The names, social security numbers and credit card information are examples of what could be stolen with the intent of this information to be misused by the recipients of this information. This information could be sold and would give individuals the necessary information needed to help steal someone’s identity. This could consist of applying for credit or mortgages, working under that person’s identity or committing fraud using the stolen individuals’ …show more content…
Malware could be part of APPS that could be installed on mobile devices or computers. They can perform in virtually any manner the author wants. It can push unwanted images, keep track of personal and financial information or allow your system to be held for ransom. “FruitFly” was the name of a malware program that was used by a local man to illegally collect on unsuspecting individuals. “Phillip Durachinsky, 28, used the malware to steal people's personal information, including usernames, passwords, financial records, medical records, photographs, internet searches and things that might be considered embarrassing, according to the U.S. Attorney's Office in Cleveland. Fruitfly was able to alert Durachinsky if an infected computer's user typed words associated with pornography. It also allowed Durachinsky to turn on an infected computer's microphone and cameras and record people, according to court filings.” (Heisig, 2018). Working in either the private sector trying to prevent hacking or data breaches is needed and I would like to be part of the field to prevent or locate the people who engage in illegal practices to steal personal information of others for the purpose of it being