{"id":22468,"date":"2019-12-13T03:00:03","date_gmt":"2019-12-13T11:00:03","guid":{"rendered":"http:\/\/writersfunzone.com\/blog\/?p=22468"},"modified":"2019-12-13T06:06:46","modified_gmt":"2019-12-13T14:06:46","slug":"cybercrime-an-overview-of-phishing-and-ransomware-by-keri-kruspe","status":"publish","type":"post","link":"https:\/\/writersfunzone.com\/blog\/2019\/12\/13\/cybercrime-an-overview-of-phishing-and-ransomware-by-keri-kruspe\/","title":{"rendered":"Cybercrime: An Overview of Phishing and Ransomware by Keri Kruspe"},"content":{"rendered":"<p><a href=\"https:\/\/writersfunzone.com\/blog\/wp-content\/uploads\/2019\/11\/Cybercrime-An-Overview-of-Phishing-and-Ransomware-by-Keri-Kruspe.png\" target=\"_blank\" rel=\"noopener noreferrer\"><img loading=\"lazy\" decoding=\"async\" class=\"alignleft wp-image-22470 size-full\" title=\"Cybercrime: An Overview of Phishing and Ransomware by Keri Kruspe\" src=\"https:\/\/writersfunzone.com\/blog\/wp-content\/uploads\/2019\/11\/Cybercrime-An-Overview-of-Phishing-and-Ransomware-by-Keri-Kruspe.png\" alt=\"Cybercrime: An Overview of Phishing and Ransomware by Keri Kruspe\" width=\"300\" height=\"300\" srcset=\"https:\/\/writersfunzone.com\/blog\/wp-content\/uploads\/2019\/11\/Cybercrime-An-Overview-of-Phishing-and-Ransomware-by-Keri-Kruspe.png 300w, https:\/\/writersfunzone.com\/blog\/wp-content\/uploads\/2019\/11\/Cybercrime-An-Overview-of-Phishing-and-Ransomware-by-Keri-Kruspe-160x160.png 160w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a>Let\u2019s welcome back monthly columnist <a href=\"https:\/\/writersfunzone.com\/blog\/?s=Keri+Kruspe\" target=\"_blank\" rel=\"noopener noreferrer\">Keri Kruspe<\/a> as she shares with us \u201cCybercrime: An Overview of Phishing and Ransomware.\u201d Enjoy!<\/p>\n<p>***<\/p>\n<p><span style=\"font-weight: 400;\"><strong>I\u2019ve been working for the banking industry for over thirty years and one thing hasn\u2019t changed in all that time.<\/strong> Bandits are out there and they want your money.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Personally, I\u2019ve survived numerous physical bank robberies as well as bomb threats over the years.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\"><strong>Working in Las Vegas for most of those years,<\/strong> I\u2019ve watched how desperate people who lost it all at the casinos have resorted to do the unthinkable by robbing others. The threat was real\u2026 it was in your face and unavoidable. How you reacted to it determined the trauma afterward.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">But during the ensuing years another type of robbery has gained momentum to the unwary. While it might not be as physically dangerous as a bank robbery, it can have devastating consequences that the victim has to deal with for months, if not years.<\/span><\/p>\n<h2><span style=\"font-weight: 400;\">Cybercrime: Are You Being Misled?<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">I\u2019m talking about cybercrime, especially in regards to your bank account or credit cards.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">In this article, I\u2019m going to touch on a couple of areas and<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Define phishing and ransomware<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Help you understand and identify common cybercrime tactics.<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Then armed with this knowledge, offer how you can protect yourself.<\/span><\/li>\n<\/ul>\n<h2><span style=\"font-weight: 400;\">Phishing and Ransomware: Social Engineering<\/span><\/h2>\n<p><span style=\"font-weight: 400;\"><a href=\"https:\/\/writersfunzone.com\/blog\/wp-content\/uploads\/2019\/11\/hacker.jpg\" target=\"_blank\" rel=\"noopener noreferrer\"><img loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-22471\" title=\"hacker\" src=\"https:\/\/writersfunzone.com\/blog\/wp-content\/uploads\/2019\/11\/hacker-214x300.jpg\" alt=\"hacker\" width=\"200\" height=\"281\" srcset=\"https:\/\/writersfunzone.com\/blog\/wp-content\/uploads\/2019\/11\/hacker-214x300.jpg 214w, https:\/\/writersfunzone.com\/blog\/wp-content\/uploads\/2019\/11\/hacker.jpg 456w\" sizes=\"auto, (max-width: 200px) 100vw, 200px\" \/><\/a>Social engineering is the practice of manipulating people into giving up confidential information (like passwords, bank account information, or access to a computer or network).