{"id":233,"date":"2020-08-13T10:20:17","date_gmt":"2020-08-13T10:20:17","guid":{"rendered":"http:\/\/gocstg2020.govmu.org\/maucors\/?page_id=233"},"modified":"2021-03-02T09:38:38","modified_gmt":"2021-03-02T09:38:38","slug":"cybercrimes","status":"publish","type":"page","link":"https:\/\/maucors.govmu.org\/maucors\/?page_id=233","title":{"rendered":"Cybercrimes"},"content":{"rendered":"<p>[vc_row][vc_column width=&#8221;1\/2&#8243; css=&#8221;.vc_custom_1614677900115{padding-top: 60px !important;}&#8221;][vc_column_text css_animation=&#8221;slideInLeft&#8221;]<\/p>\n<h3 style=\"text-align: center;\"><strong>Cybercrime on Social Media<\/strong><\/h3>\n<p>[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/2&#8243;][vc_single_image image=&#8221;590&#8243; img_size=&#8221;580&#215;250&#8243; style=&#8221;vc_box_shadow_border&#8221; onclick=&#8221;zoom&#8221; css_animation=&#8221;right-to-left&#8221;][\/vc_column][\/vc_row][vc_row][vc_column css=&#8221;.vc_custom_1614677846406{padding-top: 15px !important;}&#8221;][vc_column_text]Social Media is an inherent part of today\u2019s Internet and is being used by more than a billion people worldwide. As this widely used platform becomes an integral part of our daily lives and due to its anonymity, cybercriminals find it an attractive vehicle to conduct illegal online activities. Social media is a rich repository of valuable personal data which can be easily exploited by cybercriminals.[\/vc_column_text][\/vc_column][\/vc_row][vc_row][vc_column][vc_column_text css_animation=&#8221;right-to-left&#8221;]<\/p>\n<h3><\/h3>\n<h3>Common Types of Cybercrimes on Social Media<\/h3>\n<p>&nbsp;[\/vc_column_text][\/vc_column][\/vc_row][vc_row][vc_column width=&#8221;1\/5&#8243;][vc_hoverbox image=&#8221;611&#8243; primary_title=&#8221;Online Harassment&#8221; primary_title_font_container=&#8221;font_size:35|color:%23ffffff&#8221; primary_title_google_fonts=&#8221;font_family:Roboto%20Condensed%3A300%2C300italic%2Cregular%2Citalic%2C700%2C700italic|font_style:400%20regular%3A400%3Anormal&#8221; hover_title=&#8221;Online Harassment&#8221; hover_title_font_container=&#8221;font_size:35|color:%23353535&#8243; hover_title_google_fonts=&#8221;font_family:Roboto%20Condensed%3A300%2C300italic%2Cregular%2Citalic%2C700%2C700italic|font_style:700%20bold%20regular%3A700%3Anormal&#8221; hover_background_color=&#8221;chino&#8221; use_custom_fonts_primary_title=&#8221;true&#8221; use_custom_fonts_hover_title=&#8221;true&#8221;]<\/p>\n<p style=\"color: white;\">Online harassment usually relates to threatening or harassing messages sent to the victim.<\/p>\n<p>[\/vc_hoverbox][\/vc_column][vc_column width=&#8221;1\/5&#8243;][vc_hoverbox image=&#8221;674&#8243; primary_title=&#8221;Hacking&#8221; primary_title_font_container=&#8221;font_size:35|color:%23ffffff&#8221; primary_title_google_fonts=&#8221;font_family:Roboto%20Condensed%3A300%2C300italic%2Cregular%2Citalic%2C700%2C700italic|font_style:400%20regular%3A400%3Anormal&#8221; hover_title=&#8221;Hacking&#8221; hover_title_font_container=&#8221;font_size:35|color:%23353535&#8243; hover_title_google_fonts=&#8221;font_family:Roboto%20Condensed%3A300%2C300italic%2Cregular%2Citalic%2C700%2C700italic|font_style:700%20bold%20regular%3A700%3Anormal&#8221; hover_background_color=&#8221;sky&#8221; use_custom_fonts_primary_title=&#8221;true&#8221; use_custom_fonts_hover_title=&#8221;true&#8221;]<\/p>\n<p style=\"color:white\">Hacking occurs when a hacker gets unauthorised access to a social media account.