Pilipinas), is a unitary sovereign and archipelagic country in Southeast Asia.

New!!: Cybercrime and Philippines · See more »


Phishing is the fraudulent attempt to obtain sensitive information such as usernames, passwords, and credit card details (and money), often for malicious reasons, by disguising as a trustworthy entity in an electronic communication.

New!!: Cybercrime and Phishing · See more »

PNC Financial Services

PNC Financial Services Group, Inc. (stylized as PNC) is a bank holding company and financial services corporation based in Pittsburgh.

New!!: Cybercrime and PNC Financial Services · See more »

Police Central e-Crime Unit

The Police Central e-Crime Unit (PCeU) was part of the Specialist Crime Directorate of the Metropolitan Police Service in London, dedicated to combating e-crime in England, Wales and Northern Ireland.

New!!: Cybercrime and Police Central e-Crime Unit · See more »

Prentice Hall

Prentice Hall is a major educational publisher owned by Pearson plc.

New!!: Cybercrime and Prentice Hall · See more »


Privacy is the ability of an individual or group to seclude themselves, or information about themselves, and thereby express themselves selectively.

New!!: Cybercrime and Privacy · See more »

Protected computer

Protected computers is a term used in Title 18, Section 1030 of the United States Code, (the Computer Fraud and Abuse Act) which prohibits a number of different kinds of conduct, generally involving unauthorized access to, or damage to the data stored on, "protected computers".

New!!: Cybercrime and Protected computer · See more »


Psychology is the science of behavior and mind, including conscious and unconscious phenomena, as well as feeling and thought.

New!!: Cybercrime and Psychology · See more »


Ransomware is a type of malicious software from cryptovirology that threatens to publish the victim's data or perpetually block access to it unless a ransom is paid.

New!!: Cybercrime and Ransomware · See more »

Recreational drug use

Recreational drug use is the use of a psychoactive drug to induce an altered state of consciousness for pleasure, by modifying the perceptions, feelings, and emotions of the user.

New!!: Cybercrime and Recreational drug use · See more »

Revenge porn

Revenge porn or revenge pornography is the distribution of sexually explicit images or video of individuals without their consent.

New!!: Cybercrime and Revenge porn · See more »

Russian Business Network

The Russian Business Network (commonly abbreviated as RBN) is a multi-faceted cybercrime organization, specializing in and in some cases monopolizing personal identity theft for resale.

New!!: Cybercrime and Russian Business Network · See more »

S&P 500 Index

The Standard & Poor's 500, often abbreviated as the S&P 500, or just the S&P, is an American stock market index based on the market capitalizations of 500 large companies having common stock listed on the NYSE or NASDAQ.

New!!: Cybercrime and S&P 500 Index · See more »

Security hacker

A security hacker is someone who seeks to breach defenses and exploit weaknesses in a computer system or network.

New!!: Cybercrime and Security hacker · See more »


Sextortion is a form of sexual exploitation that employs non-physical forms of coercion to extort sexual favors from the victim.

New!!: Cybercrime and Sextortion · See more »

Silk Road (marketplace)

Silk Road was an online black market and the first modern darknet market, best known as a platform for selling illegal drugs.

New!!: Cybercrime and Silk Road (marketplace) · See more »

Sky UK

Sky UK (formerly British Sky Broadcasting Limited, BSkyB and Sky) is a telecommunications company which serves the United Kingdom.

New!!: Cybercrime and Sky UK · See more »

Social engineering (security)

Social engineering, in the context of information security, refers to psychological manipulation of people into performing actions or divulging confidential information.

New!!: Cybercrime and Social engineering (security) · See more »

Software as a service

Software as a service (SaaS) is a software licensing and delivery model in which software is licensed on a subscription basis and is centrally hosted.

New!!: Cybercrime and Software as a service · See more »

Sony Pictures hack

On November 24, 2014, a hacker group which identified itself by the name "Guardians of Peace" (GOP) leaked a release of confidential data from the film studio Sony Pictures.