\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\"><strong>Social engineering is so popular with criminals because it works!<\/strong> It\u2019s easier to exploit someone\u2019s instinct to trust rather than hack into a security program (or walk into a bank and point a gun at a hapless teller.)<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Social engineering usually comes in an email, text, or phone call. These thugs pose as a legitimate institution and is designed to imitate a trusted business, financial institution, social media site, or government agency. These messages will ask for private information or will get victims to unknowingly download malicious software.\u00a0<\/span><\/p>\n<h2><span style=\"font-weight: 400;\">Cybercrime: History of Phishing\u00a0<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">The term phishing became popular in the mid-1990\u2019s. It\u2019s a variation of the word \u201cfishing\u201d because phishers lure their victims with bait, such as an attractive offer.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\"><strong>In 2004 the first phishing lawsuit was filed against a California teenager who created an imitation of the website America Online.<\/strong> He gained sensitive information from users and had access to credit card details to withdraw money from their accounts.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">It is estimated that 1 in every 3,000 emails sent are phishing emails that costs companies in America an average of $1.3 million dollars.<\/span><\/p>\n<h2><span style=\"font-weight: 400;\">Cybercrime: Phishing Tactics<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">A phishing email or text is designed to gain your trust and then trigger a response. It may include upsetting or exciting info that demands an urgent response.<\/span><\/p>\n<p><span style=\"font-weight: 400;\"><strong>Typical words used are:<\/strong> \u201curgent,\u201d \u201cimportant,\u201d or \u201coutstanding payment.\u201d These communications will ask you to \u201cupdate,\u201d \u201cvalidate,\u201d or \u201cconfirm\u201d your account information online.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\"><a href=\"https:\/\/writersfunzone.com\/blog\/wp-content\/uploads\/2019\/11\/excited.jpg\" target=\"_blank\" rel=\"noopener noreferrer\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-22472 alignright\" title=\"excited\" src=\"https:\/\/writersfunzone.com\/blog\/wp-content\/uploads\/2019\/11\/excited-300x200.jpg\" alt=\"excited\" width=\"200\" height=\"133\" srcset=\"https:\/\/writersfunzone.com\/blog\/wp-content\/uploads\/2019\/11\/excited-300x200.jpg 300w, https:\/\/writersfunzone.com\/blog\/wp-content\/uploads\/2019\/11\/excited.jpg 640w\" sizes=\"auto, (max-width: 200px) 100vw, 200px\" \/><\/a>They\u2019ll pray on greed by making attractive offers. They\u2019ll claim \u201cYou\u2019ve won a free trip or lottery. Just click here and it\u2019s yours!\u201d<\/span><\/p>\n<p><span style=\"font-weight: 400;\"><strong>What they\u2019re looking for are:<\/strong> social security numbers, full name, date of birth, full address, retail shopping account, loyalty reward accounts, username and password for online services, email account access, personal identification numbers (PIN), credit card, and bank account numbers.\u00a0<\/span><\/p>\n<h2><span style=\"font-weight: 400;\">How to Recognize a Phishing Attack<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">Here are some basic characteristics of phishing emails:<\/span><\/p>\n<ol>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Generic Names \u201cDear Customer\u201d<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Poor spelling and grammar<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Links to another website<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Unrealistic threats\/demands\/offers<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Sender\u2019s emails address may look like a known organization, but something is off<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Logos and Branding \u2013 somewhat similar but just a bit off<\/span><\/li>\n<\/ol>\n<h2><span style=\"font-weight: 400;\">Malware<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">Malware is short for \u201cmalicious software\u201d and is a type of cyber-attack that typically starts with a successful phishing assault. It\u2019s intentionally designed to cause damage after being implanted to a computer or server. These can be viruses, worms, adware, Trojan horses, and ransomware.