Globalization period changed the dynamics of information and communication technology, with virtual services use for IT infrastructure security, because of the rapidly re-configuration and evolving requirements limiting the request for redundant services (hardware). It’s also worth noting that cloud computing reduces the costs of providing IT services, by eliminating redundant computing power and storage, reducing support requirements
The availability of security device and software in the black market is a prerequisite for the perpetration of cybercrimes such as credit card theft, online scams or identity theft. Cybercriminals and terrorists have a great advantage to coordinate large scale attacks and crimes with the help of information and communication technologies with minimal effort such as generating funds from small value transactions in order to finance terrorist attacks (Webb & Tomalewicz, 2016). The speed and anonymity of cyber-attacks makes it distinctive among perpetrators (terrorists, criminals, and nation states). Jihadist tendencies usually require little finance, for example the United Nations evaluated London bombings in 2005 at around $14,000, while the French Finance Minister Michel Sapin evaluated that of the Paris attacks in November 2015 to approximately $32,000. Contrary to coordinated attacks of 9/11 which were reported to have cost between $400,000 and $500,000 according to the final report of the National Commission on Terrorist Attacks. There has been a large increase in the volume of cyber-attacks by organised criminal networks
Cyberattacks have been flying fast and furious around the world during these days of global uncertainty because of the coronavirus. Countries accuse each other of engaging in cyber warfare, and each of the accused also claims to be a cyber victim. International organizations dealing with the COVID-19 pandemic have also been targeted
Information and communication technology has brought a variety of non-conventional crimes. Cyber criminality is a major challenge for security officials in Sub Saharan Africa. Each seconds cyber criminals discover software and security terminal devices to operate. The language used by cybercriminals is also a barrier to the law enforcement officers and the criminal justice system. We listen to new words each day, like machine man, Ngues man (to describe scammers) and pick-up, but also mail with attach bills for ‘clients’ of cybercriminals
The theory is applicable for investigation related to company scam, where group solidarity (cybercriminals), technological advancement and inadequate cyber security training are challenges of the criminal justice system in some Sub Saharan African countries
India is projected to have more than 730 million users by 2020 which will make it the third largest market of internet users after the United States and China. Over the last few years, internet adoption in the country has grown at almost 44 per cent annually
Despite the creation of international and regional commissions for financial crimes, the challenge keeps persisting. Financial institutions lost huge amount of money every month, money transfer are been hacked and withdrawn by cybercriminal in partnership with dishonest staffs
Criminal investigations are often challenging due to negligence and inadequate cybersecurity measures by mobile operating companies and law enforcement officers
The social media application TikTok is booming in popularity especially with kids who use it to share short, usually funny videos. But TikTok’s parent company, ByteDance, is owned by China, and this is raising concerns by U.S. lawmakers worried about the security of the app’s American users….Studies show when people pet an animal, their blood pressure goes down along with stress and anxiety. That’s why therapy dogs are increasingly found in schools, counseling centers and even in hospitals
Online data is at risk. Hackers are getting smarter and companies across the globe are facing a shortage of trained professionals who can help protect their data~ VOA NEWS