New!!: Cybercrime and Sony Pictures hack · See more »

South Carolina

South Carolina is a U.S. state in the southeastern region of the United States.

New!!: Cybercrime and South Carolina · See more »

Southwestern Bell

Southwestern Bell Telephone Company is a wholly owned subsidiary of AT&T.

New!!: Cybercrime and Southwestern Bell · See more »

Stanford University

Stanford University (officially Leland Stanford Junior University, colloquially the Farm) is a private research university in Stanford, California.

New!!: Cybercrime and Stanford University · See more »

Storm botnet

The Storm botnet or Storm worm botnet (also known as Dorf botnet and Ecard malware) is a remotely controlled network of "zombie" computers (or "botnet") that have been linked by the Storm Worm, a Trojan horse spread through e-mail spam.

New!!: Cybercrime and Storm botnet · See more »

Suicide pact

A suicide pact is an agreed plan between two or more individuals to commit suicide.

New!!: Cybercrime and Suicide pact · See more »

Supreme Court of the United States

The Supreme Court of the United States (sometimes colloquially referred to by the acronym SCOTUS) is the highest federal court of the United States.

New!!: Cybercrime and Supreme Court of the United States · See more »


A techno-thriller (also known as technothrillers) is a hybrid genre drawing from science fiction, thrillers, spy fiction, action, and war novels.

New!!: Cybercrime and Techno-thriller · See more »


The terabyte is a multiple of the unit byte for digital information.

New!!: Cybercrime and Terabyte · See more »


In common usage, theft is the taking of another person's property or services without that person's permission or consent with the intent to deprive the rightful owner of it.

New!!: Cybercrime and Theft · See more »

Trespass to chattels

Trespass to chattels is a tort whereby the infringing party has intentionally (or, in Australia, negligently) interfered with another person's lawful possession of a chattel (movable personal property).

New!!: Cybercrime and Trespass to chattels · See more »

U.S. Bancorp

U.S. Bancorp (stylized as us bancorp) is a bank holding company based in Minneapolis, Minnesota.

New!!: Cybercrime and U.S. Bancorp · See more »

U.S. Immigration and Customs Enforcement

U.S. Immigration and Customs Enforcement (ICE) is a law enforcement agency of the Federal government of the United States under the jurisdiction of the Department of Homeland Security (DHS).

New!!: Cybercrime and U.S. Immigration and Customs Enforcement · See more »

Union Dime Savings Bank

Union Dime Savings Bank was originally chartered in 1859 in New York City, USA.

New!!: Cybercrime and Union Dime Savings Bank · See more »

United States

The United States of America (USA), commonly known as the United States (U.S.) or America, is a federal republic composed of 50 states, a federal district, five major self-governing territories, and various possessions.

New!!: Cybercrime and United States · See more »

United States Department of Defense

The Department of Defense (DoD, USDOD, or DOD) is an executive branch department of the federal government of the United States charged with coordinating and supervising all agencies and functions of the government concerned directly with national security and the United States Armed Forces.

New!!: Cybercrime and United States Department of Defense · See more »

United States Department of Homeland Security

The United States Department of Homeland Security (DHS) is a cabinet department of the United States federal government with responsibilities in public security, roughly comparable to the interior or home ministries of other countries.

New!!: Cybercrime and United States Department of Homeland Security · See more »

United States Department of Justice

The United States Department of Justice (DOJ), also known as the Justice Department, is a federal executive department of the U.S. government, responsible for the enforcement of the law and administration of justice in the United States, equivalent to the justice or interior ministries of other countries. The department was formed in 1870 during the Ulysses S. Grant administration. The Department of Justice administers several federal law enforcement agencies including the Federal Bureau of Investigation (FBI), and the Drug Enforcement Administration (DEA). The department is responsible for investigating instances of financial fraud, representing the United States government in legal matters (such as in cases before the Supreme Court), and running the federal prison system. The department is also responsible for reviewing the conduct of local law enforcement as directed by the Violent Crime Control and Law Enforcement Act of 1994. The department is headed by the United States Attorney General, who is nominated by the President and confirmed by the Senate and is a member of the Cabinet. The current Attorney General is Jeff Sessions.