<\/p>\n<p>[\/vc_hoverbox][\/vc_column][vc_column width=&#8221;1\/5&#8243;][vc_hoverbox image=&#8221;667&#8243; primary_title=&#8221;Offensive or Illegal Content&#8221; primary_title_font_container=&#8221;font_size:35|color:%23ffffff&#8221; primary_title_google_fonts=&#8221;font_family:Roboto%20Condensed%3A300%2C300italic%2Cregular%2Citalic%2C700%2C700italic|font_style:400%20regular%3A400%3Anormal&#8221; hover_title=&#8221;Offensive or Illegal Content&#8221; hover_title_font_container=&#8221;font_size:35|color:%23353535&#8243; hover_title_google_fonts=&#8221;font_family:Roboto%20Condensed%3A300%2C300italic%2Cregular%2Citalic%2C700%2C700italic|font_style:700%20bold%20regular%3A700%3Anormal&#8221; hover_background_color=&#8221;green&#8221; use_custom_fonts_primary_title=&#8221;true&#8221; use_custom_fonts_hover_title=&#8221;true&#8221;]<\/p>\n<p style=\"color: white;\">Contents that are offensive and illegal are posted for a variety of reasons.<\/p>\n<p>[\/vc_hoverbox][\/vc_column][vc_column width=&#8221;1\/5&#8243;][vc_hoverbox image=&#8221;660&#8243; primary_title=&#8221;Sextortion&#8221; primary_title_font_container=&#8221;font_size:35|color:%23ffffff&#8221; primary_title_google_fonts=&#8221;font_family:Roboto%20Condensed%3A300%2C300italic%2Cregular%2Citalic%2C700%2C700italic|font_style:400%20regular%3A400%3Anormal&#8221; hover_title=&#8221;Sextortion&#8221; hover_title_font_container=&#8221;font_size:35|color:%23353535&#8243; hover_title_google_fonts=&#8221;font_family:Roboto%20Condensed%3A300%2C300italic%2Cregular%2Citalic%2C700%2C700italic|font_style:700%20bold%20regular%3A700%3Anormal&#8221; hover_background_color=&#8221;peacoc&#8221; use_custom_fonts_primary_title=&#8221;true&#8221; use_custom_fonts_hover_title=&#8221;true&#8221;]<\/p>\n<p style=\"color:white\">Sextortion is a criminal act and a form of blackmail in which sexual information or images are used to extort money from the victim<\/p>\n<p>[\/vc_hoverbox][\/vc_column][vc_column width=&#8221;1\/5&#8243;][vc_hoverbox image=&#8221;653&#8243; primary_title=&#8221;Identity Theft&#8221; primary_title_font_container=&#8221;font_size:35|color:%23ffffff&#8221; primary_title_google_fonts=&#8221;font_family:Roboto%20Condensed%3A300%2C300italic%2Cregular%2Citalic%2C700%2C700italic|font_style:400%20regular%3A400%3Anormal&#8221; hover_title=&#8221;Identity Theft&#8221; hover_title_font_container=&#8221;font_size:35|color:%23353535&#8243; hover_title_google_fonts=&#8221;font_family:Roboto%20Condensed%3A300%2C300italic%2Cregular%2Citalic%2C700%2C700italic|font_style:700%20bold%20regular%3A700%3Anormal&#8221; hover_background_color=&#8221;turquoise&#8221; use_custom_fonts_primary_title=&#8221;true&#8221; use_custom_fonts_hover_title=&#8221;true&#8221;]<\/p>\n<p style=\"color:white\">Identity theft occurs when a person make use of someone else personally identifying information<\/p>\n<p>[\/vc_hoverbox][\/vc_column][\/vc_row][vc_row][vc_column][vc_column_text]&nbsp;<\/p>\n<p>&nbsp;[\/vc_column_text][\/vc_column][\/vc_row][vc_row][vc_column width=&#8221;1\/5&#8243;][vc_hoverbox