\u00a0<\/span><\/p>\n<h2><span style=\"font-weight: 400;\">Ransomware<\/span><\/h2>\n<p><span style=\"font-weight: 400;\"><a href=\"https:\/\/writersfunzone.com\/blog\/wp-content\/uploads\/2019\/11\/in-handcuffs.jpg\" target=\"_blank\" rel=\"noopener noreferrer\"><img loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-22473\" title=\"in handcuffs\" src=\"https:\/\/writersfunzone.com\/blog\/wp-content\/uploads\/2019\/11\/in-handcuffs-300x300.jpg\" alt=\"in handcuffs\" width=\"200\" height=\"200\" srcset=\"https:\/\/writersfunzone.com\/blog\/wp-content\/uploads\/2019\/11\/in-handcuffs-300x300.jpg 300w, https:\/\/writersfunzone.com\/blog\/wp-content\/uploads\/2019\/11\/in-handcuffs-160x160.jpg 160w, https:\/\/writersfunzone.com\/blog\/wp-content\/uploads\/2019\/11\/in-handcuffs-320x320.jpg 320w, https:\/\/writersfunzone.com\/blog\/wp-content\/uploads\/2019\/11\/in-handcuffs.jpg 640w\" sizes=\"auto, (max-width: 200px) 100vw, 200px\" \/><\/a>This is a sophisticated type of malware that is delivered to your computer via a phishing attack. Once it invades your computer, it stops you from using it and encrypts your files.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\"><strong>You don\u2019t have access to your computer unless a sum of money is paid to unlock the system with a decryption key.<\/strong> An advanced ransomware will encrypt system files, drives, or Master File Table.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">It\u2019s almost impossible to recover from as the files cannot be accessed without the decryption key.<\/span><\/p>\n<h2><span style=\"font-weight: 400;\">How to Prevent Ransomware<\/span><\/h2>\n<ul>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Watch out for phishing. Ransomware is often delivered by a successful phishing attack.\u00a0<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Install Anit-Virus software.<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Back up data.<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Filter emails.<\/span><\/li>\n<\/ul>\n<h2><span style=\"font-weight: 400;\">What you can do on your own to prevent or mitigate cybercrime\u00a0<\/span><\/h2>\n<ul>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Keep an eye out for suspicious emails.<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Don\u2019t be fooled by a \u201creal-looking\u201d email\/website.<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Don\u2019t click on links in an email unless you really know who the sender is.<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Protect your computer.<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Secure your website.<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">When in doubt, don\u2019t take chances.<\/span><\/li>\n<\/ul>\n<h2><span style=\"font-weight: 400;\">Let\u2019s have some fun\u2026check out your knowledge!<a href=\"https:\/\/writersfunzone.com\/blog\/wp-content\/uploads\/2019\/11\/test.jpg\" target=\"_blank\" rel=\"noopener noreferrer\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-22469 alignright\" title=\"Test\" src=\"https:\/\/writersfunzone.com\/blog\/wp-content\/uploads\/2019\/11\/test-300x227.jpg\" alt=\"Test\" width=\"200\" height=\"152\" srcset=\"https:\/\/writersfunzone.com\/blog\/wp-content\/uploads\/2019\/11\/test-300x227.jpg 300w, https:\/\/writersfunzone.com\/blog\/wp-content\/uploads\/2019\/11\/test.jpg 640w\" sizes=\"auto, (max-width: 200px) 100vw, 200px\" \/><\/a><\/span><\/h2>\n<ol>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">You receive an email from your credit card company asking you to visit their site to read an important notice. What is the safest way to navigate to the company\u2019s website?<\/span>\n<ol>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Click on the link provided.<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Type the URL in the address bar of your browser.<\/span><\/li>\n<\/ol>\n<\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">What is the purpose of phishing?<\/span>\n<ol>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">To trick a targeted individual into handing over sensitive info.