Becoming a Victim of a Criminal Cyber Crime Gang is Increasing

Snip Kits

Criminal Cyber Crime Gang

It’s easy to get lulled into a false sense of security when browsing the web. As more and more devices join the internet of things, the risk of becoming a victim of a criminal cyber gang is increasing – we have more unsecured access points and offer would-be thieves more routes into our home networks.

It is with this in mind that a new infographic has been released by Heimdal Security as part of a wider investigative piece into protecting yourself against online threats.

We take a look at some of the key findings:

Vulnerabilities:

Heimdal claim that 99 percent of computers are vulnerable to attacks because they use out of date versions of either Oracle Java, Adobe Reader, or Adobe Flash that can be used by hackers to launch their assaults. These figures reinforce the point we made in our exclusive newsletter last week, when we featured a report by Menlo Security that found that one in five sites are running software with known vulnerabilities that can be exploited by criminals.

Cost:

The most expensive computer virus of all time was 2004’s MyDoom. According to Heimdal, it caused $38.5 billion USD of damage to those affected before being discovered in late January. At its peak, it was suspected that the virus infected 1 in every 41 email messages – 25 percent of the worldwide email traffic at that time. It initially spread through widely used file-sharing program Kazaa and installed itself into the Windows system folder as Taskmon.exe and Shimgapi.dll.

Away from individual viruses, it is reported that a massive 68 percent of funds stolen in cyber-attacks were ultimately unrecoverable. That’s helped bump up the estimated annual cost of global cyber-crime to more than $100 billion USD, and it’s starting to pose a very real threat to the economy.

Government:

You’d think it is your government’s job to protect and support its citizens. That philosophy doesn’t seem to have translated very well into the online world, however. Heimdal claim that “government Malware accelerates the evolution of criminal malware” as they obsess themselves with ‘back door entry’. Hackers then ‘reverse engineer’ governments’ tactics and technical approaches to make their own malware more robust and advanced.

Social Media:

Social media has now become a hacker’s paradise. Accounts hold a wealth of data and information that in some cases can be enough for a hacker to completely steal your life. It is claimed that 600,000 Facebook accounts are now hacked every single day – that’s 219 million per year. One in ten users of social media now say they’ve been a victim of a cyber-attack, and that number is growing as additional services and third party providers come online.

Worrying or scaremongering?

What do you think of the report and the infographic? Is it truly worrying or more industry scaremongering? Perhaps you have been a victim of cyber-crime? We’d love to hear from you, let us know your comments in the space below.

Cyber Crime Gang

By Daniel Price

New York

From Y2K To NYC Parking Meters: Have We Learned Anything About Complacency In Cybersecurity?

Cybersecurity Complacency This past January – in what seems like a different world now – a story briefly hit the headlines and was seen as more of a quirk than a threat. It was soon ...
Cloud Based Accounting

How Cloud Has Changed The Modern Accounting

Modern Accounting The modern-day accounting has come a long way from the times when the financial information existed only on paper. Today, advancement in technology has transformed almost every aspect of the accounting industry. It ...
ISC2 Webinar

Key Results from the 2021 Cloud Security Report

2021 Cloud Security Report The 2021 Cloud Security Report, sponsored by (ISC)2, explores current cloud security trends and challenges, how organizations are responding to security threats in the cloud and reveals tools and best practices ...
Martin Mendelsohn

The Growth of Third Party Risk Management (TPRM) Firms

Cybersecurity and the Continued Risks Back in the day, we played cops and robbers with sticks and plastic squirt guns.  Sometimes you were pursued, at other times you were the pursuer.  There wasn’t much more ...
Building a Robust Virtual Agent (VA) Rollout Strategy for DSPs

Building a Robust Virtual Agent (VA) Rollout Strategy for DSPs

Building a Robust Virtual Agent (VA) Rollout Strategy for DSPs Proven methods to increase VA containment & customer satisfaction The virtual agent’s market is at an all-time high and is garnering more and more interest ...
Ronald van Loon

The Future of Work: Confronting One of the Biggest Challenges of the Next Decade

The Future of Work Technologies like artificial intelligence (AI), machine learning (ML), and automation in all of its forms can augment human workers and enable them to pivot to more valuable work, and perform their ...