{"id":225,"date":"2007-10-10T14:47:57","date_gmt":"2007-10-10T19:47:57","guid":{"rendered":"http:\/\/70.86.87.84\/?p=225"},"modified":"2007-10-10T14:47:57","modified_gmt":"2007-10-10T19:47:57","slug":"computer-scams-spring-from-digital-back-alleys","status":"publish","type":"post","link":"https:\/\/www.pcmatic.com\/blog\/computer-scams-spring-from-digital-back-alleys\/","title":{"rendered":"Computer Scams Spring from Digital Back Alleys"},"content":{"rendered":"<p><b><\/p>\n<p>A peek inside online crime<br \/>\nhubs<\/p>\n<p><\/b><\/p>\n<p><b><\/p>\n<p>Bill Zahren<\/p>\n<p><\/b><\/p>\n<p><img decoding=\"async\" style=\"FLOAT: left; MARGIN: 8px\" height=137 src=\"\/images\/news\/billz.JPG\" width=110><\/p>\n<p>\nSomewhere, right now, deep in the bowels of an anonymous<br \/>\nserver in a dark room in, say, Iran,<br \/>\na &#8220;carder forum&#8221; is brewing up the next scheme aimed at stealing your money. <\/p>\n<p>\nCarder forums and chat rooms are highly exclusive online<br \/>\nbazaars where criminals who embrace the dark side of technology meet to<br \/>\nexchange the information and criminal services that create what&#8217;s been called a<br \/>\nshadow, &#8220;microeconomy.&#8221;<\/p>\n<p>\nSecurity experts call these forums &#8220;the Wal-Mart of the<br \/>\nunderground&#8221; where anything you need to commit electronic crimes is for sale or<br \/>\nbarter.<\/p>\n<p>\nIn these digital back alleys, you can hire &#8220;bot<br \/>\nmasters&#8221; to unleash legions of contaminated computers on a vast array of tasks.<br \/>\nOne of those bots may be lurking inside your computer right now. Waiting for<br \/>\nthe secret, back-channel command to awaken and carry out some nefarious task. <\/p>\n<p>\nDatabases filled with hundreds or thousands of stolen<br \/>\nidentities, hacked bank accounts and compromised credit card numbers are<br \/>\noffered for sale. You can also find &#8220;cashers&#8221; looking to buy information they<br \/>\ncan convert into cash and merchandise. Others offer to recruit unsuspecting &#8220;mules&#8221;<br \/>\nto serve as the final link that turns a digital scam into physical currency. <\/p>\n<p>\nIronically the forums feature extreme security measures and<br \/>\nare run by bosses who thoroughly vet and police participants. Forum leaders even<br \/>\ntry to assimilate rival forums by force in digital gangland-style takeovers.<\/p>\n<p>\nCreation of online<br \/>\nscams is no longer the work of loners cranking out code in darkened rooms.<br \/>\nToday&#8217;s torrent of spam, phishing scams and other online schemes are the product<br \/>\nof a thriving criminal economy where people have developed specialties and<br \/>\ncollaboration and collusion is the rule rather the exception.<\/p>\n<p>\nThese are real,<br \/>\nruthless criminals, cloaked in the anonymity of the Internet and motivated by<br \/>\nbillions of dollars of profit. David DeWalt, CEO of security giant McAfee says<br \/>\nonline scams of all types now cost businesses and individuals $105 billion a<br \/>\nyear, surpassing the value of the worldwide illegal drug trade.<\/p>\n<p>Given the relatively low costs for electronic messages,<br \/>\nemail, pseudo Web sites and the like, online scams can quickly deliver 1000<br \/>\npercent return on investment. A November 2006 Trend Micro white paper on<br \/>\nphishing details arrested criminals who turned $60 software into $100,000 in<br \/>\nprofits. Another was generating $430 every day, automatically, at the time of<br \/>\narrest.<\/p>\n<p>The &#8220;bad guys&#8221; ruthlessly exploit any opportunity to fleece<br \/>\nunsuspecting computer users. Nothing is sacred. Shortly after Hurricane Katrina<br \/>\nmade confetti of much of the gulf coast, killing scores of people and leaving<br \/>\nthird-world suffering in her wake, the phish were swarming with fake &#8220;donate to<br \/>\nhelp Katrina Victims&#8221; email. <\/p>\n<p>Digital gangsters<br \/>\nare even fine with cashing in on terrorism. One superforum leader recently<br \/>\nbragged that its main server is located in Iran, perhaps the country that&#8217;s least likely to<br \/>\ncooperate with U.S.law-enforcement authorities.<\/p>\n<p>In 2004, law<br \/>\nenforcement briefly disrupted these forums by infiltrating and arresting<br \/>\nparticipants. The forums reacted like an attacked virus &#8211; mutating and<br \/>\nreforming in more secure, more dispersed forms. Today law enforcement agents<br \/>\nliken chasing online criminals to chasing terrorists in Afghanistan; you know they are out there, but finding all<br \/>\ntheir caves and hiding places is virtually impossible.