<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">To teach people to be more careful with their passwords.<\/span><\/li>\n<\/ol>\n<\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Ransomware is a type of malware designed to ___________<\/span>\n<ol>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Hack your computer for sensitive information.<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Prevent you from accessing your computer until you pay a sum of money.<\/span><\/li>\n<\/ol>\n<\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Phishing is the process by which a targeted individual is contacted electronically by someone posing as a _________________<\/span>\n<ol>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Friend or family member.<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Legitimate institute.<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Concerned citizen.<\/span><\/li>\n<\/ol>\n<\/li>\n<\/ol>\n<h3><span style=\"font-weight: 400;\"><strong>How did you do? The right answers<\/strong><br \/>\n<\/span><span style=\"font-weight: 400;\">1-b<br \/>\n<\/span><span style=\"font-weight: 400;\">2-a<br \/>\n<\/span><span style=\"font-weight: 400;\">3-b<br \/>\n<\/span><span style=\"font-weight: 400;\">4-b<\/span><\/h3>\n<p><span style=\"font-weight: 400;\"><strong>As our technology progresses,<\/strong> so will the criminals advance their ability to steal our hard-earned money. But, fear not\u2026 all is not lost.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Just remain diligent and remember that no financial institution will send you an email asking for personal information or to click a link.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\"><strong>If you are unsure,<\/strong> call whatever place the email claims it\u2019s from to verify its authenticity.\u00a0<\/span><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-22474\" title=\"wise owl\" src=\"https:\/\/writersfunzone.com\/blog\/wp-content\/uploads\/2019\/11\/wise-owl-300x193.jpg\" alt=\"wise owl\" width=\"200\" height=\"129\" srcset=\"https:\/\/writersfunzone.com\/blog\/wp-content\/uploads\/2019\/11\/wise-owl-300x193.jpg 300w, https:\/\/writersfunzone.com\/blog\/wp-content\/uploads\/2019\/11\/wise-owl.jpg 640w\" sizes=\"auto, (max-width: 200px) 100vw, 200px\" \/><\/p>\n<p><span style=\"font-weight: 400;\">Avoid any link clicking. Better yet &#8212; don\u2019t open a strange email you are unsure of.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">I know it\u2019s a clich\u00e9, but keep this in mind\u2026\u00a0<\/span><\/p>\n<p><strong>\u2026if it\u2019s too good to be true\u2026it usually is.\u00a0<\/strong><\/p>\n<p><span style=\"font-weight: 400;\">***<\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><\/p>\n<h2>ABOUT THE AUTHOR<\/h2>\n<p><a href=\"http:\/\/www.kerikruspe.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Keri Kruspe<\/a><a href=\"http:\/\/www.kerikruspe.com\/\" target=\"_blank\" rel=\"http:\/\/www.kerikruspe.com\/ noopener noreferrer\"><img loading=\"lazy\" decoding=\"async\" class=\"alignleft wp-image-20092\" title=\"Keri Kruspe\" src=\"https:\/\/writersfunzone.com\/blog\/wp-content\/uploads\/2018\/09\/Keri-Kruspe_Author-Pic.jpg\" alt=\"Keri Kruspe\" width=\"150\" height=\"199\" \/><\/a> has been an author since the age of twelve and has always been fascinated with otherworldly stories that end in Happily Ever After. Author of Otherworldly Romantic Adventures, Keri&#8217;s first series is <a href=\"https:\/\/amzn.to\/2AHpJ9w\" target=\"_blank\" rel=\"noopener noreferrer\"><i>An Alien Exchange<\/i><\/a> trilogy. <i>An Alien Exchange<\/i> is the first book in the arousing Alien Exchange sci-fi romance series. If you like sexy aliens, feisty heroines, and fast-paced action, <a href=\"https:\/\/amzn.to\/30gOhS5\" target=\"_blank\" rel=\"noopener noreferrer\">then you\u2019ll love Keri Kruspe\u2019s steamy space adventure.<\/a><\/p>\n<p>Keri now resides with her family in the wilds of Northwestern Michigan. An avid reader, Keri enjoys good wine, good food, and watching action\/adventure movies. You can find her most days immersed in her fantasy world of writing or traveling with her hubby in their RV, discovering intelligent life here on Earth. For goodies, news of upcoming releases, sign up for her newsletter at <a href=\"http:\/\/www.kerikruspe.