Shortcuts:.

How Cyber Criminals Operate | Catching Cyber Criminals |Cyberspace's Most Wanted

Knowledge is the best weapon against cyber criminals. The more you know about cyber criminals the more you can help to defeat them.

Cyberspace's Most Wanted Cyber Criminals

The Master Hacker

Real Name: Ex-Commander Nils
Location: Cyberspace Detention Center
Primary attack: Hacking
Weakness: Protecting your Personal Information, Firewalls

[+] Bio

Elvirus

Real Name: Unknown
Location: Email attachments, downloaded files
Primary attack: Virus
Weakness: Anti-malware software, the cold shoulder

[+] Bio

Ms. Information

Real Name: Unknown
Location: Websites
Primary attack: Misinformation, Lies
Weakness: Reliable websites, the cold shoulder

[+] Bio

M.C. Spammer

Real Name: Unknown
Location: Email
Primary attack: Spam
Weakness: Spam filters, the cold shoulder

[+] Bio

The ID Bandit

Real Name: Unknown
Location: Email, websites, online communications
Primary attack: Identity Theft
Weakness: Protecting your personal information

[+] Bio

The Phisherman

Real Name: Unknown
Location:Email, Websites
Primary attack: Phishing
Weakness:Phishing filters, reporting to authorities, the cold shoulder

[+] Bio

Captain Jack Plunder

Real Name: Unknown
Location: Peer-to-peer software, downloadable files
Primary attack: Cyber piracy
Weakness: Reporting to authorities, avoiding downloads

[+] Bio

 

Currently in the Detention Center

The Dis Guys

Real Name: Unknown
Location: Chat rooms, Instant Messengers
Primary attack: Stealing personal information, Identity theft
Weakness: Reporting to Authorities, the cold shoulder

[+] Bio

The Bad Hatter

Real Name: Unknown
Location: Cyberspace Detention Center
Primary attack: Hacking Reality
Weakness: Overconfidence

[+] Bio