BBC Tech

Copycat coders create ‘vulnerable’ apps

Lazy developers who copy solutions to tricky programming problems are creating apps that are vulnerable to attack, research suggests. A team of computer scientists looked at more than 72,000 chunks of code found on the Stack Overflow website. The site is popular with developers seeking advice
/
Oracle News

Oracle Cloud Infrastructure Momentum Accelerates with New Hires

Nearly 2,000 new employees will support customer growth, product innovation, and data center expansion Redwood Shores, Calif.—Oct 8, 2019 Oracle today announced plans to hire nearly 2,000 employees worldwide to work on its growing Oracle Cloud Infrastructure business. The new roles, which include software development,
/
Criminal Cyber Crime Gangs

Becoming a Victim of a Criminal Cyber Crime Gang is Increasing

Criminal Cyber Crime Gang

It’s easy to get lulled into a false sense of security when browsing the web. As more and more devices join the internet of things, the risk of becoming a victim of a criminal cyber gang is increasing – we have more unsecured access points and offer would-be thieves more routes into our home networks.

It is with this in mind that a new infographic has been released by Heimdal Security as part of a wider investigative piece into protecting yourself against online threats.

We take a look at some of the key findings:

Vulnerabilities:

Heimdal claim that 99 percent of computers are vulnerable to attacks because they use out of date versions of either Oracle Java, Adobe Reader, or Adobe Flash that can be used by hackers to launch their assaults. These figures reinforce the point we made in our exclusive newsletter last week, when we featured a report by Menlo Security that found that one in five sites are running software with known vulnerabilities that can be exploited by criminals.

Cost:

The most expensive computer virus of all time was 2004’s MyDoom. According to Heimdal, it caused $38.5 billion USD of damage to those affected before being discovered in late January. At its peak, it was suspected that the virus infected 1 in every 41 email messages – 25 percent of the worldwide email traffic at that time. It initially spread through widely used file-sharing program Kazaa and installed itself into the Windows system folder as Taskmon.exe and Shimgapi.dll.

Away from individual viruses, it is reported that a massive 68 percent of funds stolen in cyber-attacks were ultimately unrecoverable. That’s helped bump up the estimated annual cost of global cyber-crime to more than $100 billion USD, and it’s starting to pose a very real threat to the economy.

Government:

You’d think it is your government’s job to protect and support its citizens. That philosophy doesn’t seem to have translated very well into the online world, however. Heimdal claim that “government malware accelerates the evolution of criminal malware” as they obsess themselves with ‘back door entry’. Hackers then ‘reverse engineer’ governments’ tactics and technical approaches to make their own malware more robust and advanced.

Social Media:

Social media has now become a hacker’s paradise. Accounts hold a wealth of data and information that in some cases can be enough for a hacker to completely steal your life. It is claimed that 600,000 Facebook accounts are now hacked every single day – that’s 219 million per year. One in ten users of social media now say they’ve been a victim of a cyber-attack, and that number is growing as additional services and third party providers come online.

Worrying or scaremongering?

What do you think of the report and the infographic? Is it truly worrying or more industry scaremongering? Perhaps you have been a victim of cyber-crime? We’d love to hear from you, let us know your comments in the space below.

Cyber Crime Gang

By Daniel Price

Daniel Price Contributor
Daniel is a Manchester-born UK native who has abandoned cold and wet Northern Europe and currently lives on the Caribbean coast of Mexico. A former Financial Consultant, he now balances his time between writing articles for several industry-leading tech (CloudTweaks.com & MakeUseOf.com), sports, and travel sites and looking after his three dogs.

POWERPOINT COMIC LICENSING | CLICK TO SEE MORE

Big Data Trends

Ringing The Alarm Bells – Preparing For The Potential Dark Future of A.I

The Future of A.I On Friday 21st October, the world witnessed the largest cyber-attack in history. The attack set a new precedent for the size, ...
Infographic - The Internet Of Things In 2020

Infographic – The Internet Of Things In 2020

The Internet Of Things In 2020 The growing interest in the Internet of Things is amongst us and there is much discussion. Attached is an ...
Survey results reveal the biggest Artificial Intelligence challenges

Survey results reveal the biggest Artificial Intelligence challenges

Biggest Artificial Intelligence Challenges We’ve been told countless times over the past few years what an impact Artificial Intelligence (AI) is going to have on ...
Mark Casey Apcela

Industrial IoT will reshape network requirements

Industrial IoT The hype around IoT may have been surpassed this year by breathless coverage of topics such as artificial intelligence and cryptocurrencies, but there ...