image=&#8221;646&#8243; primary_title=&#8221;Cyberbullying&#8221; primary_title_font_container=&#8221;font_size:35|color:%23ffffff&#8221; primary_title_google_fonts=&#8221;font_family:Roboto%20Condensed%3A300%2C300italic%2Cregular%2Citalic%2C700%2C700italic|font_style:400%20regular%3A400%3Anormal&#8221; hover_title=&#8221;Cyberbullying&#8221; hover_title_font_container=&#8221;font_size:35|color:%23353535&#8243; hover_title_google_fonts=&#8221;font_family:Roboto%20Condensed%3A300%2C300italic%2Cregular%2Citalic%2C700%2C700italic|font_style:700%20bold%20regular%3A700%3Anormal&#8221; hover_background_color=&#8221;orange&#8221; use_custom_fonts_primary_title=&#8221;true&#8221; use_custom_fonts_hover_title=&#8221;true&#8221;]<\/p>\n<p style=\"color:white\">Cyberbullying is bullying that takes place using technology and communication tools such as social media<\/p>\n<p>[\/vc_hoverbox][\/vc_column][vc_column width=&#8221;1\/5&#8243;][vc_hoverbox image=&#8221;639&#8243; primary_title=&#8221;Cyber Stalking&#8221; primary_title_font_container=&#8221;font_size:35|color:%23ffffff&#8221; primary_title_google_fonts=&#8221;font_family:Roboto%20Condensed%3A300%2C300italic%2Cregular%2Citalic%2C700%2C700italic|font_style:400%20regular%3A400%3Anormal&#8221; hover_title=&#8221;Cyber Stalking&#8221; hover_title_font_container=&#8221;font_size:35|color:%23353535&#8243; hover_title_google_fonts=&#8221;font_family:Roboto%20Condensed%3A300%2C300italic%2Cregular%2Citalic%2C700%2C700italic|font_style:700%20bold%20regular%3A700%3Anormal&#8221; hover_background_color=&#8221;purple&#8221; use_custom_fonts_primary_title=&#8221;true&#8221; use_custom_fonts_hover_title=&#8221;true&#8221;]<\/p>\n<p style=\"color:white\">Cyber stalking is a form of online harassment in which the perpetrator uses electronic communications<\/p>\n<p>[\/vc_hoverbox][\/vc_column][vc_column width=&#8221;1\/5&#8243;][vc_hoverbox image=&#8221;632&#8243; primary_title=&#8221;Online Scams and Frauds&#8221; primary_title_font_container=&#8221;font_size:35|color:%23ffffff&#8221; primary_title_google_fonts=&#8221;font_family:Roboto%20Condensed%3A300%2C300italic%2Cregular%2Citalic%2C700%2C700italic|font_style:400%20regular%3A400%3Anormal&#8221; hover_title=&#8221;Online Scams and Frauds&#8221; hover_title_font_container=&#8221;font_size:35|color:%23353535&#8243; hover_title_google_fonts=&#8221;font_family:Roboto%20Condensed%3A300%2C300italic%2Cregular%2Citalic%2C700%2C700italic|font_style:700%20bold%20regular%3A700%3Anormal&#8221; hover_background_color=&#8221;sandy-brown&#8221; use_custom_fonts_primary_title=&#8221;true&#8221; use_custom_fonts_hover_title=&#8221;true&#8221;]<\/p>\n<p style=\"color:white\">Cybercriminals are using big social media platforms like Facebook to target more victims at one time.<\/p>\n<p>[\/vc_hoverbox][\/vc_column][vc_column width=&#8221;1\/5&#8243;][vc_hoverbox image=&#8221;625&#8243; primary_title=&#8221;Phishing&#8221; primary_title_font_container=&#8221;font_size:35|color:%23ffffff&#8221; primary_title_google_fonts=&#8221;font_family:Roboto%20Condensed%3A300%2C300italic%2Cregular%2Citalic%2C700%2C700italic|font_style:400%20regular%3A400%3Anormal&#8221; hover_title=&#8221;Phishing&#8221; hover_title_font_container=&#8221;font_size:35|color:%23353535&#8243; hover_title_google_fonts=&#8221;font_family:Roboto%20Condensed%3A300%2C300italic%2Cregular%2Citalic%2C700%2C700italic|font_style:700%20bold%20regular%3A700%3Anormal&#8221; hover_background_color=&#8221;blue&#8221; use_custom_fonts_primary_title=&#8221;true&#8221; use_custom_fonts_hover_title=&#8221;true&#8221;]<\/p>\n<p