{"id":24169,"date":"2021-08-25T10:56:36","date_gmt":"2021-08-25T08:56:36","guid":{"rendered":"https:\/\/piekblog.com\/cybercrime-hotter-than-ever\/"},"modified":"2021-08-26T08:17:55","modified_gmt":"2021-08-26T06:17:55","slug":"cybercrime-hotter-than-ever","status":"publish","type":"post","link":"https:\/\/piekblog.com\/en\/cybercrime-hotter-than-ever\/","title":{"rendered":"Cybercrime, hotter than ever"},"content":{"rendered":"<p>The newspapers are already warning against cybercriminals offering a vaccine against Covid-19. It has never been easier to become a cybercriminal, also because legislation worldwide is lagging behind. Via the Internet or the Darknet criminals offer crime as a service (CaaS). This involves asking a third party to infiltrate or even shut down another party\u2019s computer network. The trade in malware is a multi-million euro business worldwide. Companies, organisations and also private individuals are increasingly prepared to pay for getting back control over their own servers and PCs.<\/p>\n<p>Another phenomenon in the field of cybercrime is so-called <a href=\"https:\/\/www.fbi.gov\/news\/testimony\/dangerous-partners-big-tech-and-beijing\" target=\"_blank\" rel=\"noopener\">hacktivism<\/a>. This means influencing a government by intimidation or threats. Another form is trying to influence a part of the population by means of coercion. Hacktivism is always politically motivated, either to denounce certain matters or to ventilate dissatisfaction with certain legislation in a country or continent. The bottom line is that this is criminal behaviour, simply because those active in it try to hack or shut down other people\u2019s networks.<\/p>\n<p>Nowadays, 3D printers are superseded by 4D ones and bio-printers, which can be used to commit crimes. In films we have already seen that it is possible to print faces and hands. This is no longer science fiction. Even with modern 3D printers it is possible to print somebody\u2019s hand and wear it as a glove. In this way criminals can access fingerprint-protected and hand-scan-protected systems. Besides, 3D printers are also used to print <a href=\"https:\/\/www.justice.gov\/usao-nv\/pr\/las-vegas-man-indicted-illegal-possessions-3-d-printed-glock-switches-and-firearms\" target=\"_blank\" rel=\"noopener\">firearms<\/a>. However, there is shockingly little to no legislation against all this at the moment.<\/p>\n<p>What can companies, organisations and private individuals do prevent themselves from falling victim to cybercriminals? The first rule is to never be na\u00efve and never click any link in an email without checking well first where the email came from. The next thing is to get the security policy up to date concerning computer and internet use and to have a proper protection of their systems. Thirdly, passwords have to be changed regularly and should be very hard to guess. Finally, it is the government\u2019s move to create legislation at national or supra-national levels. Any country should be able to prosecute cybercriminals wherever they are geographically located. As long as countries such as North Korea, China and Russia have cybercriminals on the state\u2019s payroll, the problem can only get bigger and the need for other countries to do something against cybercrime can only get higher.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The newspapers are already warning against cybercriminals offering a vaccine  [&#8230;]<\/p>\n","protected":false},"author":3,"featured_media":24166,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[34],"tags":[339],"class_list":["post-24169","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-piek-en","tag-cybercrime-en"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Cybercrime, hotter than ever - PIEK<\/title>\n<meta name=\"description\" content=\"Via the Internet or the Darknet criminals offer crime as a service (CaaS). This involves asking a third party to infiltrate or even shut down another party\u2019s computer network.