Cybercriminal: What it is, what they do, and simple ways to stay safe

Cybercriminal

What it is

A cybercriminal is someone who commits crimes using computers or the internet—either as the weapon, the target, or both. Think data theft, online scams, and break-ins that happen through screens instead of doors.

What they do (common plays)

  • Data & identity theft: steal logins, personal info, or payment data to cash out later.

  • Online scams & fraud: fake stores, phishing emails, tech-support cons.

  • Malware campaigns: ransomware, keyloggers, info-stealers, botnets.

  • Denial-of-Service (DoS/DDoS): flood a site or app so it goes offline.

  • Cybervandalism: defacing sites, deleting data, or leaking content.

How they operate

  • Social engineering: trick people into clicking, paying, or sharing secrets.

  • Exploiting weak spots: unpatched apps, exposed remote access, reused passwords.

  • Dark-web markets: buy/sell stolen data, malware kits, and “hacking as a service.”

Protect yourself (quick basics)

  • Use strong, unique passwords + MFA everywhere you can.

  • Keep devices, browsers, and apps updated.

  • Be skeptical of links, attachments, and sudden “urgent” messages.

  • Back up important files offline; consider DNS filtering/AV.

  • Verify money or account changes out of band (call the sender).

    Glossary (A–Z)

    All A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
      • Related Articles

      • Social Engineering

        What it is Social engineering is tricking people into doing something they shouldn’t - like clicking a link, sharing a code, or paying a fake invoice. Instead of hacking computers, attackers hack trust with stories that feel urgent, helpful, or ...
      • Data Exfiltration

        What it is Data exfiltration is the unauthorized transfer of your data out of your device or network—quietly slipping customer records, passwords, designs, or finances to an attacker. It’s the punchline of many breaches: get in, get data out, cash ...
      • Data Execution Prevention

        What it is Data Execution Prevention (DEP) is a Windows safety net that stops code from running in places it shouldn’t—like the stack or heap. If malware tries to execute from those memory areas, Windows blocks it and shuts the app down instead of ...
      • Data Breach

        What it is A data breach is when someone gets into a company’s systems without permission and steals sensitive info—customer names, emails, passwords, payment details, medical records, and more. For overview: see our data breach guide How it happens ...
      • Reverse Engineering

        What it is Reverse engineering is the practice of analyzing a finished product to understand how it works. In software, that means disassembly, decompilation, and dynamic debugging to recover logic, data formats, or protocols. In hardware, it can ...