Translate

Saturday, April 15, 2017

Thieves Will Ruin Your Life With This Nasty Computer Crime

We love our technology and electronic gadgets, but with the good comes the bad and some of that 'bad' is computer crimes. When you think of identity theft, you usually think of someone stealing your identity. But what if you unknowingly download a virus that allows thieves to ruin your reputation when you've done absolutely nothing wrong? Find out how this is possible

The Computer Cyber Crime That Ruins Reputations
There are many types of computer crimes but According to Associated Press, it is possible to have your computer taken over by pedophiles through viruses. They download child pornography to your computer. They get their fix, and you get the blame.

Think this couldn't happen to you? You may want to re-think that.

In 2007 Michael Fiola's bosses became suspicious when they discovered he had 4 1/2 times more data on his computer than his co-workers. A technician found that Michael had child pornography stored in his images folder.

After 11 months, spending $790,000 in legal fees, having his and his wife's reputation ruined, and health issues due to the stress, Michael was finally cleared after proof showed his laptop was severely infected with a virus that was programmed to visit as many as 40 child porn sites per minute.

Of course, it took him the better part of 10 years to finally clear his name. Do you have that amount of time and finances to cope with a ten year fight? What about your loved ones? Your Family? Will they too stand by you for this long fight?

Through a virus, a pedophile had logged on to Michael's laptop and downloaded the porn. Unfortunately, it doesn't have to be a pedophile that does this. Anyone who wants to play a sick joke or frame you can do this.

You Can Prevent this from Happening to You
Bryan Oakley is a special agent with the FBI who works pedophilia cases. He states, "Nationwide I've only found four cases where someone has by malicious intent of another person had child pornography put on their computer. Pedophiles generally want immediate access to their material.

With it being remotely stored they don't have immediate access to that material."

Oakley uses a laptop or home computer for example. "When they want to access it, it may be off your network may be down, they no longer have access to that data," Oakley added.

In view of this, you don't have to be overly concerned about this type of a computer crime happening to you. To protect yourself from computer crime, install reputable anti-virus software and avoid downloading illegal software. Most of the time, internet users get viruses from free downloads and illegal downloads.




  • bird
Powered By Blogger

Labels

Abduction (2) Abuse (3) Advertisement (1) Agency By City (1) Agency Service Provided Beyond Survival Sexual Assault (1) Aggressive Driving (1) Alcohol (1) ALZHEIMER'S DISEASE (2) Anti-Fraud (2) Aspartame (1) Assault (1) Auto Theft Prevention (9) Better Life (1) Books (1) Bribery (1) Bullying (1) Burglary (30) Car Theft (8) Carjackng (2) Child Molestation (5) Child Sexual Abuse (1) Child Abuse (2) Child Kidnapping (3) Child Porn (1) Child Rape (3) Child Safety (18) Child Sexual Abuse (9) Child Violence (1) Classification of Crime (1) Club Drugs (1) College (1) Computer (4) Computer Criime (4) Computer Crime (8) Confessions (2) CONFESSIONS (7) Cons (2) Credit Card Scams (2) Crime (11) Crime Index (3) Crime Prevention Tips (14) Crime Tips (31) Criminal Activity (1) Criminal Behavior (3) Crimm (1) Cyber-Stalking (2) Dating Violence (1) Deviant Behavior (6) Domestic Violence (7) E-Scams And Warnings (1) Elder Abuse (9) Elder Scams (1) Empathy (1) Extortion (1) Eyeballing a Shopping Center (1) Facebook (9) Fakes (1) Family Security (1) Fat People (1) FBI (1) Federal Law (1) Financial (2) Fire (1) Fraud (9) FREE (4) Fun and Games (1) Global Crime on World Wide Net (1) Golden Rules (1) Government (1) Guilt (2) Hackers (1) Harassment (1) Help (2) Help Needed (1) Home Invasion (2) How to Prevent Rape (1) ID Theft (96) Info. (1) Intent (1) Internet Crime (6) Internet Fraud (1) Internet Fraud and Scams (7) Internet Predators (1) Internet Security (30) Jobs (1) Kidnapping (1) Larceny (2) Laughs (3) Law (1) Medician and Law (1) Megans Law (1) Mental Health (1) Mental Health Sexual (1) Misc. (11) Missing Cash (5) Missing Money (1) Moner Matters (1) Money Matters (1) Money Saving Tips (11) Motive (1) Murder (1) Note from Birdy (1) Older Adults (1) Opinion (1) Opinions about this article are Welcome. (1) Personal Note (2) Personal Security and Safety (12) Porn (1) Prevention (2) Price of Crime (1) Private Life (1) Protect Our Kids (1) Protect Yourself (1) Protection Order (1) Psychopath (1) Psychopathy (1) Psychosis (1) PTSD (2) Punishment (1) Quoted Text (1) Rape (66) Ravishment (4) Read Me (1) Recovery (1) Regret (1) Religious Rape (1) Remorse (1) Road Rage (1) Robbery (5) Safety (2) SCAM (19) Scams (62) Schemes (1) Secrets (2) Security Threats (1) Serial Killer (2) Serial Killer/Rapist (4) Serial Killers (2) Sexual Assault (16) Sexual Assault - Spanish Version (3) Sexual Assault against Females (5) Sexual Education (1) Sexual Harassment (1) Sexual Trauma. (4) Shame (1) Sociopath (2) Sociopathy (1) Spam (6) Spyware (1) SSN's (4) Stalking (1) State Law (1) Stress (1) Survival (2) Sympathy (1) Tax Evasion (1) Theft (13) this Eve (1) Tips (13) Tips on Prevention (14) Travel (5) Tricks (1) Twitter (1) Unemployment (1) Victim (1) Victim Rights (9) Victimization (1) Violence against Women (1) Violence. (3) vs. (1) Vulnerable Victims (1) What Not To Buy (2)