What is cyber crime : Today our age is completely based on Technology and this race of technology development has made man fully dependent on the “Information Technology”. But in this shining age of development, all the manual work has been shifted to automatic machines. In every area there is mechanical dominance and man seems to be dwarf in front ninja-1507457of this mechanical development. The internet, a globalized medium by design provides money and information to all sorts of customers and businessmen .It is notably the home of virtual worlds and their Economics which have attracted many people, including criminals . It’s of course technology has made our lives easy and safe but there are some consequences of technology too. It has provided a new dimension to the world of crime. A vastly popular crime that are committed against individuals or groups of individuals with a criminals motive to intentionally harm the reputation of the victim or cause physical and mental harm to the victim directly or indirectly, using modern telecommunication networks such as internet (chat rooms, emails notice boards and groups) and mobile phones(SMS/MMS),is called cyber-crime.

The unholy nexus of the internet and crime has two forms of cyber-crime;
1. Crimes that target computers directly.
2. Attacks carried out from the direct network.

Crime that primarily target computer networks or devices include:

Computer viruses.
Denial of service attacks.
Malware (malicious code)

Crime that use computer networks or devices to advance other ends include:

Cyber stalking
Fraud and identity theft.

Information war fare
Phishing scams.

pompous sector of virtual crime: Government officials and information Technology security specialists have documented a significant increase in internet problems and server scans since early 2001 because cyber criminals find new revenue opportunities by directly exploiting the flows or by setting applications, which they have developed. Some of the affected applications are: – 1.Mozilla Firefox 2. Adobe Flash,3. EMC VM ware player, work station and other products. 4. Skype (A well-known software for video chatting) etc. etc.

HISTORY OF CYBER CRIME & HOW YOU CAN SECURE YOUR PERSONAL LIFE FROM CYBER BULLY  WILL BE PUBLISHED IN NEXT ARTICLE.