What You Need to Know About Gmail's New AI

What You Need to Know About Gmail’s New AI

Gmail's New AI In late April, Google gave its email service a significant overhaul. Besides getting a new look that includes a slightly different font style and differently shaped buttons, the interface has artificial intelligence features built into it. Available Around the World Every week,
Remote Patient Monitoring – One of the Most Important Applications of IoT in Healthcare

Remote Patient Monitoring – One of the Most Important Applications of IoT in Healthcare

Remote Patient Monitoring The application of IoT in Healthcare services is bringing the paradigm shift in terms of how this industry operates, the accuracy of diagnosis and quality of treatment. It is changing the model from ‘hospital-centric’ to ‘home-centric’, making medical attention more affordable to

Victim of a Criminal Cyber Crime Gang

It’s easy to get lulled into a false sense of security when browsing the web. As more and more devices join the internet of things, the risk of becoming a victim of a criminal cyber gang is increasing – we have more unsecured access points and offer would-be thieves more routes into our home networks.

It is with this in mind that a new infographic has been released by Heimdal Security as part of a wider investigative piece into protecting yourself against online threats.

We take a look at some of the key findings:

Vulnerabilities:

Heimdal claim that 99 percent of computers are vulnerable to attacks because they use out of date versions of either Oracle Java, Adobe Reader, or Adobe Flash that can be used by hackers to launch their assaults. These figures reinforce the point we made in our exclusive newsletter last week, when we featured a report by Menlo Security that found that one in five sites are running software with known vulnerabilities that can be exploited by criminals.

Cost:

The most expensive computer virus of all time was 2004’s MyDoom. According to Heimdal, it caused $38.5 billion USD of damage to those affected before being discovered in late January. At its peak, it was suspected that the virus infected 1 in every 41 email messages – 25 percent of the worldwide email traffic at that time. It initially spread through widely used file-sharing program Kazaa and installed itself into the Windows system folder as Taskmon.exe and Shimgapi.dll.

Away from individual viruses, it is reported that a massive 68 percent of funds stolen in cyber-attacks were ultimately unrecoverable. That’s helped bump up the estimated annual cost of global cyber-crime to more than $100 billion USD, and it’s starting to pose a very real threat to the economy.

Government:

You’d think it is your government’s job to protect and support its citizens. That philosophy doesn’t seem to have translated very well into the online world, however. Heimdal claim that “government malware accelerates the evolution of criminal malware” as they obsess themselves with ‘back door entry’. Hackers then ‘reverse engineer’ governments’ tactics and technical approaches to make their own malware more robust and advanced.

Social Media:

Social media has now become a hacker’s paradise. Accounts hold a wealth of data and information that in some cases can be enough for a hacker to completely steal your life. It is claimed that 600,000 Facebook accounts are now hacked every single day – that’s 219 million per year. One in ten users of social media now say they’ve been a victim of a cyber-attack, and that number is growing as additional services and third party providers come online.

Worrying or scaremongering?

What do you think of the report and the infographic? Is it truly worrying or more industry scaremongering? Perhaps you have been a victim of cyber-crime? We’d love to hear from you, let us know your comments in the space below.

Cyber Crime Gang

By Daniel Price

Daniel Price

Daniel is a Manchester-born UK native who has abandoned cold and wet Northern Europe and currently lives on the Caribbean coast of Mexico. A former Financial Consultant, he now balances his time between writing articles for several industry-leading tech (CloudTweaks.com & MakeUseOf.com), sports, and travel sites and looking after his three dogs.

BRANDED COMICS FOR YOUR NEXT CAMPAIGN

Get in touch with us regarding our introductory rates!

5 Industries That Will Be the Most Affected by GDPR

5 Industries That Will Be the Most Affected by GDPR

5 Industries Most Affected by GDPR The EU’s General Data Protection Regulation — or GDPR as it’s being tossed around ...
David

The Coming Era of Simple, Fast, Incredibly Cheap Cloud Storage

Cheapest Cloud Storage Data storage, like other commodities such as bandwidth, electricity, or simple computer power, underpins nearly everything we ...
How Will Artificial Intelligence Really Impact Jobs?

How Will Artificial Intelligence Really Impact Jobs?

Artificial Intelligence Jobs Hamilton is my favorite Broadway musical. The show follows the life of one of America’s founding fathers, ...
Delivering Serverless Applications Using AWS Well-Architected Frameworks

Delivering Serverless Applications Using AWS Well-Architected Frameworks

This is part 1 in a 2-part series on serverless cloud computing. Rapidly expanding connectivity options and increased development in ...
Aruna Cisco

2019 Predictions for Innovating, Transforming and Enabling Workplace Transformation

My Predictions for 2019 As we think of the top Collaboration trends for the coming year, we should start by ...

IDC to Provide Expert Guidance on Artificial Intelligence at 'Ai Everything 2019' in Dubai

/
Dubai – Global ICT research and consultancy services firm International Data Corporation (IDC) is delighted to announce that it will be participating in the upcoming 'Ai Everything 2019' summit as the event's ...

Media Alert: Intel at COMPUTEX 2019 (Updated)

/
Join Intel at COMPUTEX 2019 to discover how the company is transforming intelligent computing for our data-centric world to expand human potential. Intel is delivering technology leadership, working closely with ...

Connect IIoT data from disparate systems to unlock manufacturing insights

/
Extracting insights from multiple data sources is a new goal for manufacturers. Industrial IoT (IIoT) data is the starting point for new solutions, with the potential for giving manufacturers a competitive edge. But ...