Chapter 1. Introduction
- Categories of Cybercrime
- Target of the Crime
- Persons
- Property
- Organizations
- Single or Series of Events
- Single Event Cybercrime
- Series of Events Cybercrime
- Basic Steps to Protect Yourself
- Create a Virtual Shield
- Beware of Impersonators
- Don’t Take the Bait
- Stay Away from High-risk Websites
- Download with Caution
- Keep an Eye on your Children
- Additional Steps
- Public Computers
- Wireless Internet Connection
- Laptop
- If You Are a Victim of Cybercrime
- Crimeware
- Online Fraud
Chapter 2. Auction Fraud
- Types of Auction Fraud
- Fraud by Seller
- Fraud by Buyer
- Examples of Auction Fraud
- Tips to Protect Yourself
Chapter 3. Business and Job Opportunity Fraud
- Business Opportunity Scams
- Examples
- Home Employment Scams
- Envelope Stuffing
- Assembly Work
- Medical Billing
- Other Home Employment Scams
- Multilevel Marketing Scams
- Job Scams
- Examples of Job Scams
- Overpayment Scams
- Fake Check Scams
- Advance Fee Scams
- Auction Scams
- Other Job Scams
- Tips to Protect Yourself
Chapter 4. Charity Scams
- Emotions
- Types of Charity Scams
- Examples of Charity Scams
- September 11 Attack
- Asian Tsunami
- Hurricane Katrina
- Tips to Protect Yourself
Chapter 5. Child Pornography
- Examples of Child Pornography
- Tips to Protect Yourself
Chapter 6. Copyright Violation
- Plagiarism
- Example of Plagiarism
- Other Copyrighted Material
- Examples of Other Copyrighted Material
- Music
- Movies
- Software
- Tips to Protect Yourself
Chapter 7. Cramming and Slamming
- Cramming
- Examples of Cramming
- Slamming
- Examples of Slamming
- Tips to Protect Yourself
Chapter 8. Credit Card Fraud
- Examples of Credit Card Fraud
- Credit Card Cramming
- Other Types of Credit Card Fraud
- Tips to Protect Yourself
Chapter 9. Credit Repair Scam
- Examples of Credit Repair Scams
- Tips to Protect Yourself
Chapter 10. Cyberbullying
- Tools of Cyberbullies
- Examples of Cyberbullying
- Tips to Protect Yourself
Chapter 11. Cyberextortion
- Examples of Cyberextortion
- Credit Card Details
- Money
- Sex
- Purchase Drugs
- Tips to Protect Yourself
Chapter 12. Cyber-harassment and Cyberstalking
- Cyber-harassment
- Example of Cyber-harassment
- Cyberstalking
- Examples of Cyberstalking
- Tips to Protect Yourself
Chapter 13. Cyberhijacking
- Examples of Cyberhijacking
- Computer Hijacking
- Browser Hijacking
- Webpage Hijacking
- Instant Messaging Hijacking
- Modem Hijacking
- Tips to Protect Yourself
Chapter 14. Cyber Snake Oil
- Examples of Cyber Snake Oil
- Dietary Supplements
- Home Test Kits
- Medications
- Cosmetic Scams
- Treatments and Cures
- Other Cyber Snake Oil Scams
- Tips to Protect Yourself
Chapter 15. Cyberterrorism
- Examples of Cyberterrorism
- Tips to Protect Yourself
Chapter 16. Dating, Marriage, and Divorce Scams
- Dating Scams
- Examples of Dating Scams
- Consumer Fraud
- Dating Service Fraud
- Marriage Scams
- Examples of Marriage Scams
- Divorce Scams
- Example of a Divorce Scam
- Tips to Protect Yourself
Chapter 17. Education Scams
- Diploma Mills
- Examples of Diploma Mills
- Scholarship Scams
- Example of a Scholarship Scam
