followers This is not valid email address The passwords do not match No more questions Choose at least 1 category! Error - username is empty! Error - name is empty! Error - email is empty! No answers Question should have '?' at the end! Question is too long! Description is too long! Select until 10 topic(s) for your question Are you sure? Points which you accumulated by this question will be deleted! Are you sure? Points which you accumulated by this answer will be deleted! Question was deleted! Mention user Insert username No more notifications No more points Answer can not be empty!

All topics

Abusive Email
Abusive e-mails happen when individuals or groups use a company's e-mail to send abusive messages to an employee or spread malicious rumours about that employee with racist, sexist, homophobic intent or with any other form of intolerance or discrimination.
Banking Fraud
Bank fraud is the use of potentially illegal means to obtain money, assets, or other property owned or held by a financial institution, or to obtain money from depositors by fraudulently posing as a bank or other financial institution.
Copyright Infringement
Copyright infringement is the use of works protected by copyright law without permission, infringing certain exclusive rights granted to the copyright holder, such as the right to reproduce, distribute, display or perform the protected work, or to make derivative works.
Credit/Debit Card Fraud
Credit card fraud is a wide-ranging term for theft and fraud committed using or involving a payment card, such as a credit card or debit card, as a fraudulent source of funds in a transaction. The purpose may be to obtain goods without paying, or to obtain unauthorized funds from an account.
Cyber Stalking
Cyberstalking is the use of the Internet or other electronic means to stalk or harass an individual, a group, or an organization. It may include false accusations, defamation, slander and libel. It may also include monitoring, identity theft, threats, vandalism, solicitation for sex, or gathering information that may be used to threaten, embarrass or harass.
E-commerce frauds
Credit card and identity fraud are two major issues in the modern day world, identity fraud occurring when people fail to keep their computer secure. Online fraud can occur when a hacker retrieves the personal details of someone by hacking into their device and using their details to purchase products or services.
Email Hacking
Email hacking is the unauthorized access to, or manipulation of, an email account or email correspondence.
Other
All other Fraud
Phishing
Phishing is the attempt to obtain sensitive information such as usernames, passwords, and credit card details (and, indirectly, money), often for malicious reasons, by disguising as a trustworthy entity in an electronic communication.
Pornography
Pornography Complaints
Social Profile Hacking (Facebook, Twitter etc.)
For most people, having their Facebook account hacked is a nightmare. Imagine if someone had access to all your private messages, could contact your friends, abuse your Facebook page, and delete your personal information. To avoid this, you should regularly update your password and keep other security settings tight.
Software Piracy
Software piracy is the unauthorized copying, reproduction, use, or manufacture of software products. On average, for every authorized copy of computer software in use, at least one unauthorized or "pirated" copy is made.
Virus or Trojan attack
A blended threat is a more sophisticated attack that bundles some of the worst aspects of viruses, worms, Trojan horses and malicious code into one single threat. Blended threats can use server and Internet vulnerabilities to initiate, then transmit and also spread an attack.
Website Hacking
Websites are used daily by a large part of the world's population to carry sensitive data from a person to an entity with online-based presence. In websites containing materials that are shown after authentication only, forms transfer data containing user credentials to server-side scripts.

Ads




Links