Christmas:delivery times may be affected.

On this Safer Internet Day(07/02), we address a subject that, increasingly, threatens our online security. The cybercrime landscape is fertile ground for criminal activities that target or exploit the fragility of computers, networks or connected devices. While not all cybercrimes are financially motivated, the majority are carried out by cybercriminals or hackers looking for profit. However, in some cases, cybercrime may have personal or political motivations, leading to deliberate damage to computer systems.

A cybercrime can be committed by individuals or organizations, varying in levels of technical sophistication. Some are highly trained and organized experts, while others are new to the art of hacking.

The types of cyber crimes are diverse:

  • Email and Internet fraud;
  • Identity theft, with the subsequent use of personal information;
  • Loss of financial or payment card data;
  • Commercialization of stolen corporate data;
  • Virtual extortion, demanding payment to avoid threats;
  • Ransomware attacks, a form of digital extortion;
  • Cryptojacking, in which hackers exploit computing resources to mine cryptocurrencies;
  • Cyber ​​espionage, involving unauthorized access to government or business data;
  • Intrusion into systems with the intention of compromising networks;
  • Copyright infringement;
  • Illegal gambling;
  • Online trade of illegal items.

These cyber crimes can be classified into two main categories:

  1. Criminal activity that directly affects computer systems, using viruses and other types of malware.
  2. Criminal activity that uses computers as a tool to perpetrate other types of crimes.

Cybercriminals often mix both approaches, initially infecting systems with malware and then using them as platforms to spread further chaos. Furthermore, in some jurisdictions there is recognition of a third category, where a computer is used as an accessory to the crime, for example, to store illegally obtained data.

Notorious examples of cybercrime illustrate the diversity and complexity of these attacks:

  • Malware attacks, such as the infamous WannaCry, which paralyzed more than 230,000 computers in 150 countries in 2017, demanding a Bitcoin ransom to unlock affected systems.
  • Phishing campaigns, such as the scam during the 2018 World Cup, which tricked fans into disclosing personal data through fraudulent emails offering supposed free trips.
  • Distributed denial of service (DDoS) attacks, such as the one targeted at the UK national lottery website in 2017, which disrupted access and were suspected of blackmailing the lottery.


The impact of cybercrime is significant, with a 31% increase in security attacks from 2020 to 2021, affecting businesses and individuals. Financial losses and reputational damage can be devastating, highlighting the urgent need for effective preventative and response measures.

Given its frequency, you may be wondering: how to combat cybercrime? Here are some practical tips to protect your computer and personal data against cybercrime:

  1. Keep your software and operating system up to date: Ensure you keep your software and operating system up to date to benefit from the latest security fixes and protect your system.
  2. Use antivirus software and keep it updated: Reliable antivirus software can help detect and remove threats before they become problems. Keep your antivirus updated to ensure maximum protection.
  3. Use strong passwords: Avoid easy-to-guess passwords and consider using a password manager to create and store strong passwords.
  4. Be wary of spam email attachments: Never open email attachments from unknown senders as they may contain malware.
  5. Avoid clicking on links in suspicious emails or on unknown websites: Links in spam emails or untrustworthy websites can lead to cyber attacks. Avoid clicking on them.
  6. Do not disclose personal information without being sure of its security: Never provide personal information over the phone or email unless you are sure of the source's security.
  7. Confirm suspicious requests directly with the company: If you receive requests for personal information over the phone, hang up and contact the company directly to confirm the request.
  8. Check website URLs: Make sure the websites you visit have legitimate URLs and avoid clicking on suspicious links.
  9. Monitor your bank transactions: Keep an eye out for any suspicious activity on your bank statements and contact your bank if you identify unauthorized transactions.


Following these practices can help protect your data and computer from cyber threats.

If you have been a victim of this type of crime, you can report it using a form on the Judicial Police website or report the crime directly on the Public Prosecutor's Office website .

Leave a comment

Please note, comments need to be approved before they are published.

This site is protected by hCaptcha and the hCaptcha Privacy Policy and Terms of Service apply.

Latest Stories

This section doesn’t currently include any content. Add content to this section using the sidebar.