11

Cyber technology impacts interactions between victims and offenders by putting pressure on the offender to not mess up and get caught or revealed. Nowadays, computers, laptops, phones, and any other electronic device that connects to wifi are equipped with built-in protection VPN and software. Health, education, business, and finance all work through technology. That is why crimes are shifting from theft, harassment,and even fraud are now commonly found throughout the web. Cases happen every day and hackers are trying any and every way to figure it out and perpetuate someone’s system. If alerted someone could report the offender even if someone is not sure about the safety of their information it is better to be safe than sorry. Offenders have multiple ways to try and steal information but it is the victim’s awareness that is most important. Some tactics they try and use are phishing, malware, malicious apps, smishing, and insecure networks. Phishing is fake emails trying to be legitimate to steal account details, passwords, and even see if someone will send money. It is commonly used for older individuals because of their lack of awareness. Malware consists of stealing or deleting data and tracking activities, by clicking unknown websites and URLs can lead to a virus because the sites were not protected. Smishing is common to phishing tactics but smishing is done through text messages such as SMS. Insecure networks are the most common way a hacker will try and breach the networks. Companies suggest consumers be careful on what website to choose from and avoid using certain websites. Firewalls, strong passwords, keeping technology up to date, and taking the safety steps to maintain safety. If someone feels they are being hacked they should take all precautions regardless of the time, place, or reasoning behind it. Being aware helps stop the hack, give hackers second thoughts, or even catching the hacker. All options have a chance at prot.cting someone’s information.

Leave a Reply

Your email address will not be published. Required fields are marked *