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">www.kerikruspe.com<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Novelist Keri Kruspe shares about cybercrime, especially in regards to your bank account or credit cards, and especially about phishing and ransomware.<\/p>\n","protected":false},"author":12,"featured_media":22470,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_exactmetrics_skip_tracking":false,"_exactmetrics_sitenote_active":false,"_exactmetrics_sitenote_note":"","_exactmetrics_sitenote_category":0,"footnotes":""},"categories":[20],"tags":[4200,4194,4198,4193,4196,3606,4197,4191,4192,4195,4201,2120,4199],"class_list":["post-22468","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-writing-tips","tag-adware","tag-credit-card-crime-theft","tag-cyber-attack","tag-cybercrime","tag-hacking","tag-keri-kruspe","tag-malware","tag-phishing","tag-ransomware","tag-social-engineering","tag-trojan-horses","tag-viruses","tag-worms"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Cybercrime: An Overview of Phishing and Ransomware by Keri Kruspe &#183; Writer&#039;s Fun Zone<\/title>\n<meta name=\"description\" content=\"Novelist Keri Kruspe shares about cybercrime, especially in regards to your bank account or credit cards, and especially about phishing and ransomware.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/writersfunzone.com\/blog\/2019\/12\/13\/cybercrime-an-overview-of-phishing-and-ransomware-by-keri-kruspe\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cybercrime: An Overview of Phishing and Ransomware by Keri Kruspe &#183; Writer&#039;s Fun Zone\" \/>\n<meta property=\"og:description\" content=\"Novelist Keri Kruspe shares about cybercrime, especially in regards to your bank account or credit cards, and especially about phishing and ransomware.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/writersfunzone.com\/blog\/2019\/12\/13\/cybercrime-an-overview-of-phishing-and-ransomware-by-keri-kruspe\/\" \/>\n<meta property=\"og:site_name\" content=\"Writer&#039;s Fun Zone\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/bethbarany\/\" \/>\n<meta property=\"article:published_time\" content=\"2019-12-13T11:00:03+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2019-12-13T14:06:46+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/writersfunzone.com\/blog\/wp-content\/uploads\/2019\/11\/Cybercrime-An-Overview-of-Phishing-and-Ransomware-by-Keri-Kruspe.png\" \/>\n\t<meta property=\"og:image:width\" content=\"300\" \/>\n\t<meta property=\"og:image:height\" content=\"300\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Guest Contributor\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@BethBarany\" \/>\n<meta name=\"twitter:site\" content=\"@BethBarany\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Guest Contributor\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/writersfunzone.com\\\/blog\\\/2019\\\/12\\\/13\\\/cybercrime-an-overview-of-phishing-and-ransomware-by-keri-kruspe\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/writersfunzone.com\\\/blog\\\/2019\\\/12\\\/13\\\/cybercrime-an-overview-of-phishing-and-ransomware-by-keri-kruspe\\\/\"},\"author\":{\"name\":\"Guest Contributor\",\"@id\":\"https:\\\/\\\/writersfunzone.com\\\/blog\\\/#\\\/schema\\\/person\\\/6da98818636d0a12baec6dd6b03db168\"},\"headline\":\"Cybercrime: An Overview of Phishing and Ransomware by Keri Kruspe\",\"datePublished\":\"2019-12-13T11:00:03+00:00\",\"dateModified\":\"2019-12-13T14:06:46+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/writersfunzone.com\\\/blog\\\/2019\\\/12\\\/13\\\/cybercrime-an-overview-of-phishing-and-ransomware-by-keri-kruspe\\\/\"},\"wordCount\":1224,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/writersfunzone.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/writersfunzone.com\\\/blog\\\/2019\\\/12\\\/13\\\/cybercrime-an-overview-of-phishing-and-ransomware-by-keri-kruspe\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/writersfunzone.com\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/11\\\/Cybercrime-An-Overview-of-Phishing-and-Ransomware-by-Keri-Kruspe.png\",\"keywords\":[\"adware\",\"credit card crime theft\",\"cyber attack\",\"cybercrime\",\"hacking\",\"Keri Kruspe\",\"Malware\",\"phishing\",\"ransomware\",\"Social Engineering\",\"Trojan horses\",\"viruses\",\"worms\"],\"articleSection\":[\"Writing Tips\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/writersfunzone.com\\\/blog\\\/2019\\\/12\\\/13\\\/cybercrime-an-overview-of-phishing-and-ransomware-by-keri-kruspe\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/writersfunzone.com\\\/blog\\\/2019\\\/12\\\/13\\\/cybercrime-an-overview-of-phishing-and-ransomware-by-keri-kruspe\\\/\",\"url\":\"https:\\\/\\\/writersfunzone.com\\\/blog\\\/2019\\\/12\\\/13\\\/cybercrime-an-overview-of-phishing-and-ransomware-by-keri-kruspe\\\/\",\"name\":\"Cybercrime: An Overview of Phishing and Ransomware by Keri Kruspe &#183; Writer&#039;s Fun Zone\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/writersfunzone.