style=\"color:white\">Phishing is an attempt to trick a victim and steal personal information such as login credentials<\/p>\n<p>[\/vc_hoverbox][\/vc_column][vc_column width=&#8221;1\/5&#8243;][vc_hoverbox image=&#8221;618&#8243; primary_title=&#8221;Malware&#8221; primary_title_font_container=&#8221;font_size:35|color:%23ffffff&#8221; primary_title_google_fonts=&#8221;font_family:Roboto%20Condensed%3A300%2C300italic%2Cregular%2Citalic%2C700%2C700italic|font_style:400%20regular%3A400%3Anormal&#8221; hover_title=&#8221;Malware&#8221; hover_title_font_container=&#8221;font_size:35|color:%23353535&#8243; hover_title_google_fonts=&#8221;font_family:Roboto%20Condensed%3A300%2C300italic%2Cregular%2Citalic%2C700%2C700italic|font_style:700%20bold%20regular%3A700%3Anormal&#8221; hover_background_color=&#8221;custom&#8221; use_custom_fonts_primary_title=&#8221;true&#8221; use_custom_fonts_hover_title=&#8221;true&#8221; hover_custom_background=&#8221;#ead300&#8243;]<\/p>\n<p style=\"color:white\">Cybercriminals use a variety of methods to spread malicious software on social networks.<\/p>\n<p>[\/vc_hoverbox][\/vc_column][\/vc_row][vc_row][vc_column][\/vc_column][\/vc_row]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>[vc_row][vc_column width=&#8221;1\/2&#8243; css=&#8221;.vc_custom_1614677900115{padding-top: 60px !important;}&#8221;][vc_column_text css_animation=&#8221;slideInLeft&#8221;] Cybercrime on Social Media [\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/2&#8243;][vc_single_image image=&#8221;590&#8243; img_size=&#8221;580&#215;250&#8243; style=&#8221;vc_box_shadow_border&#8221; onclick=&#8221;zoom&#8221; css_animation=&#8221;right-to-left&#8221;][\/vc_column][\/vc_row][vc_row][vc_column css=&#8221;.vc_custom_1614677846406{padding-top: 15px !important;}&#8221;][vc_column_text]Social Media is an inherent part of today\u2019s Internet and is being used by more than a billion people worldwide. As this widely used platform becomes an integral part of our daily lives and due to [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-233","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/maucors.govmu.org\/maucors\/index.php?rest_route=\/wp\/v2\/pages\/233","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/maucors.govmu.org\/maucors\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/maucors.govmu.org\/maucors\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/maucors.govmu.org\/maucors\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/maucors.govmu.org\/maucors\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=233"}],"version-history":[{"count":21,"href":"https:\/\/maucors.govmu.org\/maucors\/index.php?rest_route=\/wp\/v2\/pages\/233\/revisions"}],"predecessor-version":[{"id":1593,"href":"https:\/\/maucors.govmu.org\/maucors\/index.php?rest_route=\/wp\/v2\/pages\/233\/revisions\/1593"}],"wp:attachment":[{"href":"https:\/\/maucors.govmu.org\/maucors\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=233"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}