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/piekblog.com\/en\/cybercrime-hotter-than-ever\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cybercrime, hotter than ever - PIEK\" \/>\n<meta property=\"og:description\" content=\"Via the Internet or the Darknet criminals offer crime as a service (CaaS). This involves asking a third party to infiltrate or even shut down another party\u2019s computer network.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/piekblog.com\/en\/cybercrime-hotter-than-ever\/\" \/>\n<meta property=\"og:site_name\" content=\"PIEK\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/PiekIEC\" \/>\n<meta property=\"article:published_time\" content=\"2021-08-25T08:56:36+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-08-26T06:17:55+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/piekblog.com\/wp-content\/uploads\/cybercrime-5.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"900\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Wendy Wings\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@PiekIEC\" \/>\n<meta name=\"twitter:site\" content=\"@PiekIEC\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Wendy Wings\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/piekblog.com\\\/en\\\/cybercrime-hotter-than-ever\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/piekblog.com\\\/en\\\/cybercrime-hotter-than-ever\\\/\"},\"author\":{\"name\":\"Wendy Wings\",\"@id\":\"https:\\\/\\\/piekblog.com\\\/en\\\/#\\\/schema\\\/person\\\/9c7a67e97b631d3aa79e77246849999e\"},\"headline\":\"Cybercrime, hotter than ever\",\"datePublished\":\"2021-08-25T08:56:36+00:00\",\"dateModified\":\"2021-08-26T06:17:55+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/piekblog.com\\\/en\\\/cybercrime-hotter-than-ever\\\/\"},\"wordCount\":412,\"publisher\":{\"@id\":\"https:\\\/\\\/piekblog.com\\\/en\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/piekblog.com\\\/en\\\/cybercrime-hotter-than-ever\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/piekblog.com\\\/wp-content\\\/uploads\\\/cybercrime-5.jpg\",\"keywords\":[\"Cybercrime\"],\"articleSection\":[\"PIEK\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/piekblog.com\\\/en\\\/cybercrime-hotter-than-ever\\\/\",\"url\":\"https:\\\/\\\/piekblog.com\\\/en\\\/cybercrime-hotter-than-ever\\\/\",\"name\":\"Cybercrime, hotter than ever - PIEK\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/piekblog.com\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/piekblog.com\\\/en\\\/cybercrime-hotter-than-ever\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/piekblog.com\\\/en\\\/cybercrime-hotter-than-ever\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/piekblog.com\\\/wp-content\\\/uploads\\\/cybercrime-5.jpg\",\"datePublished\":\"2021-08-25T08:56:36+00:00\",\"dateModified\":\"2021-08-26T06:17:55+00:00\",\"description\":\"Via the Internet or the Darknet criminals offer crime as a service (CaaS). This involves asking a third party to infiltrate or even shut down another party\u2019s computer network.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/piekblog.com\\\/en\\\/cybercrime-hotter-than-ever\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/piekblog.com\\\/en\\\/cybercrime-hotter-than-ever\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/piekblog.com\\\/en\\\/cybercrime-hotter-than-ever\\\/#primaryimage\",\"url\":\"https:\\\/\\\/piekblog.com\\\/wp-content\\\/uploads\\\/cybercrime-5.jpg\",\"contentUrl\":\"https:\\\/\\\/piekblog.com\\\/wp-content\\\/uploads\\\/cybercrime-5.jpg\",\"width\":1200,\"height\":900,\"caption\":\"Hackers robbing computer. people in black masks stealing data and money. Thiefs stealing confidential data documents from computer useful for anti phishing and internet viruses campaigns.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/piekblog.com\\\/en\\\/cybercrime-hotter-than-ever\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/piekblog.com\\\/en\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybercrime, hotter than ever\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/piekblog.com\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/piekblog.com\\\/en\\\/\",\"name\":\"PIEK\",\"description\":\"Your knowledge provider for the electronics industry\",\"publisher\":{\"@id\":\"https:\\\/\\\/piekblog.com\\\/en\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/piekblog.com\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/piekblog.com\\\/en\\\/#organization\",\"name\":\"PIEK International Education Centre (I.E.C.)