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/writersfunzone.com\\\/blog\\\/2019\\\/12\\\/13\\\/cybercrime-an-overview-of-phishing-and-ransomware-by-keri-kruspe\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/writersfunzone.com\\\/blog\\\/2019\\\/12\\\/13\\\/cybercrime-an-overview-of-phishing-and-ransomware-by-keri-kruspe\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/writersfunzone.com\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/11\\\/Cybercrime-An-Overview-of-Phishing-and-Ransomware-by-Keri-Kruspe.png\",\"datePublished\":\"2019-12-13T11:00:03+00:00\",\"dateModified\":\"2019-12-13T14:06:46+00:00\",\"description\":\"Novelist Keri Kruspe shares about cybercrime, especially in regards to your bank account or credit cards, and especially about phishing and ransomware.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/writersfunzone.com\\\/blog\\\/2019\\\/12\\\/13\\\/cybercrime-an-overview-of-phishing-and-ransomware-by-keri-kruspe\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/writersfunzone.com\\\/blog\\\/2019\\\/12\\\/13\\\/cybercrime-an-overview-of-phishing-and-ransomware-by-keri-kruspe\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/writersfunzone.com\\\/blog\\\/2019\\\/12\\\/13\\\/cybercrime-an-overview-of-phishing-and-ransomware-by-keri-kruspe\\\/#primaryimage\",\"url\":\"https:\\\/\\\/writersfunzone.com\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/11\\\/Cybercrime-An-Overview-of-Phishing-and-Ransomware-by-Keri-Kruspe.png\",\"contentUrl\":\"https:\\\/\\\/writersfunzone.com\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/11\\\/Cybercrime-An-Overview-of-Phishing-and-Ransomware-by-Keri-Kruspe.png\",\"width\":300,\"height\":300},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/writersfunzone.com\\\/blog\\\/2019\\\/12\\\/13\\\/cybercrime-an-overview-of-phishing-and-ransomware-by-keri-kruspe\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/writersfunzone.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybercrime: An Overview of Phishing and Ransomware by Keri Kruspe\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/writersfunzone.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/writersfunzone.com\\\/blog\\\/\",\"name\":\"Writer's Fun Zone\",\"description\":\"where we go to the edge to play and become better writers\",\"publisher\":{\"@id\":\"https:\\\/\\\/writersfunzone.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/writersfunzone.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/writersfunzone.com\\\/blog\\\/#organization\",\"name\":\"Beth Barany Productions\",\"url\":\"https:\\\/\\\/writersfunzone.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/writersfunzone.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/writersfunzone.com\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/05\\\/cropped-cropped-WFZ_BANNER_DRAFT_NEW_mock_1C_w_edits.jpeg\",\"contentUrl\":\"https:\\\/\\\/writersfunzone.com\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/05\\\/cropped-cropped-WFZ_BANNER_DRAFT_NEW_mock_1C_w_edits.jpeg\",\"width\":1024,\"height\":246,\"caption\":\"Beth Barany Productions\"},\"image\":{\"@id\":\"https:\\\/\\\/writersfunzone.