Crimes that use computer networks or devices to advance other ends include: Fraud and identity theft (although this increasingly uses malware, hacking or phishing, making it an example of both “computer as target” and “computer as tool” crime) Information warfare.

Here’s five types of cybercrime with which users should familiarize themselves.

· Phishing

· Ransomware

· Malware

· Identity Theft

· Scams


Phishing is a type of attack were actors attempt to trick unsuspecting users into doing something they wouldn’t ordinarily do, such as clicking on a malicious URL or email attachment. Actors usually leverage phishing attacks to steal users’ login credentials, details which they can then abuse to gain unauthorised access to their victims’ emails or financial accounts.

Users can protect themselves against phishing by exercising caution around suspicious links or email attachments. They should also be on the lookout for other tell-tale signs of a phishing scam, like frequent grammar or spelling mistakes in what might seem to be an official piece of correspondence from a bank or other institution.


Ransomware is a subset of crimeware that in most cases infects a victim’s computer via phishing attacks or an exploit kit campaign. Upon successful infection, the ransomware commonly encrypts the victim’s data. It then demands a ransom payment in exchange for the return of their data. But that’s not set in stone. There’s no guarantee victims will ever get their data back.

In addition to following the anti-phishing steps laid out above, users should formulate a data recovery plan for their computers. Such a program will help ransomware victims recover their data for free if they ever experience an infection. As part of that plan, users should in the very least maintain two local backups to which they copy their data on a regular basis.


Malware comes in many different forms. Some specifically target users’ financial information by installing keyloggers onto victims’ computers. Malware samples can also reach users via a number of delivery methods, including phishing attacks and malicious software packages that exploit unpatched software vulnerabilities.

People can protect against malware by always checking the domain of a login page for their web accounts. If something seems off, the website might be a fake and could attempt to steal users’ login information. Users should also implement security updates as soon as possible and store their passwords in a secure location such as a password manager.

Identity Theft

Attackers can do all kinds of things with a person’s identity. They can seize control of victims’ banking credentials, apply for new banking accounts, steal users’ hard-earned savings, and more. All they need are some key bits of information about you to convince a bank or a customer service representative that they’re you.

To protect against identity theft,users should take care not to reveal too much about themselves on social media and other websites. There is no reason to ever publicly disclose financial information. In addition, users should never use email to transmit their Social Security Number or other personal information to another person, especially someone they don’t know.

There are three major categories of cyber crimes:

· Crimes Against People. These crimes include cyber harassment and stalking, distribution of child pornography, credit card fraud, human trafficking, spoofing, identity theft, and online libel or slander.

. Crimes Against Property. …

· Crimes Against Government.

Cyber crime in Pakistan

Pakistan: National Assembly Passes New Cyber crime Law. (Sept. 21, 2016) On August 11, 2016, Pakistan’s lower house, the National Assembly, passed a controversial cyber crime law called the Prevention of Electronic Crimes Act, 2016. The Senate had unanimously passed the law, with a number of amendments, in July. Sept 21, 2016