New!!: Cybercrime and United States Department of Justice · See more »

United States Federal Sentencing Guidelines

The Federal Sentencing Guidelines are rules that set out a uniform sentencing policy for individuals and organizations convicted of felonies and serious (Class A) misdemeanors in the United States federal courts system.

New!!: Cybercrime and United States Federal Sentencing Guidelines · See more »

United States Secret Service

The United States Secret Service (also USSS or Secret Service) is a federal law enforcement agency under the U.S. Department of Homeland Security, charged with conducting criminal investigations and protecting the nation's leaders.

New!!: Cybercrime and United States Secret Service · See more »

United States v. Kramer

United States v. Neil Scott Kramer, 631 F.3d 900 (8th Cir. 2011), is a court case where a cellphone was used to coerce a minor into engaging in sex with an adult.

New!!: Cybercrime and United States v. Kramer · See more »


Verisign, Inc. is an American company based in Reston, Virginia, United States that operates a diverse array of network infrastructure, including two of the Internet's thirteen root nameservers, the authoritative registry for the,, and generic top-level domains and the and country-code top-level domains, and the back-end systems for the,, and top-level domains.

New!!: Cybercrime and Verisign · See more »


Virginia (officially the Commonwealth of Virginia) is a state in the Southeastern and Mid-Atlantic regions of the United States located between the Atlantic Coast and the Appalachian Mountains.

New!!: Cybercrime and Virginia · See more »

WannaCry ransomware attack

The WannaCry ransomware attack was a May 2017 worldwide cyberattack by the WannaCry ransomware cryptoworm, which targeted computers running the Microsoft Windows operating system by encrypting data and demanding ransom payments in the Bitcoin cryptocurrency.

New!!: Cybercrime and WannaCry ransomware attack · See more »

Wells Fargo

Wells Fargo & Company is an American multinational financial services company headquartered in San Francisco, California, with central offices throughout the country.

New!!: Cybercrime and Wells Fargo · See more »

White-collar crime

White-collar crime refers to financially motivated, nonviolent crime committed by business and government professionals.

New!!: Cybercrime and White-collar crime · See more »


Yahoo! is a web services provider headquartered in Sunnyvale, California and wholly owned by Verizon Communications through Oath Inc..

New!!: Cybercrime and Yahoo! · See more »


Zappos.com is an online shoe and clothing shop based in Las Vegas, Nevada.

New!!: Cybercrime and Zappos · See more »

Zombie (computer science)

In computer science, a zombie is a computer connected to the Internet that has been compromised by a hacker, computer virus or trojan horse program and can be used to perform malicious tasks of one sort or another under remote direction.

New!!: Cybercrime and Zombie (computer science) · See more »

Redirects here:

Attacking users, Attacks against information systems, Computer Crime, Computer Crimes, Computer abuse, Computer crime, Computer crime legislation, Computer criminal, Computer criminology, Computer-related crime, Crime that involves a computer, Cyber Crime, Cyber Criminology, Cyber crime, Cyber crimes, Cyber criminal, Cyber criminals, Cyber fraud, Cyber harassment, Cyber-crime, CyberCrime, Cybercrimes, Cybercriminal, Cyberextortion, Cyberharassment, E-crime, Electronic breaking and entering, Electronic crime, Harassment by computer, High tech crime, Internet crime, Internet crimes, Online crime, Online drug trafficking, Policing cybercrime.


[1] https://en.wikipedia.org/wiki/Cybercrime

Hey! We are on Facebook now! »