Cyber Crimes Explained

Cyber Crimes Explained

Spread the love

Modern day technology advancements have added new dimensions to our lives, making us the most fortunate set of people who have lived on earth with such luxuries at their hand! But it’s not entirely a rosy picture; it has got some shades of grey too! Today, we live in a digital age, where development is the new constant! The sad part is that this development is leaving behind a residue which we know as cybercrime. There is lack of education and awareness related to how one should use the digital gadgets safely and what precautions one should take to avoid being a victim of cybercrime. Awareness related to cybercrimes is very low and this lack of knowledge is causing a lot of problems. Let’s have a closer look at the cyber world through this article.    

The Internet is the invention that has turned the planet into a global village and digital gadgets have played a pivotal role in bridging this gap! Smartphones, laptops & tablets are the gadgets that are termed as digital devices. These days most people access the internet through these smart and handy gadgets. Cybercriminals too have shifted their modus operandi and have started targeting these handy gadgets more often instead of the personal computers! These devices due to their ability to access the internet and store your personal information are more prone to cyber-attacks. Smartphones and laptops are highly portable and people carry them 24*7 with them, they even save all the crucial information (banking details, personal photographs) in these devices. All the sensitive information is stored on these devices, what makes them more vulnerable is free public Wi-Fi and hotspot! People access free networks and gets trapped by hackers, spammers, and tech geeks!

We know cybercrime with terms like hacking, ransomware, identity theft, spamming, and more, but the question is are we aware of these terms? Here in this article let’s try to understand what exactly these terms mean and how dangerous they can be to your personal information.


Hacking is an intrusion attempt to access your personal information. Many organizations work with hackers to ensure the safety of their website as a defensive strategy. But hacking becomes a crime when done with an ill intention to blackmail or to intimidate someone. A hacker might use malicious software to intrude into your device.


Phishing too is an attempt to gain access to your sensitive information. Phishing attacks are hard to recognize because they reach you in the form of legitimate and trustworthy looking emails and messages. The presentation and content are designed to trick you and persuade you to revert to that message.


Spams are junk e-mails sent in bulk and they might contain virus-infected files that may harm or steal your data.


Malware is a broader term that assimilates a lot of terms in it. Trojan, worms, viruses, ransomware, spyware and more are a part of it. Malware is a corrupt file or program which when gets enabled on a device deletes, encrypts or steals the sensitive information. Let’s get to know all the above-mentioned types of malware in detail.

Virus: It infects all the files and devices it comes in touch with and executes itself.

Worm: Self-replicating programming that spreads to other devices without a host program.

Trojan Horse: A trustworthy and legitimate looking file or mail that is capable of causing great damage.

Spyware: spyware is designed to keep a track of user’s activity on the device without this knowledge.

Ransomware: Ransomware as the name suggest, is done to extract and encrypt the sensitive information of user and demand ransom money to in return of access to the sensitive information.

Now that you know about all types of cybercrimes, stay alert. Because in case you get victimized you will lose all your crucial data and such attacks might also damage your phone’s software which will further hamper phone’s performance. Yaantra advises its customers to be vigilant while connecting their personal digital devices with others and answering the suspicious emails.

Leave a Reply

Your email address will not be published. Required fields are marked *