What is the punishment for cyber crime in Philippines? malicious software, abbreviated as “malware”, refers to any intrusive software designed by cyber criminals in their quest to steal data and damage or destroy computers and computer systems, The majority of malware infections happen when you accidentally perform an action that results in downloading malware. This could be clicking a link in an email or visiting a malicious website.
In some cases, hackers spread malware via file-sharing services and free software downloads. Mobile devices are not equally safe from malware as they can also be infected via text messages.
Types Of Malware
Viruses
Viruses are part of malware. Viruses are malicious software attached to documents or files that support macros to run their code and pass it from host to host. Once downloaded, the virus remains inactive until the file is opened and used. Viruses are meant to damage system functionality. Consequently, viruses can cause significant operational problems and loss of data on the device.
Worms
Worms are malicious software that multiplies rapidly and spread to every device on the network. Unlike viruses, worms do not require a host distribution program. The worm infects devices via downloaded files or network connections before multiplying and spreading exponentially. Like viruses, worms can equally seriously disrupt devices and cause loss of data.
Trojan viruses
Trojan viruses masquerade as useful software programs. But once the user downloads it, the Trojan can access sensitive data and then modify, block or delete that data. This can be very detrimental to the operation of the device. Unlike normal viruses and worms, Trojan viruses are not designed to reproduce themselves.
Spyware
Spyware is malicious software that silently runs on computers and reports back to remote users. Rather than just disrupting the device, spyware targets sensitive information and can give attackers remote access. Spyware is usually employed by cybercriminals when they want to steal either financial or personal information from individuals. A certain type of spyware known as a keylogger records your keystrokes to reveal passwords and personal information.
Advertising Software (Adware)
Adware is malicious software that is used to collect data about how your computer is used and provide you with relevant advertisements. While adware is not always harmful, in some cases it can cause problems in your system. Adware can redirect your browser to dangerous websites and may even contain trojans and spyware.
Ransomware
Ransomware is malicious software that accesses sensitive information on a system, encrypts that information so that users cannot access it, and then demands monetary rewards for releasing the data. By clicking on a hidden link, the user downloads the ransomware. The attacker encrypts certain information that can only be unlocked with a known mathematical key. When the attacker receives the payment, the data is not locked.
Fileless Malware
Fileless malware is a type of malware that resides in memory. This malware runs from the victim’s computer memory, not files on the hard drive. Since there are no files to scan, it is more difficult to detect than traditional malware. It also complicates forensics as the malware disappears when the victim’s computer is restarted.
Malware Punishment in the Philippines
Punishment for malware offenders is provided for in the REPUBLIC ACT NO. 10175 of the Philippines.
Offenses
System interference
Willingly altering or recklessly preventing or interfering with the operation of any computer or computer network by inserting, transmitting, destroying, deleting, disparaging, altering, or hiding any computer data or program, electronic document, or electronic data message without any right or authority, including the introduction or transmission of the virus.
Data Tampering
Change, damage, delete, or decrease the quality of computer data, electronic documents, or electronic data messages intentionally or without rights, including the introduction or transmission of viruses.
Punishment
Any individual guilty of the above is liable for imprisonment by the mayor of the correctional institution or a fine of at least two hundred thousand pesos (PHP 200,000) up to a maximum amount commensurate with the loss caused, or both imprisonment and fine.
If a crime has been committed against critical infrastructure in the above cases, a penalty of expulsion or a fine of at least PHP 500,000.00 up to a maximum amount commensurate with the damage caused, or both, will be imposed.
HOW DO I FIND MY NEXT READ?
- CISCO PRIVILEGE LEVELS LIST
- HOW TO GET WI-FI PASSWORD OF NEIGHBOR’S USING LAPTOP
- HOW DO I FIND MY WORDPRESS ADMIN IP ADDRESS
- FIX CAN’T LOG INTO HUAWEI ROUTER
- HOW TO SETUP HUAWEI 4G ROUTER
- HOW TO CONFIGURE HUAWEI ROUTER AS WIRELESS ACCESS POINT
- HOW TO ENTER BIOS WINDOWS 10 WITHOUT UEFI
- HOW TO ENTER BIOS WINDOWS 10 LENOVO
- HOW TO CREATE FAT32 BOOTABLE USB WINDOWS 10
- CISCO PRIVILEGE LEVELS LIST
- MS WORD COMMANDS LIST (SHORTCUT KEYS OF MS WORD 2010)
- SHORTCUT KEY FOR SAVE AS IN MS WORD 2010
- MAKE MONEY BLOGGING
- ROTATE SCREEN WINDOWS 7 KEYBOARD SHORTCUT
- 15 PLACES TO HOST A WORDPRESS WEBSITE FOR FREE
- HOW TO ACCESS WORDPRESS ADMINISTRATION WITHOUT DOMAIN
- MAKE MONEY WITH WORDPRESS IN 48 HOURS
- CHARGE FOR A BLOG POST IN THE UK
- HOW DO I FIND MY WORDPRESS ADMIN IP ADDRESS
- HOW I MAKE MY WORDPRESS THEME NULLED
- 10 REASONS IT IS NOT SAFE TO USE NULLED WORDPRESS THEME
- 10 WAYS WORDPRESS THEMES CAN BE HACKED
- CHARGE FOR A BLOG POST IN INDIA
- LENOVO IDEAPAD 100 BIOS KEY SETUP PROCESS
- COST TO START A BLOG IN INDIA
- HUAWEI WI-FI REPEATER SETUP
- HOW TO USE HUAWEI ROUTER AS WI-FI EXTENDER
- THE USE OF REPEATERS IN COMMUNICATION
- WHAT IS THE DIFFERENCE BETWEEN A BASE STATION AND REPEATER?
- HOW TO BOOST 4G SIGNAL INDOORS
- HOW TO INCREASE MOBILE INTERNET SPEED
- DOES WI-FI USE MICROWAVES OR RADIO WAVES?
- WHAT TYPE OF ELECTROMAGNETIC WAVES ARE USED IN BLUETOOTH DEVICES?