The antics of Cyber criminals

  • Not a member? Join right now and get FREE ACCESS to all private sections on this forum.
    (offer ends in 7hrs 15mins)
    BlackHatNaija Countdown Timer

Web Hosting


New member
Dec 28, 2017
Lagos Nigeria.
It is unfortunate that technology, despite being an initiative that has so far brought positive transformations to our world, it has also in the same vein produced some negative reactions in form of cyber crimes. These crimes are done in different forms all in attempts to swindle unsuspecting individuals. It is therefore impertinent to understand the mode of operations of these cyber criminals in order to avoid becoming victims.

One of these crimes is called Phishing. This is one of the fraudulent activity being carried out on the internet in an attempt to steal people's personal information for both monetary and other possible gains. Phishing is what you encounter when you go on the Internet and you are being redirected to a website that has got nothing to do with what you want to do. It leads you to other web pages and directs you to install software applications that are supposed to be a solution to your computer issues all in an attempt to defraud you.

There are the email messages which could attempt to make you hand over your personal information by sending mails from fake websites of well known organizations, these email addresses look similar to the original email addresses of these organizations and sometimes it's only the content of these messages that could help determine if they are fraudulent or real. They could ask for your bank account details, bank verification number (BVN), username or password under the pretence of solving a particular problem they claim you are encountering. It is therefore expedient that one understands how these criminals operate in other not to be a victim of their activities in future. Remember real bank websites would barely ask for your details because they already have them. So before giving out any of those details, you might want to check-in with the bank, make your enquiries and protect your money.

Then there are the phone messages. These messages come in form of promos. You are being asked to text a particular name or number to another customized number for a particular amount of money thereby qualifying you for a space in the raffle draw which could eventually make you a millionaire. The truth about these ads is that nobody wins. So before responding to that text message, make sure it's what you want and won't regret in future.

Then there are the overly confident ones who would place calls to one's phone and try to convince one that a price has been won in a competition that you didn't even participate in, then you are being asked to send in a particular amount of money to redeem your price.

The take home tip is that genuine organizations, websites or competitions would NEVER require you to make payments except you are actually purchasing something.

Another type of Cyber crime is Plagiarism. According to the English dictionary, plagiarism is simply the act of copying another person's idea, text or creative work and passing it as one's own especially without permission.

As the Internet expands daily, more and more people are striving to take advantage of this space to make their contributions, unfortunately most persons do so by copying other already made works and indicate their signatures.

Here are a few tips on how to catch plagiarists.

1. Copyscape: This is the most popular application used to detect a copied app. Simply copy and paste the URL of the blogpost and copyscape would give you a list of all the possible articles being copied from. You could also copy out the full text on the blog if you are a premium subscriber but this requires payment.

2. Plagramme: This is an application where subscription is needed. After subscription, you are being given access to the website, log on and find out whose work you have copied or who has been copying your work.

3. Use Google: To make things easier especially for those who cannot afford to purchase credits online, there are a number of other free applications available on the Internet. Simply Google them and paste the articles one after the other and a percentage of how the article has been plagiarized would be displayed. You would also get information on who it is that has plagiarized your work in form of the writer of a particular blogpost.

These tips are meant to help us safeguard ourselves and our online materials from cyber criminals in order to drive these criminals off the internet.

Written by Nwaogwugwu Ugoeze Precious, a passionate writer who hopes to transform the state of the nation through her writeups. She can be reached on 08140789039.