You are on page 1of 26

Cyber Crime

-by Piyush Pandey

What it is?

Comprises of..
Cyber stalking

Spam
Unauthorized Accesses

Credit fraud

Piracy
Social profiles hacking

History

John Draper
Year: 1972 John Draper was a Vietnam veteran who could hack telephone systems of Bell Labs by a whistle and could make long system calls through it.

Mark Abene
Year :1991 Hacked into AT&T telephone systems and led to crash of 60,000 customers phone lines for 9 hours

Kevin Mitnick
1976 Use to sweep floor at Radio Shack

1995

FBI issued warrant against him for computer crime


Acted as a computer expert in film Alias

2001

DVD John
Jon Johansen Was only 15 years old when he wrote the code for DeCSS, a program that de-encrypts a DVD so that you can save it - not just watch it - on your computer. . Authorities have arrested DVD Jon twice but never been convicted. His latest target? Apple Computer and the protected music files on its iTunes Music Store.

International Trends

Nortons Report

Countries affected

Symantec Report

Unsecure wifi

Indian Scenario

Cases

Yes we are.

by Social Network

changing face of cybercrime

Remedy

always check for https://

You might also like