June 16, 2017


When any crime is committed over the internet it is referred to as a cybercrime.  It’s good to understand and be aware of the different types of crimes out there so you can protect yourself and your company.






Short for "malicious software," malware refers to software programs designed to damage or do other unwanted actions on a computer system.​



Malware that copies itself and infects your computer and files and has a detrimental effect, such as corrupting the system or destroying data.



When someone breaks into a computer or network.



Malware designed to block access to a computer system until a sum of money is paid.



Malware that gathers information about you, usually to track your internet use and deliver pop-up ads.​


Trojan Horse:

Malicious software which is used to hack into a computer by misleading users of its true intent by pretending to be useful.



The fraudulent practice of directing internet users to a bogus website that mimics the appearance of a legitimate one, in order to obtain personal information such as passwords, account numbers, etc.


Social Engineering:

A type of confidence trick for the purpose of information gathering, fraud, or system access.


Rogue Security Software:

Malware that pretends to be malware removal software.



Malware that records every keystroke made by a computer user in order to gain fraudulent access to passwords and other confidential information.



Hijackware is a type of malicious software that infects an internet browser in order to display advertising and/or redirect the user to malicious or spammy websites.


Password Stealer:

Malware specifically used to transmit personal information, such as usernames and passwords.



Opens a backdoor into your computer to provide a connection for other malware, viruses, SPAM or hackers.



Disguises itself as normal files that “hide in plain sight” so your antivirus software overlooks them. The goal is usually to steal the identity information from your computer, often to gain control of a system. It’s difficult to detect and remove.



Malware that replicates itself in order to spread to other computers.



Is the attempt to obtain sensitive information, by disguising as a trustworthy entity in an email.



When cybercriminals try to get into your computer by masquerading as a trusted source. Examples include email spoofing, IP spoofing and address bar spoofing.



Adware is a type of malware that bombards you with endless ads and pop-ups.










Please reload

Recent Posts
Please reload

Please reload

  • Facebook - White Circle
  • LinkedIn - White Circle
  • YouTube - White Circle

Orlando's Trusted Managed IT Service Provider and IT Support Professionals for over 20 Years

© 2020 by Kappa Computer Systems LLC

Kappa Computer Systems, Manged IT Service and Support Orlando, Altamonte Springs Florida

767 Stirling Center Place, Unit 1401

Lake Mary, FL 32746

Support@KappaServices.com |   407-331-5921

Kappa Services managed IT service and IT support in Orlando, Florida provides many benefits designed to free your business from the necessary but time-consuming chores of monitoring and managing your IT network infrastructure. We strive to help simplify IT by cultivating and sustaining a solid IT foundation and IT business strategy for your business.