Tag Archives: cybercrime

There are a variety of different ransomware variants that encrypt your data with no intention of ever decrypting it. There are also ransomware distributors who are happy to collect ransom payments but have no interest in returning anyone’s data. Innocent victims often fall prey to ransomware hoaxes or find problems with ransomware decryptors. They all end up in the same place they started, without their valuable data. Some of the groups behind the most prevalent ransomware viruses are working to build-up confidence that victims will receive their data if they…

Continue reading

We all know money is the motivating force behind cybercrimes like the creation and distribution of ransomware. The interesting twist with ransomware is that the basic rules of supply and demand become a little hard to follow. Typically you have a buyer and a seller. In the case of ransomware, the distributor—or supplier—has to steal what’s in demand—your data. Cybercriminals create the demand by restricting access. Victims realize they need access and­—if they cannot get access themselves by restoring critical files from backup—they end up paying the ransom and fueling…

Continue reading

This is the start of the season. No, I am not talking about the Christmas season or the shopping season. I am referring to the phishing season. These are the biggest shopping days of the year, and these criminals know that the sales ads and offers will soon start pouring in. Buried among those offers will be phishing messages offering fake deals from these cybercriminals.  Use these tips to stay safe this year. Verify deals The first thing you can do is verify deals on the retailer’s website. If you receive a deal from…

Continue reading

Join the Cleveland Metropolitan Bar Association Business, Banking & Corporate Counsel Section on Thursday, December 11, 2014, for a panel discussion on “Cybersecurity: Investigation • Prosecution • Prevention” highlighting the likely perpetrators and targets of cybercrime, the methods of cybercrime, how to prevent, respond to, and the prosecution of, cybercrime. The shift to complete dependence on the Internet and related technologies have left us all vulnerable to cyber crimes and intrusions aimed at bringing economic, social and political infrastructures to a standstill. Cybersecurity is among the leading issues facing corporate…

Continue reading

There are many new threats on the Internet, but that doesn't mean criminals don't try the tried and true methods as well.  Enter the pyramid scheme, stage left.  A pyramid scheme is much like the old chain letters people received when the post office was the en vogue form of communication. The way this scheme works is simple and very identifiable. One person begins at the top of the pyramid and recruits a few other people to “invest” some amount of money, say $100, into the initial investor. These new…

Continue reading

Despite the name, money mules are not good.  Money mules are people who are duped into laundering money for criminal groups unknowingly.  The criminals reap the rewards of the money laundering and the money mule takes the blame.  There are many scams out there that try to convert honest people into money laundering mules. An email arrives, often unsolicited, that asks whether or not you would like to change careers, receive copious amounts of money, and work unsupervised. Who wouldn’t want that?  Unfortunately, these are just scams designed to get…

Continue reading