FDLE Home / FDLE Cybercrime Office > Common Cybercrime Complaints

Common Cybercrime Complaints


Cybercrime can take many forms. It is an expanding criminal activity, with new methods developing every day. Listed below are some of the more common complaints affecting computer and technology users today. Each complaint topic includes a brief description, and a link to a more detailed explanation of that topic.
 

Cyberbullying


Cyberbullying (also called “cyberstalking”) is the use of a computer, email, phone, tablet, or other electronic communication devices to harass or cause undue emotional stress to another person. For a more detailed explanation, please refer to our Cyberbullying page at SecureFlorida.org.


Internet Fraud


The Internet provides an easy medium for criminals to obtain money by deceiving people. This is often done in a way that may intimidate or threaten the person receiving the fraudulent communications. For example, in an attempt to scam the recipient criminals have been known to send text messages regarding an unpaid toll fee. Also, a criminal may impersonate a legitimate business advertising a false product for sale in a deal that feels “too good to be true.” The tactics used in these Internet frauds and scams change constantly. For more information on Internet frauds and scams, please visit our Common Scams page at SecureFlorida.org.
 
 

Social Engineering


Social engineering is a tactic that relies on manipulating people rather than gaining access to online systems without authorization. It often involves gaining trust or creating urgency to trick the victim into sharing sensitive information online. Types of social engineering can include the following:
 
  • Phishing is an email scam where a criminal sends an email that appears legitimate in an attempt to gather personally identifiable information or other sensitive information from recipients.

  • Vishing is a phone call scam where criminals attempt to extract sensitive information by impersonating a legitimate organization requesting information over a phone call or through voicemail.

  • Smishing is a text/SMS message scam where criminals send fake scenarios over text messages that attempt to manipulate the recipient into sending sensitive information.

  • Spear phishing is a type of email scam that targets a specific person or group, often with information known to be of interest to the target.
Staying aware and cautious is key to protecting yourself and your organization. Please visit our Social Engineering Page at SecureFlorida.org for more information.  
 

Identity Theft


Criminals can get the information they need to assume your identity from a variety of sources, such as the theft of your wallet or purse, your trash, the Internet, or from credit card or bank information. They may even approach you directly in person, by telephone, or in an Internet chat room and ask you for the information. To learn more about Identity Theft and ways you can help lessen the risks involved, please see our Identity Theft page at SecureFlorida.org.
 

Malware


Malicious software, or "malware" (including viruses, worms, and Trojan Horses), has become an increasing threat to both business, government, and home users. Malware is used as a tool by hackers to remotely access computers as well as corrupt or destroy important data. For more information on the most common types of malware, please visit our Malware page on SecureFlorida.org.
 

Mobile Devices: Apps, Privacy, Theft


Implementing secure app permissions, data privacy practices, and device theft compensations are imperative to ensure your personal information stays secure on your mobile device or smartphone. Taking control of your data by managing what you share and who can see it is key to maintaining your privacy. By using strong passwords on mobile application accounts, you can help keep your information safe and help protect your data in the event your device is lost or stolen. These simple steps go a long way in keeping your personal information secure on your mobile device. For more information on apps, privacy, theft, please visit our Apps, Privacy, Theft Page at SecureFlorida.org.
 

Business Email Compromise (BEC)


Business Email Compromise (BEC) scams attempt to financially exploit businesses by targeting employees through phishing emails. Examples of BEC include spoofing business email accounts or websites, sending spear phishing emails, and leveraging social engineering to convince an employee to download malware or transmit unauthorized payments. The compromise of an employee’s account can lead to network intrusion or financial exploitation. Please visit our Business Email Compromise Page at SecureFlorida.org for more information.
 

Best Practices


To stay safe online, it helps to follow a few simple but effective habits. To ensure online accounts stay secure, users should create strong, unique passwords for each of their accounts and change passwords often, especially to critical accounts like banking and health records. Always enable two-factor authentication (2FA) for additional protection. Online users should be careful when clicking on links or opening attachments from unknown sources, as they could be attempts to steal your information. Additionally, devices should be kept up to date by installing the newest updates offered by the device or software manufacturer. Users should exercise caution when connecting to public Wi-Fi networks and consider utilizing a Virtual Private Network (VPN). By staying aware and cautious, users can protect themselves from common online threats. For more information on best practices, please visit our Best Practices Page at SecureFlorida.org.

Florida Department of Law Enforcement Priorities

FDLE is composed of five areas: Executive Direction and Business Support, Criminal Investigations and Forensic Science, Criminal Justice Information, Criminal Justice Professionalism and Florida Capitol Police. FDLE’s duties, responsibilities and procedures are mandated through Chapter 943, FS, and Chapter 11, FAC. To learn more about these areas, read our Statement of Agency Organization and Operation or visit our Open Government page.