Common Cybercrime Complaints
Cybercrime can take many forms. It is an expanding criminal activity, with new methods developing every day. Listed below are some of the more common complaints affecting computer and technology users today. Each complaint topic includes a brief description, and a link to a more detailed explanation of that topic.
Cyberbullying
Cyberbullying (also called “cyberstalking”) is the use of a computer, email, phone, tablet, or other electronic communication devices to harass or cause undue emotional stress to another person. For a more detailed explanation, please refer to our
Cyberbullying page at SecureFlorida.org.
Internet Fraud
The Internet provides an easy medium for criminals to obtain money by deceiving people. This is often done in a way that may intimidate or threaten the person receiving the fraudulent communications. For example, in an attempt to scam the recipient criminals have been known to send text messages regarding an unpaid toll fee. Also, a criminal may impersonate a legitimate business advertising a false product for sale in a deal that feels “too good to be true.” The tactics used in these Internet frauds and scams change constantly. For more information on Internet frauds and scams, please visit our
Common Scams page at SecureFlorida.org.
Social Engineering
Social engineering is a tactic that relies on manipulating people rather than gaining access to online systems without authorization. It often involves gaining trust or creating urgency to trick the victim into sharing sensitive information online. Types of social engineering can include the following:
- Phishing is an email scam where a criminal sends an email that appears legitimate in an attempt to gather personally identifiable information or other sensitive information from recipients.
- Vishing is a phone call scam where criminals attempt to extract sensitive information by impersonating a legitimate organization requesting information over a phone call or through voicemail.
- Smishing is a text/SMS message scam where criminals send fake scenarios over text messages that attempt to manipulate the recipient into sending sensitive information.
- Spear phishing is a type of email scam that targets a specific person or group, often with information known to be of interest to the target.
Staying aware and cautious is key to protecting yourself and your organization. Please visit our
Social Engineering Page at SecureFlorida.org for more information.
Identity Theft
Criminals can get the information they need to assume your identity from a variety of sources, such as the theft of your wallet or purse, your trash, the Internet, or from credit card or bank information. They may even approach you directly in person, by telephone, or in an Internet chat room and ask you for the information. To learn more about Identity Theft and ways you can help lessen the risks involved, please see our
Identity Theft page at SecureFlorida.org.
Malware
Malicious software, or "malware" (including viruses, worms, and Trojan Horses), has become an increasing threat to both business, government, and home users. Malware is used as a tool by hackers to remotely access computers as well as corrupt or destroy important data. For more information on the most common types of malware, please visit our
Malware page on SecureFlorida.org.
Mobile Devices: Apps, Privacy, Theft
Implementing secure app permissions, data privacy practices, and device theft compensations are imperative to ensure your personal information stays secure on your mobile device or smartphone. Taking control of your data by managing what you share and who can see it is key to maintaining your privacy. By using strong passwords on mobile application accounts, you can help keep your information safe and help protect your data in the event your device is lost or stolen. These simple steps go a long way in keeping your personal information secure on your mobile device. For more information on apps, privacy, theft, please visit our
Apps, Privacy, Theft Page at SecureFlorida.org.
Business Email Compromise (BEC)
Business Email Compromise (BEC) scams attempt to financially exploit businesses by targeting employees through phishing emails. Examples of BEC include spoofing business email accounts or websites, sending spear phishing emails, and leveraging social engineering to convince an employee to download malware or transmit unauthorized payments. The compromise of an employee’s account can lead to network intrusion or financial exploitation. Please visit our
Business Email Compromise Page at SecureFlorida.org for more information.
Best Practices
To stay safe online, it helps to follow a few simple but effective habits. To ensure online accounts stay secure, users should create strong, unique passwords for each of their accounts and change passwords often, especially to critical accounts like banking and health records. Always enable two-factor authentication (2FA) for additional protection. Online users should be careful when clicking on links or opening attachments from unknown sources, as they could be attempts to steal your information. Additionally, devices should be kept up to date by installing the newest updates offered by the device or software manufacturer. Users should exercise caution when connecting to public Wi-Fi networks and consider utilizing a Virtual Private Network (VPN). By staying aware and cautious, users can protect themselves from common online threats. For more information on best practices, please visit our
Best Practices Page at SecureFlorida.org.