Centenial Celebration

Transaction Search Form: please type in any of the fields below.

Date: November 25, 2024 Mon

Time: 8:21 pm

Results for cyber crime

4 results found

Author: Symantec

Title: Internet Security Threat Report, 2013

Summary: The Internet Security Threat Report provides an overview and analysis of the year in global threat activity. The report is based on data from the Symantec Global Intelligence Network, which Symantec's analysts use to identify, analyze, and provide commentary on emerging trends in the dynamic threat landscape. Key Findings: 42% increase in targeted attacks in 2012. 31% of all targeted attacks aimed at businesses with less than 250 employees. One waterhole attack infected 500 organizations in a single day. 14 zero-day vulnerabilities. 32% of all mobile threats steal information. A single threat infected 600,000 Macs in 2012. Spam volume continued to decrease, with 69% of all email being spam. The number of phishing sites spoofing social networking sites increased 125%. Web-based attacks increased 30%. 5,291 new vulnerabilities discovered in 2012, 415 of them on mobile operating systems.

Details: Mountain View, CA: Symantic, 2013. 57p.

Source: Internet Resource: Accessed July 9, 2013 at: http://www.symantec.com/security_response/publications/threatreport.jsp

Year: 2013

Country: United States

URL: http://www.symantec.com/security_response/publications/threatreport.jsp

Shelf Number: 129336

Keywords:
Computer Crimes
Cyber Crime
Internet Crimes (U.S.)
Internet Security
Supply Chains

Author: Great Britain. House of Commons. Committee of Public Accounts

Title: The growing threat of online fraud

Summary: Online fraud is now the most prevalent crime in England and Wales, impacting victims not only financially but also causing untold distress to those affected. The cost of the crime is estimated at £10 billion, with around 2 million cyber-related fraud incidents last year, however the true extent of the problem remains unknown. Only around 20% of fraud is actually reported to police, with the emotional impact of the crime leaving many victims reluctant to come forward. The crime is indiscriminate, is growing rapidly and shows no signs of slowing down. Urgent action from government is needed, yet the Home Office's response has been too slow and the banks are unwilling to share information about the extent of fraud with customers. The balance needs to be tipped in favour of the customer. Online fraud is now too vast a problem for the Home Office to solve on its own, and it must work with a long list of other organisations including banks and retailers, however it remains the only body that can provide strategic national leadership. Setting up the Joint Fraud Task in 2016 was a positive step, but there is much still to do. The Department and its partners on the Joint Fraud Taskforce need to set clear objectives for what they plan to do, and by when, and need to be more transparent about their activities including putting information on the Home Office's website. The response from local police to fraud is inconsistent across England and Wales. The police must prioritise online fraud alongside efforts to tackle other sorts of crime. But it is vital that local forces get all the support they need to do this, including on identifying, developing and sharing good practice. Banks are not doing enough to tackle online fraud and their response has not been proportionate to the scale of the problem. Banks need to take more responsibility and work together to tackle this problem head on. Banks now need to work on information sharing so that customers are offered more protection from scams. Campaigns to educate people and keep them safe online have so far been ineffective, supported by insufficient funds and resources. The Department must also ensure that banks are committed to developing more effective ways of tackling card not present fraud and that they are held to account for this and for returning money to customers who have been the victims of scams.

Details: London: House of Commons, 2017. 71p.

Source: Internet Resource: Sixth Report of Session 2017–19: Accessed March 27, 2018 at: https://publications.parliament.uk/pa/cm201719/cmselect/cmpubacc/399/399.pdf

Year: 2017

Country: United Kingdom

URL: https://publications.parliament.uk/pa/cm201719/cmselect/cmpubacc/399/399.pdf

Shelf Number: 149584

Keywords:
Computer Crime
Cyber Crime
Financial Crimes
Fraud
Internet Crime
Online Victimization