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/bethbarany\\\/\",\"https:\\\/\\\/x.com\\\/BethBarany\",\"http:\\\/\\\/www.linkedin.com\\\/in\\\/bethbarany\\\/\",\"https:\\\/\\\/www.youtube.com\\\/c\\\/BethBarany\",\"https:\\\/\\\/www.instagram.com\\\/bethbarany\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/writersfunzone.com\\\/blog\\\/#\\\/schema\\\/person\\\/6da98818636d0a12baec6dd6b03db168\",\"name\":\"Guest Contributor\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/f3a34f16e4191c23786121e3cb54e0dadf1dd00c7c8ec2686195240a1680e394?s=96&d=identicon&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/f3a34f16e4191c23786121e3cb54e0dadf1dd00c7c8ec2686195240a1680e394?s=96&d=identicon&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/f3a34f16e4191c23786121e3cb54e0dadf1dd00c7c8ec2686195240a1680e394?s=96&d=identicon&r=g\",\"caption\":\"Guest Contributor\"},\"url\":\"https:\\\/\\\/writersfunzone.com\\\/blog\\\/author\\\/guest-contributor\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cybercrime: An Overview of Phishing and Ransomware by Keri Kruspe &#183; Writer&#039;s Fun Zone","description":"Novelist Keri Kruspe shares about cybercrime, especially in regards to your bank account or credit cards, and especially about phishing and ransomware.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/writersfunzone.com\/blog\/2019\/12\/13\/cybercrime-an-overview-of-phishing-and-ransomware-by-keri-kruspe\/","og_locale":"en_US","og_type":"article","og_title":"Cybercrime: An Overview of Phishing and Ransomware by Keri Kruspe &#183; Writer&#039;s Fun Zone","og_description":"Novelist Keri Kruspe shares about cybercrime, especially in regards to your bank account or credit cards, and especially about phishing and ransomware.","og_url":"https:\/\/writersfunzone.com\/blog\/2019\/12\/13\/cybercrime-an-overview-of-phishing-and-ransomware-by-keri-kruspe\/","og_site_name":"Writer&#039;s Fun Zone","article_publisher":"https:\/\/www.facebook.com\/bethbarany\/","article_published_time":"2019-12-13T11:00:03+00:00","article_modified_time":"2019-12-13T14:06:46+00:00","og_image":[{"width":300,"height":300,"url":"https:\/\/writersfunzone.com\/blog\/wp-content\/uploads\/2019\/11\/Cybercrime-An-Overview-of-Phishing-and-Ransomware-by-Keri-Kruspe.png","type":"image\/png"}],"author":"Guest Contributor","twitter_card":"summary_large_image","twitter_creator":"@BethBarany","twitter_site":"@BethBarany","twitter_misc":{"Written by":"Guest Contributor","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/writersfunzone.com\/blog\/2019\/12\/13\/cybercrime-an-overview-of-phishing-and-ransomware-by-keri-kruspe\/#article","isPartOf":{"@id":"https:\/\/writersfunzone.com\/blog\/2019\/12\/13\/cybercrime-an-overview-of-phishing-and-ransomware-by-keri-kruspe\/"},"author":{"name":"Guest Contributor","@id":"https:\/\/writersfunzone.com\/blog\/#\/schema\/person\/6da98818636d0a12baec6dd6b03db168"},"headline":"Cybercrime: An Overview of Phishing and Ransomware by Keri Kruspe","datePublished":"2019-12-13T11:00:03+00:00","dateModified":"2019-12-13T14:06:46+00:00","mainEntityOfPage":{"@id":"https:\/\/writersfunzone.com\/blog\/2019\/12\/13\/cybercrime-an-overview-of-phishing-and-ransomware-by-keri-kruspe\/"},"wordCount":1224,"commentCount":0,"publisher":{"@id":"https:\/\/writersfunzone.com\/blog\/#organization"},"image":{"@id":"https:\/\/writersfunzone.com\/blog\/2019\/12\/13\/cybercrime-an-overview-of-phishing-and-ransomware-by-keri-kruspe\/#primaryimage"},"thumbnailUrl":"https:\/\/writersfunzone.com\/blog\/wp-content\/uploads\/2019\/11\/Cybercrime-An-Overview-of-Phishing-and-Ransomware-by-Keri-Kruspe.png","keywords":["adware","credit card crime theft","cyber attack","cybercrime","hacking","Keri Kruspe","Malware","phishing","ransomware","Social Engineering","Trojan horses","viruses","worms"],"articleSection":["Writing Tips"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/writersfunzone.com\/blog\/2019\/12\/13\/cybercrime-an-overview-of-phishing-and-ransomware-by-keri-kruspe\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/writersfunzone.com\/blog\/2019\/12\/13\/cybercrime-an-overview-of-phishing-and-ransomware-by-keri-kruspe\/","url":"https:\/\/writersfunzone.com\/blog\/2019\/12\/13\/cybercrime-an-overview-of-phishing-and-ransomware-by-keri-kruspe\/","name":"Cybercrime: An Overview of Phishing and Ransomware by Keri Kruspe &#183; Writer&#039;s Fun Zone","isPartOf":{"@id":"https:\/\/writersfunzone.