\",\"url\":\"https:\\\/\\\/piekblog.com\\\/en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/piekblog.com\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/piekblog.com\\\/wp-content\\\/uploads\\\/PIEK-Logo-2x.png\",\"contentUrl\":\"https:\\\/\\\/piekblog.com\\\/wp-content\\\/uploads\\\/PIEK-Logo-2x.png\",\"width\":300,\"height\":120,\"caption\":\"PIEK International Education Centre (I.E.C.)\"},\"image\":{\"@id\":\"https:\\\/\\\/piekblog.com\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/PiekIEC\",\"https:\\\/\\\/x.com\\\/PiekIEC\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/piek-international-education-centre-bv\",\"https:\\\/\\\/www.youtube.com\\\/c\\\/PIEKtraining\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/piekblog.com\\\/en\\\/#\\\/schema\\\/person\\\/9c7a67e97b631d3aa79e77246849999e\",\"name\":\"Wendy Wings\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/42be4b00ea28a646a55faca54769b5ffd7f21b52929834af05606d5ef5b25bad?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/42be4b00ea28a646a55faca54769b5ffd7f21b52929834af05606d5ef5b25bad?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/42be4b00ea28a646a55faca54769b5ffd7f21b52929834af05606d5ef5b25bad?s=96&d=mm&r=g\",\"caption\":\"Wendy Wings\"},\"url\":\"https:\\\/\\\/piekblog.com\\\/en\\\/author\\\/wendy-wings\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cybercrime, hotter than ever - PIEK","description":"Via the Internet or the Darknet criminals offer crime as a service (CaaS). This involves asking a third party to infiltrate or even shut down another party\u2019s computer network.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/piekblog.com\/en\/cybercrime-hotter-than-ever\/","og_locale":"en_US","og_type":"article","og_title":"Cybercrime, hotter than ever - PIEK","og_description":"Via the Internet or the Darknet criminals offer crime as a service (CaaS). This involves asking a third party to infiltrate or even shut down another party\u2019s computer network.","og_url":"https:\/\/piekblog.com\/en\/cybercrime-hotter-than-ever\/","og_site_name":"PIEK","article_publisher":"https:\/\/www.facebook.com\/PiekIEC","article_published_time":"2021-08-25T08:56:36+00:00","article_modified_time":"2021-08-26T06:17:55+00:00","og_image":[{"width":1200,"height":900,"url":"https:\/\/piekblog.com\/wp-content\/uploads\/cybercrime-5.jpg","type":"image\/jpeg"}],"author":"Wendy Wings","twitter_card":"summary_large_image","twitter_creator":"@PiekIEC","twitter_site":"@PiekIEC","twitter_misc":{"Written by":"Wendy Wings","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/piekblog.com\/en\/cybercrime-hotter-than-ever\/#article","isPartOf":{"@id":"https:\/\/piekblog.com\/en\/cybercrime-hotter-than-ever\/"},"author":{"name":"Wendy Wings","@id":"https:\/\/piekblog.com\/en\/#\/schema\/person\/9c7a67e97b631d3aa79e77246849999e"},"headline":"Cybercrime, hotter than ever","datePublished":"2021-08-25T08:56:36+00:00","dateModified":"2021-08-26T06:17:55+00:00","mainEntityOfPage":{"@id":"https:\/\/piekblog.com\/en\/cybercrime-hotter-than-ever\/"},"wordCount":412,"publisher":{"@id":"https:\/\/piekblog.com\/en\/#organization"},"image":{"@id":"https:\/\/piekblog.com\/en\/cybercrime-hotter-than-ever\/#primaryimage"},"thumbnailUrl":"https:\/\/piekblog.com\/wp-content\/uploads\/cybercrime-5.jpg","keywords":["Cybercrime"],"articleSection":["PIEK"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/piekblog.com\/en\/cybercrime-hotter-than-ever\/","url":"https:\/\/piekblog.com\/en\/cybercrime-hotter-than-ever\/","name":"Cybercrime, hotter than ever - PIEK","isPartOf":{"@id":"https:\/\/piekblog.