Question:
How Many Cyber Criminals have been Prosecuted?
Carling
2011-03-04 06:38:22 UTC
The Internet is being used more than ever before with Computers and Mobile device users. people are being herded in one direction or another like sheep, Yet the dog handlers (companies) can't keep the herd (users) safe from the criminal internet wolves,

It makes no difference which dog handler (operating system) it is, these dog handlers should keep the wolves at bay, by securing their proprietary operating systems. Over this passed few weeks there has been more security flaws reported where users of these internet devices have had their devices compromised by spyware and malware amounting to serious financial losses

Today I have reading a report were Tens of thousands of people could have been caught out by cyber criminals who put booby-trapped adverts on popular webpages. This boils down to negligence on the part of the website owners and builders who have not secured their web servers.

The time has come for the internet users to stand up and be counted, and fight back against the dog handlers, they are the ones sitting on mounting of cash, while the device users pockets are getting empted by them and the cyber criminals.

Has individuals nothing can be done, Banding together a lot can be done, we could force our terms on to the dog handlers All those that say "I" let me know, those with Ideas on how it should be done put them forward and lets start the march for internet security

If your in agreement then please set up your profile so the you can except messages thank you
Five answers:
2011-03-05 00:04:01 UTC
Hi Carling as part of what i do on the internet these answers are a prime example.

the majority of the problem is the fool, it is not the cyber criminal.

the Fool that let's himself be robbed is at the very heart of this problem, till the fool becomes wise we will always have a problem.

The Sugar Pill or to give it it's name the so called free anti virus or anything else that the fool obtains because it is free. there is no free lunches here on th internet some one has to pay in someway.

When we have so many fools who want it all but don't see the sense in paying for the protection of any type.

I would agree the dog handler is as much a cyber criminal, the operating system vendor's but as long as they make exceptional amounts of wonga out of the fool why should be even try to tackle the crim.
Yawn Gnome
2011-03-04 16:09:58 UTC
To answer the question is impossible. The known Electronic Computing Device criminals is one thing, then there are the unknown ones. It is like this, a kid hacks an airport system, changes some lights to throw the IT staff off the actual intent, which was the Data Base of Customers.

Ok, known Cyber attacks, according to Wikipedia is: 7 known Cyber Criminals that are reported.

My fuel gauge reads 1/2 tank. I am equating this to automobiles now, so on my Fuel Gauge, 1/4 tank and it is empty. There is a 2 gal jerry can in the back, but I know the 1/4 tank is EMPTY, they do not. In the same manner, the passphrase or key to this box is xyz123, that gets you into the /home directory, 123abc activates the /swap, 456cde opens the /tmp, cde456 will allow access to the /root and so on. Is like quintuple redundancy to access any part of any platter.

But I still make backups.

There is no personal data on this On-Line box, NONE! I do not even think my name was ever put into the Memory. I am not a cyber criminal, but I do know what methods they employ and what data they are after. So a good dose of common sense and a routine backup schedule is the best advice I have on that issue.

Oh yeah, I open e.mails on this one 'cause it is connected to the WWW. I am concerned about security, so I am pro-active on that part.

HDD2 never goes on-line, it is where some backups are and other work that I feel is important.

I also make backups of HDD3 and DVD.

Once a machine is logged onto and connects to the internet, ALL data has been launched into space for the taking.

So get pro-active, yes I agree, and start learning, again.
Synful Visions
2011-03-04 09:12:28 UTC
My views on computer security and corporate responsibility are have been well known for a while. The fact of the matter is that it is up to the user to implement the security. Microsoft has provided fantastic tools that are well documented (if you look), and nobody, including the institutions that are supposed to educate have bothered to make a note of this. Linux has done the same, although without quite as clear documentation; both the functionality and documentation is aimed at developers and administrators instead of end users. Apple should be held liable for the issues they are beginning to have. They have conned their users into believing that the platform is secure and immune to the problems that other platforms have. They stripped out critical security functionality for no apparent reason, and they still insist on introducing more poor security (thunderbolt.) Rather than openly admitting their failings and weaknesses, they call a red herring on Flash (which does have a ton of issues). I do applaud their removal of Flash and Java from the operating system installation, they're correct, those are far out of date by the time the OS hits shelves or downloads.



OEMs and developers have to walk a fine line when it comes to security. If it's too intrusive, the end user will not use it. If it's too lax, it won't be effective. What's really sad is that a handful of file permissions on Internet Explorer's temp folders can eliminate all security problems outside of third party plugins. Same with some of the alternate browsers. Why doesn't anybody outside of IT professionals use this? It's unobtrusive, and it's free. Users want to see security that actually "does something." This is why people install car alarms, and motion sensors, and fancy firewalls that alert you to every non-threatening bit of network traffic. They want to see something actively working. They'll feel safer with an insecure, useless program that gives them feedback than they will with a silent application or function that does its job. The flip side is that the feedback also scares them and makes them want to purchase more crap.



EDIT: You seem to be unfairly targeting Microsoft. Adjusting for market share and deployment, it's certianly not the worst offender. Also, if somebody compromised a Windows server through a third party application or service such as MySQL, would that really be a Microsoft compromise? When Linux is compromised through Apache's poor handling of child processes, is that a Linux problem? Properly configured servers are usually not compromised externally anyway, Linux, UNIX, or Windows. You seem to have a very amateurish view of the actual inner workings of IT in general, and website management specifically. As for the tools, NTFS permissions and group policy are the only thing required to lock down a Windows box. The FUD spewed by corporate IT interests and media outlets has been the security poison that has actually been hurting the security of Windows and OS X systems, in opposite ways. Windows adminsitrators are poked and prodded to apply third party products and patches while OS X admins are convinced that they have some acceptable level of security without doing anything (not even close to true yet).
2016-02-28 07:12:11 UTC
It's not hard to prosecute. Prosecuters refuse to prosecute usually or when they do judges give them stern warnings for such things as costing microsoft billions. Had the little bird brain who cost MICROSOFT those billions been given the 20 years in prison he deserved instead of showboating him around in front of the tv cameras we would have fewer willing to commit cyber crimes.
2011-03-04 09:14:35 UTC
oh god, we have an online super hero, good common sense keeps you safe


This content was originally posted on Y! Answers, a Q&A website that shut down in 2021.
Loading...