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/writersfunzone.com\/blog\/2019\/12\/13\/cybercrime-an-overview-of-phishing-and-ransomware-by-keri-kruspe\/#primaryimage"},"image":{"@id":"https:\/\/writersfunzone.com\/blog\/2019\/12\/13\/cybercrime-an-overview-of-phishing-and-ransomware-by-keri-kruspe\/#primaryimage"},"thumbnailUrl":"https:\/\/writersfunzone.com\/blog\/wp-content\/uploads\/2019\/11\/Cybercrime-An-Overview-of-Phishing-and-Ransomware-by-Keri-Kruspe.png","datePublished":"2019-12-13T11:00:03+00:00","dateModified":"2019-12-13T14:06:46+00:00","description":"Novelist Keri Kruspe shares about cybercrime, especially in regards to your bank account or credit cards, and especially about phishing and ransomware.","breadcrumb":{"@id":"https:\/\/writersfunzone.com\/blog\/2019\/12\/13\/cybercrime-an-overview-of-phishing-and-ransomware-by-keri-kruspe\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/writersfunzone.com\/blog\/2019\/12\/13\/cybercrime-an-overview-of-phishing-and-ransomware-by-keri-kruspe\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/writersfunzone.com\/blog\/2019\/12\/13\/cybercrime-an-overview-of-phishing-and-ransomware-by-keri-kruspe\/#primaryimage","url":"https:\/\/writersfunzone.com\/blog\/wp-content\/uploads\/2019\/11\/Cybercrime-An-Overview-of-Phishing-and-Ransomware-by-Keri-Kruspe.png","contentUrl":"https:\/\/writersfunzone.com\/blog\/wp-content\/uploads\/2019\/11\/Cybercrime-An-Overview-of-Phishing-and-Ransomware-by-Keri-Kruspe.png","width":300,"height":300},{"@type":"BreadcrumbList","@id":"https:\/\/writersfunzone.com\/blog\/2019\/12\/13\/cybercrime-an-overview-of-phishing-and-ransomware-by-keri-kruspe\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/writersfunzone.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Cybercrime: An Overview of Phishing and Ransomware by Keri Kruspe"}]},{"@type":"WebSite","@id":"https:\/\/writersfunzone.com\/blog\/#website","url":"https:\/\/writersfunzone.com\/blog\/","name":"Writer's Fun Zone","description":"where we go to the edge to play and become better writers","publisher":{"@id":"https:\/\/writersfunzone.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/writersfunzone.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/writersfunzone.com\/blog\/#organization","name":"Beth Barany Productions","url":"https:\/\/writersfunzone.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/writersfunzone.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/writersfunzone.com\/blog\/wp-content\/uploads\/2021\/05\/cropped-cropped-WFZ_BANNER_DRAFT_NEW_mock_1C_w_edits.jpeg","contentUrl":"https:\/\/writersfunzone.com\/blog\/wp-content\/uploads\/2021\/05\/cropped-cropped-WFZ_BANNER_DRAFT_NEW_mock_1C_w_edits.jpeg","width":1024,"height":246,"caption":"Beth Barany Productions"},"image":{"@id":"https:\/\/writersfunzone.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/bethbarany\/","https:\/\/x.com\/BethBarany","http:\/\/www.linkedin.com\/in\/bethbarany\/","https:\/\/www.youtube.com\/c\/BethBarany","https:\/\/www.instagram.com\/bethbarany\/"]},{"@type":"Person","@id":"https:\/\/writersfunzone.com\/blog\/#\/schema\/person\/6da98818636d0a12baec6dd6b03db168","name":"Guest Contributor","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/f3a34f16e4191c23786121e3cb54e0dadf1dd00c7c8ec2686195240a1680e394?s=96&d=identicon&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/f3a34f16e4191c23786121e3cb54e0dadf1dd00c7c8ec2686195240a1680e394?s=96&d=identicon&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f3a34f16e4191c23786121e3cb54e0dadf1dd00c7c8ec2686195240a1680e394?s=96&d=identicon&r=g","caption":"Guest Contributor"},"url":"https:\/\/writersfunzone.com\/blog\/author\/guest-contributor\/"}]}},"_links":{"self":[{"href":"https:\/\/writersfunzone.com\/blog\/wp-json\/wp\/v2\/posts\/22468","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/writersfunzone.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/writersfunzone.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/writersfunzone.com\/blog\/wp-json\/wp\/v2\/users\/12"}],"replies":[{"embeddable":true,"href":"https:\/\/writersfunzone.com\/blog\/wp-json\/wp\/v2\/comments?post=22468"}],"version-history":[{"count":1,"href":"https:\/\/writersfunzone.com\/blog\/wp-json\/wp\/v2\/posts\/22468\/revisions"}],"predecessor-version":[{"id":22475,"href":"https:\/\/writersfunzone.com\/blog\/wp-json\/wp\/v2\/posts\/22468\/revisions\/22475"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/writersfunzone.com\/blog\/wp-json\/wp\/v2\/media\/22470"}],"wp:attachment":[{"href":"https:\/\/writersfunzone.com\/blog\/wp-json\/wp\/v2\/media?parent=22468"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/writersfunzone.com\/blog\/wp-json\/wp\/v2\/categories?post=22468"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/writersfunzone.com\/blog\/wp-json\/wp\/v2\/tags?post=22468"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}