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/piekblog.com\/en\/cybercrime-hotter-than-ever\/#primaryimage"},"image":{"@id":"https:\/\/piekblog.com\/en\/cybercrime-hotter-than-ever\/#primaryimage"},"thumbnailUrl":"https:\/\/piekblog.com\/wp-content\/uploads\/cybercrime-5.jpg","datePublished":"2021-08-25T08:56:36+00:00","dateModified":"2021-08-26T06:17:55+00:00","description":"Via the Internet or the Darknet criminals offer crime as a service (CaaS). This involves asking a third party to infiltrate or even shut down another party\u2019s computer network.","breadcrumb":{"@id":"https:\/\/piekblog.com\/en\/cybercrime-hotter-than-ever\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/piekblog.com\/en\/cybercrime-hotter-than-ever\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/piekblog.com\/en\/cybercrime-hotter-than-ever\/#primaryimage","url":"https:\/\/piekblog.com\/wp-content\/uploads\/cybercrime-5.jpg","contentUrl":"https:\/\/piekblog.com\/wp-content\/uploads\/cybercrime-5.jpg","width":1200,"height":900,"caption":"Hackers robbing computer. people in black masks stealing data and money. Thiefs stealing confidential data documents from computer useful for anti phishing and internet viruses campaigns."},{"@type":"BreadcrumbList","@id":"https:\/\/piekblog.com\/en\/cybercrime-hotter-than-ever\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/piekblog.com\/en"},{"@type":"ListItem","position":2,"name":"Cybercrime, hotter than ever"}]},{"@type":"WebSite","@id":"https:\/\/piekblog.com\/en\/#website","url":"https:\/\/piekblog.com\/en\/","name":"PIEK","description":"Your knowledge provider for the electronics industry","publisher":{"@id":"https:\/\/piekblog.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/piekblog.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/piekblog.com\/en\/#organization","name":"PIEK International Education Centre (I.E.C.)","url":"https:\/\/piekblog.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/piekblog.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/piekblog.com\/wp-content\/uploads\/PIEK-Logo-2x.png","contentUrl":"https:\/\/piekblog.com\/wp-content\/uploads\/PIEK-Logo-2x.png","width":300,"height":120,"caption":"PIEK International Education Centre (I.E.C.)"},"image":{"@id":"https:\/\/piekblog.com\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/PiekIEC","https:\/\/x.com\/PiekIEC","https:\/\/www.linkedin.com\/company\/piek-international-education-centre-bv","https:\/\/www.youtube.com\/c\/PIEKtraining"]},{"@type":"Person","@id":"https:\/\/piekblog.com\/en\/#\/schema\/person\/9c7a67e97b631d3aa79e77246849999e","name":"Wendy Wings","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/42be4b00ea28a646a55faca54769b5ffd7f21b52929834af05606d5ef5b25bad?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/42be4b00ea28a646a55faca54769b5ffd7f21b52929834af05606d5ef5b25bad?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/42be4b00ea28a646a55faca54769b5ffd7f21b52929834af05606d5ef5b25bad?s=96&d=mm&r=g","caption":"Wendy Wings"},"url":"https:\/\/piekblog.com\/en\/author\/wendy-wings\/"}]}},"amp_enabled":true,"_links":{"self":[{"href":"https:\/\/piekblog.com\/en\/wp-json\/wp\/v2\/posts\/24169","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/piekblog.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/piekblog.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/piekblog.com\/en\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/piekblog.com\/en\/wp-json\/wp\/v2\/comments?post=24169"}],"version-history":[{"count":1,"href":"https:\/\/piekblog.com\/en\/wp-json\/wp\/v2\/posts\/24169\/revisions"}],"predecessor-version":[{"id":24174,"href":"https:\/\/piekblog.com\/en\/wp-json\/wp\/v2\/posts\/24169\/revisions\/24174"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/piekblog.com\/en\/wp-json\/wp\/v2\/media\/24166"}],"wp:attachment":[{"href":"https:\/\/piekblog.com\/en\/wp-json\/wp\/v2\/media?parent=24169"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/piekblog.com\/en\/wp-json\/wp\/v2\/categories?post=24169"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/piekblog.com\/en\/wp-json\/wp\/v2\/tags?post=24169"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}