<\/p>\n<p>Experts agree the best<br \/>\nweapon in the battle against the digital underground remains consumer awareness<br \/>\nand caution. John Thompson, CEO of security giant Symantec (maker of the Norton<br \/>\nsuite of protection products) told USA Today that Internet users must develop a<br \/>\n&#8220;sixth sense about security&#8221; just as they have about being sure to lock their<br \/>\nhouses and cars and sense when situations in the real world are inherently<br \/>\ndangerous.<\/p>\n<p>As diabolical as<br \/>\nthe online criminals are, their schemes often come down to the ability to<br \/>\ndeceive someone into providing personal data. Following some basic online<br \/>\nguidelines for thwarting Internet crime can dramatically reduce your<br \/>\nchances of being victimized and take some buzz out of the buzzing forums.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>A peek inside online crime<br \/>\nhubs<\/p>\n<p>Bill Zahren<\/p>\n<p><img decoding=\"async\" style=\"FLOAT: left; MARGIN: 8px\" height=137 src=\"\/images\/news\/billz.JPG\" width=110\/><\/p>\n<p>\nSomewhere, right now, deep in the bowels of an anonymous<br \/>\nserver in a dark room in, say, Iran,<br \/>\na &#8220;carder forum&#8221; is brewing up the next scheme aimed at stealing your money. <\/p>\n<p>\nCarder forums and chat rooms are highly exclusive online<br \/>\nbazaars where criminals who embrace the dark side of technology meet to<br \/>\nexchange the information and criminal services that create what&#8217;s been called a<br \/>\nshadow, &#8220;microeconomy.&#8221;<\/p>\n","protected":false},"author":6,"featured_media":66012,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[12],"tags":[246],"class_list":["post-225","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-the-pit-blog","tag-email"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Computer Scams Spring from Digital Back Alleys<\/title>\n<meta name=\"description\" content=\"A peek inside online crime hubs Bill Zahren   Somewhere, right now, deep in the bowels of an anonymous server in a dark room in, say, Iran, a &quot;carder forum&quot; is brewing up the next scheme aimed at stealing your money.  Carder forums and chat rooms are highly exclusive online bazaars where criminals who embrace the dark side of technology meet to exchange the information and criminal services that create what&#039;s been called a shadow, &quot;microeconomy.&quot;\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.pcmatic.com\/blog\/computer-scams-spring-from-digital-back-alleys\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Computer Scams Spring from Digital Back Alleys\" \/>\n<meta property=\"og:description\" content=\"A peek inside online crime hubs Bill Zahren   Somewhere, right now, deep in the bowels of an anonymous server in a dark room in, say, Iran, a &quot;carder forum&quot; is brewing up the next scheme aimed at stealing your money.  Carder forums and chat rooms are highly exclusive online bazaars where criminals who embrace the dark side of technology meet to exchange the information and criminal services that create what&#039;s been called a shadow, &quot;microeconomy.&quot;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.pcmatic.com\/blog\/computer-scams-spring-from-digital-back-alleys\/\" \/>\n<meta property=\"og:site_name\" content=\"PC Matic Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/pcmatic\" \/>\n<meta property=\"article:published_time\" content=\"2007-10-10T19:47:57+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/pcmatic-fallback.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"1080\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"billz\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@pcmatic\" \/>\n<meta name=\"twitter:site\" content=\"@pcmatic\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"billz\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/computer-scams-spring-from-digital-back-alleys\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/computer-scams-spring-from-digital-back-alleys\\\/\"},\"author\":{\"name\":\"billz\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/person\\\/33874a99941c6c9575a8b2ebba2a9df2\"},\"headline\":\"Computer Scams Spring from Digital Back Alleys\",\"datePublished\":\"2007-10-10T19:47:57+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/computer-scams-spring-from-digital-back-alleys\\\/\"},\"wordCount\":659,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/computer-scams-spring-from-digital-back-alleys\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/pcmatic-fallback.png\",\"keywords\":[\"email\"],\"articleSection\":[\"The Pit