cybercrime internet vulnerability id theft security hack counterfeiting linux fraud identity theft hacking assessment piracy exploit identity theft protection hacker copyright computer forensics software