- Tips to Protect Yourself
Chapter 18. Gambling Fraud
- Online Casino Scams
- Examples of Online Casino Scams
- Bonus Scam
- Email Scam
- Investment Fraud
- Knock-off Websites
- Online Sports Betting
- Examples of Online Sports Betting
- Tips to Protect Yourself |
Chapter 19. Hacking
- History of Hacking
- Examples of Hacking
- Tips to Protect Yourself
Chapter 20. Identity Theft
- Phishing
- Examples of Phishing
- Vishing
- Examples of Vishing
- Pharming
- Examples of Pharming
- Tips to Protect Yourself
Chapter 21. Immigration Fraud
- Examples of Immigration Fraud
- Tips to Protect Yourself
Chapter 22. Investment Fraud
- Examples of Investment Fraud
- Market Manipulation
- Pump and Dump
- Short Selling
- Non-existent Companies and Products
- Companies
- Products
- Ponzi Schemes
- Tips to Protect Yourself
Chapter 23. Laptop Theft
- Examples of Laptop Theft
- Tips to Protect Yourself
Chapter 24. Loan and Grant Scams
- Loan Scams
- Examples of Loan Scams
- Grant Scams
- Example of a Grant Scam
- Tips to Protect Yourself
Chapter 25. Lottery Scams
- Examples of Lottery Scams
- Tips to Protect Yourself
Chapter 26. Nigerian Fraud
- Tactics
- Examples of Nigerian Fraud
- Effects on People’s Lives
- Email Examples
- Tips to Protect Yourself
Chapter 27. Organized Crime
- Examples of Organized Crime
- Tips to Protect Yourself
Chapter 28. Overpayment Scam
- How It works
- Examples of Overpayment Scams
- Tips to Protect Yourself
Chapter 29. Predatory Behavior
- Clues Your Child Might Be in Contact with a Predator
- Examples of Predatory Behavior
- Tips to Protect Yourself
Chapter 30. Pyramid Schemes and Email Chain Letters
- Pyramid Schemes
- Examples of Pyramid Schemes
- Email Chain Letters
- Example of an Email Chain Letter
- Tips to Protect Yourself
Chapter 31. Prostitution
- Adult Prostitution
- Examples of Adult Prostitution
- Child Prostitution
- Examples of Child Prostitution
- Tips to Protect Yourself
Chapter 32. Sales Fraud
- Examples of Online Sales Fraud
- Buyer’s Clubs
- Faked Testimonials
- False/Deceptive Advertising
- Illegal/Stolen Items
- Inflated Shipping and Handling Charges
- Magazine Sales
- Nonexistent Items
- Tips to Protect Yourself
Chapter 33. Spam
- Common Spam Scams
- How They Get Your Email Address
- Examples of Spam
- Tips to Protect Yourself
Chapter 34. Travel Scams
- Examples of Travel Scams
- Free Trip
- Advance Fee
- Agent Kits
- Frequent Flyer Miles
- Nonrefundable Ticket
- Contest
- Fake Website
- Tips to Protect Yourself
Chapter 35. Viruses, Worms, Trojans, and Spyware
- Viruses, Worms, and Trojans
- Viruses
- Worms
- Trojans
- Spyware
- Keystroke Loggers
- Adware
- Unethical Anti-spyware Companies
- Cookies
- Indications Your Computer May Be Infected
- Tips to Protect Yourself
Chapter 36. Hoaxes
- Hoax Categories
- Celebrity Hoaxes
- Give Away Hoaxes
- Hacked History Hoaxes
- Humorous Hoaxes
- Missing Child Hoaxes
- Protest Hoaxes
- Scare Hoaxes
- Sympathy Hoaxes
- Threat Hoaxes
- Urban Legend Hoaxes
- Virus Hoaxes
- How to Recognize Hoaxes
Appendix A. Where to Report Cybercrimes
- Federal Agencies
- Combined Agencies
- Specific Cybercrimes
Appendix B. Cybercrime Glossary |