Author: Symantec

Title: Internet Security Threat Report. Volume 23

Summary: From the sudden spread of WannaCry and Petya/NotPetya, to the swift growth in coin miners, 2017 provided us with another reminder that digital security threats can come from new and unexpected sources. With each passing year, not only has the sheer volume of threats increased, but the threat landscape has become more diverse, with attackers working harder to discover new avenues of attack and cover their tracks while doing so. Coin mining attacks explode Cyber criminals who have been firmly focused on ransomware for revenue generation are now starting to explore other opportunities. During the past year, the astronomical rise in crypto currency values inspired many cyber criminals to shift to coin mining as an alternative revenue source. This coin mining gold rush resulted in an 8,500 percent increase in detections of coinminers on endpoint computers in 2017. With a low barrier of entry-only requiring a couple lines of code to operate-cyber criminals are using coin miners to steal computer processing power and cloud CPU usage from consumers and enterprises to mine crypto currency. While the immediate impact of coin mining is typically performance related-slowing down devices, overheating batteries, and in some cases, rendering devices unusable-there are broader implications, particularly for organizations. Corporate networks are at risk of shutdown from coin miners aggressively propagated across their environment. There may also be financial implications for organizations who find themselves billed for cloud CPU usage by coin miners. As malicious coin mining evolves, IoT devices will continue to be ripe targets for exploitation. Symantec already found a 600 percent increase in overall IoT attacks in 2017, which means that cyber criminals could exploit the connected nature of these devices to mine en masse. Despite the Eternal Blue exploit wreaking havoc in 2017, the reality is that vulnerabilities are becoming increasingly difficult for attackers to identify and exploit. In response to this, Symantec is now seeing an increase in attackers injecting malware implants into the supply chain to infiltrate unsuspecting organizations, with a 200 percent increase in these attacks-one every month of 2017 as compared to four attacks annually in years prior. Hijacking software updates provides attackers with an entry point for compromising well-protected targets, or to target a specific region or sector. The Petya/NotPetya (Ransom.Petya) outbreak was the most notable example: After exploiting Ukrainian accounting software as the point of entry, Petya/ NotPetya used a variety of methods, spreading across corporate networks to deploy the attackers' malicious payload. When viewed as a business, it's clear that ransomware profitability in 2016 led to a crowded market, with overpriced ransom demands. In 2017, the ransomware 'market' made a correction with fewer ransomware families and lower ransom demands-signaling that ransomware has become a commodity. Many cyber criminals may have shifted their focus to coin mining as an alternative to cash in while crypto currency values are high. Some online banking threats have also experienced a renaissance as established ransomware groups have attempted to diversify. Last year, the average ransom demand dropped to $522, less than half the average of the year prior. And while the number of ransomware variants increased by 46 percent, indicating the established criminal groups are still quite productive, the number of ransomware families dropped, suggesting they are innovating less and may have shifted their focus to new, higher value targets Symantec has found that overall targeted attack activity is up by 10 percent in 2017, motivated primarily by intelligence gathering (90 percent). However, a not-so-insignificant 10 per cent of attack groups engage in some form of disruptive activity. The 'living off the land' trend continues with attack groups opting for tried-and-trusted means to infiltrate target organizations. Spearphishing is the number one infection vector, employed by 71 percent of organized groups in 2017. The use of zero days continues to fall out of favor. In fact, only 27 percent of the 140 targeted attack groups that Symantec tracks have been known to use zero-day vulnerabilities at any point in the past. Threats in the mobile space continue to grow year-over-year. The number of new mobile malware variants increased by 54 percent in 2017, as compared to 2016. And last year, an average of 24,000 malicious mobile applications were blocked each day. While threats are on the increase, the problem is exacerbated by the continued use of older operating systems. In particular, on Android, only 20 percent of devices are running the newest major version and only 2.3 percent are on the latest minor release. Mobile users also face privacy risks from grayware, apps that aren't completely malicious but can be troublesome. Symantec found that 63 percent of grayware apps leak the device's phone number. With grayware increasing by 20 percent in 2017, this isn't a problem that's going away.

Details: Mountain View, CA: Symantic, 2018. 87p.

Source: Internet Resource: Accessed March 27, 2018 at: https://www.symantec.com/content/dam/symantec/docs/reports/istr-23-executive-summary-en.pdf

Year: 2018

Country: International

URL: https://www.symantec.com/content/dam/symantec/docs/reports/istr-23-executive-summary-en.pdf

Shelf Number: 149586

Keywords:
Computer Crimes
Cyber Crime
Digital Security
Internet Crimes (U.S.)
Internet Security
Supply Chains

Author: Anderson, Monica

Title: A Majority of Teens Have Experienced Some Form of Cyberbullying

Summary: Name-calling and rumor-spreading have long been an unpleasant and challenging aspect of adolescent life. But the proliferation of smartphones and the rise of social media has transformed where, when and how bullying takes place. A new Pew Research Center survey finds that 59% of U.S. teens have personally experienced at least one of six types of abusive online behaviors. The most common type of harassment youth encounter online is name-calling. Some 42% of teens say they have been called offensive names online or via their cellphone. Additionally, about a third (32%) of teens say someone has spread false rumors about them on the internet, while smaller shares have had someone other than a parent constantly ask where they are, who they're with or what they're doing (21%) or have been the target of physical threats online (16%). While texting and digital messaging are a central way teens build and maintain relationships, this level of connectivity may lead to potentially troubling and non-consensual exchanges. One-quarter of teens say they have been sent explicit images they didn't ask for, while 7% say someone has shared explicit images of them without their consent. These experiences are particularly concerning to parents. Fully 57% of parents of teens say they worry about their teen receiving or sending explicit images, including about one-quarter who say this worries them a lot, according to a separate Center survey of parents. The vast majority of teens (90% in this case) believe online harassment is a problem that affects people their age, and 63% say this is a major problem. But majorities of young people think key groups, such as teachers, social media companies and politicians are failing at tackling this issue. By contrast, teens have a more positive assessment of the way parents are addressing cyberbullying. These are some of the key findings from the Center's surveys of 743 teens and 1,058 parents living in the U.S. conducted March 7 to April 10, 2018. Throughout the report, "teens" refers to those ages 13 to 17, and "parents of teens" are those who are the parent or guardian of someone in that age range.

Details: Washington, DC: Pew Research Center, 2018. 19p.

Source: Internet Resource: Accessed October 3, 2018 at: http://www.pewinternet.org/wp-content/uploads/sites/9/2018/09/PI_2018.09.27_teens-and-cyberbullying_FINAL.pdf

Year: 2018

Country: United States

URL: http://www.pewinternet.org/wp-content/uploads/sites/9/2018/09/PI_2018.09.27_teens-and-cyberbullying_FINAL.pdf

Shelf Number: 151778

Keywords:
Bullying
Computer Crime
Cyber Crime
Cyberbullying
Online Victimization
Social Media
Teenagers