Blog\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/computer-scams-spring-from-digital-back-alleys\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/computer-scams-spring-from-digital-back-alleys\\\/\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/computer-scams-spring-from-digital-back-alleys\\\/\",\"name\":\"Computer Scams Spring from Digital Back Alleys\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/computer-scams-spring-from-digital-back-alleys\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/computer-scams-spring-from-digital-back-alleys\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/pcmatic-fallback.png\",\"datePublished\":\"2007-10-10T19:47:57+00:00\",\"description\":\"A peek inside online crime hubs Bill Zahren Somewhere, right now, deep in the bowels of an anonymous server in a dark room in, say, Iran, a \\\"carder forum\\\" is brewing up the next scheme aimed at stealing your money. Carder forums and chat rooms are highly exclusive online bazaars where criminals who embrace the dark side of technology meet to exchange the information and criminal services that create what's been called a shadow, \\\"microeconomy.\\\"\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/computer-scams-spring-from-digital-back-alleys\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/computer-scams-spring-from-digital-back-alleys\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/computer-scams-spring-from-digital-back-alleys\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/pcmatic-fallback.png\",\"contentUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/pcmatic-fallback.png\",\"width\":1920,\"height\":1080},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/computer-scams-spring-from-digital-back-alleys\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Computer Scams Spring from Digital Back Alleys\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\",\"name\":\"PC Matic Blog\",\"description\":\"Tech Tips and Tricks\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\",\"name\":\"PC Matic - Top Antivirus Company in the USA.\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/techtalk.pcmatic.com\\\/wp-content\\\/uploads\\\/PC-MaticLogo-e1472689639222.png\",\"contentUrl\":\"https:\\\/\\\/techtalk.pcmatic.com\\\/wp-content\\\/uploads\\\/PC-MaticLogo-e1472689639222.png\",\"width\":1535,\"height\":483,\"caption\":\"PC Matic - Top Antivirus Company in the USA.\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/pcmatic\",\"https:\\\/\\\/x.com\\\/pcmatic\",\"https:\\\/\\\/www.instagram.com\\\/pcmaticusa\\\/\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/pcmatic\",\"https:\\\/\\\/www.youtube.com\\\/c\\\/PCMaticVideo\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/person\\\/33874a99941c6c9575a8b2ebba2a9df2\",\"name\":\"billz\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/author\\\/billz\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Computer Scams Spring from Digital Back Alleys","description":"A peek inside online crime hubs Bill Zahren   Somewhere, right now, deep in the bowels of an anonymous server in a dark room in, say, Iran, a \"carder forum\" is brewing up the next scheme aimed at stealing your money.  Carder forums and chat rooms are highly exclusive online bazaars where criminals who embrace the dark side of technology meet to exchange the information and criminal services that create what's been called a shadow, \"microeconomy.\"","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.pcmatic.com\/blog\/computer-scams-spring-from-digital-back-alleys\/","og_locale":"en_US","og_type":"article","og_title":"Computer Scams Spring from Digital Back Alleys","og_description":"A peek inside online crime hubs Bill Zahren   Somewhere, right now, deep in the bowels of an anonymous server in a dark room in, say, Iran, a \"carder forum\" is brewing up the next scheme aimed at stealing your money.  Carder forums and chat rooms are highly exclusive online bazaars where criminals who embrace the dark side of technology meet to exchange the information and criminal services that create what's been called a shadow, \"microeconomy.\"","og_url":"https:\/\/www.pcmatic.com\/blog\/computer-scams-spring-from-digital-back-alleys\/","og_site_name":"PC Matic Blog","article_publisher":"https:\/\/www.facebook.com\/pcmatic","article_published_time":"2007-10-10T19:47:57+00:00","og_image":[{"width":1920,"height":1080,"url":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/pcmatic-fallback.png","type":"image\/png"}],"author":"billz","twitter_card":"summary_large_image","twitter_creator":"@pcmatic","twitter_site":"@pcmatic","twitter_misc":{"Written by":"billz","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.pcmatic.com\/blog\/computer-scams-spring-from-digital-back-alleys\/#article","isPartOf":{"@id":"https:\/\/www.pcmatic.com\/blog\/computer-scams-spring-from-digital-back-alleys\/"},"author":{"name":"billz","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/person\/33874a99941c6c9575a8b2ebba2a9df2"},"headline":"Computer Scams Spring from Digital Back Alleys","datePublished":"2007-10-10T19:47:57+00:00","mainEntityOfPage":{"@id":"https:\/\/www.pcmatic.com\/blog\/computer-scams-spring-from-digital-back-alleys\/"},"wordCount":659,"commentCount":0,"publisher":{"@id":"https:\/\/www.pcmatic.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/computer-scams-spring-from-digital-back-alleys\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/pcmatic-fallback.png","keywords":["email"],"articleSection":["The Pit Blog"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.pcmatic.com\/blog\/computer-scams-spring-from-digital-back-alleys\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.pcmatic.com\/blog\/computer-scams-spring-from-digital-back-alleys\/","url":"https:\/\/www.pcmatic.com\/blog\/computer-scams-spring-from-digital-back-alleys\/","name":"Computer Scams Spring from Digital Back Alleys","isPartOf":{"@id":"https:\/\/www.pcmatic.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.pcmatic.com\/blog\/computer-scams-spring-from-digital-back-alleys\/#primaryimage"},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/computer-scams-spring-from-digital-back-alleys\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/pcmatic-fallback.png","datePublished":"2007-10-10T19:47:57+00:00","description":"A peek inside online crime hubs Bill Zahren Somewhere, right now, deep in the bowels of an anonymous server in a dark room in, say, Iran, a \"carder forum\" is brewing up the next scheme aimed at stealing your money. Carder forums and chat rooms are highly exclusive online bazaars where criminals who embrace the dark side of technology meet to exchange the information and criminal services that create what's been called a shadow, \"microeconomy.\"","breadcrumb":{"@id":"https:\/\/www.pcmatic.com\/blog\/computer-scams-spring-from-digital-back-alleys\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.pcmatic.com\/blog\/computer-scams-spring-from-digital-back-alleys\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pcmatic.com\/blog\/computer-scams-spring-from-digital-back-alleys\/#primaryimage","url":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/pcmatic-fallback.png","contentUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/pcmatic-fallback.png","width":1920,"height":1080},{"@type":"BreadcrumbList","@id":"https:\/\/www.pcmatic.com\/blog\/computer-scams-spring-from-digital-back-alleys\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.pcmatic.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Computer Scams Spring from Digital Back Alleys"}]},{"@type":"WebSite","@id":"https:\/\/www.pcmatic.com\/blog\/#website","url":"https:\/\/www.pcmatic.com\/blog\/","name":"PC Matic Blog","description":"Tech Tips and Tricks","publisher":{"@id":"https:\/\/www.pcmatic.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.pcmatic.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.pcmatic.com\/blog\/#organization","name":"PC Matic - Top Antivirus Company in the USA.","url":"https:\/\/www.pcmatic.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/techtalk.pcmatic.com\/wp-content\/uploads\/PC-MaticLogo-e1472689639222.png","contentUrl":"https:\/\/techtalk.pcmatic.com\/wp-content\/uploads\/PC-MaticLogo-e1472689639222.png","width":1535,"height":483,"caption":"PC Matic - Top Antivirus Company in the USA."},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/pcmatic","https:\/\/x.com\/pcmatic","https:\/\/www.instagram.com\/pcmaticusa\/","https:\/\/www.linkedin.com\/company\/pcmatic","https:\/\/www.youtube.com\/c\/PCMaticVideo"]},{"@type":"Person","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/person\/33874a99941c6c9575a8b2ebba2a9df2","name":"billz","url":"https:\/\/www.pcmatic.com\/blog\/author\/billz\/"}]}},"_links":{"self":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts\/225","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/comments?post=225"}],"version-history":[{"count":0,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts\/225\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/media\/66012"}],"wp:attachment":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/media?parent=225"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/categories?post=225"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/tags?post=225"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}