<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>cyber crime Archives - ITBlogSec.com</title>
	<atom:link href="https://itblogsec.com/tag/cyber-crime/feed/" rel="self" type="application/rss+xml" />
	<link>https://itblogsec.com/tag/cyber-crime/</link>
	<description>IT, network, security and hacking</description>
	<lastBuildDate>Mon, 22 Apr 2019 10:37:38 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.8.3</generator>
	<item>
		<title>The Cyber Security Periscope at a Glance 2019 (INFOGRAPHIC)</title>
		<link>https://itblogsec.com/the-cyber-security-periscope-at-a-glance-2019-infographic/</link>
					<comments>https://itblogsec.com/the-cyber-security-periscope-at-a-glance-2019-infographic/#respond</comments>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Mon, 22 Apr 2019 10:08:43 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Other]]></category>
		<category><![CDATA[cyber crime]]></category>
		<category><![CDATA[cyber security]]></category>
		<guid isPermaLink="false">https://itblogsec.com/?p=1168</guid>

					<description><![CDATA[<p>Cybersecurity will be a hot topic for as long as we are using computers and the internet. With the massive expansion of IoT devices, mobile, and technology in general, we can only expect to see this industry growing in the years to come to keep us safe from online thefts and data breaches. Let’s review some of the most common types of cyber attacks. You’ll be surprised when you see the stats and learn that this issue is much more serious than you probably thought.</p>
<p>The post <a href="https://itblogsec.com/the-cyber-security-periscope-at-a-glance-2019-infographic/">The Cyber Security Periscope at a Glance 2019 (INFOGRAPHIC)</a> appeared first on <a href="https://itblogsec.com">ITBlogSec.com</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h2 style="text-align: justify;">The Cyber Security Periscope at a Glance 2019 (INFOGRAPHIC)</h2>
<p dir="ltr" style="text-align: justify;"><strong>Cybersecurity</strong> will be a hot topic for as long as we are using computers and the internet. With the massive expansion of <strong>IoT devices</strong>, <strong>mobile</strong>, and technology in general, we can only expect to see this industry growing in the years to come to keep us safe from online thefts and <strong><a title="https://techjury.net/stats-about/biggest-data-breaches/" href="https://techjury.net/stats-about/biggest-data-breaches/">data breaches</a>.</strong></p>
<p dir="ltr" style="text-align: justify;">Let’s review some of the most common types of cyber attacks. You’ll be surprised when you see the stats and learn that this issue is much more serious than you probably thought.</p>
<div style="text-align: justify;">
<h5 dir="ltr"><strong>A Glance at the Statistics</strong></h5>
<p dir="ltr"><strong><em>Botnets</em><br />
</strong><a title="https://www.pandasecurity.com/mediacenter/security/what-is-a-botnet/" href="https://www.pandasecurity.com/mediacenter/security/what-is-a-botnet/">Robot networks or botnets</a> are groups of computers acting much like an army with the <strong>aim of attacking one specific computer or groups</strong> of computers.</p>
<p dir="ltr">Think in terms of the inverse proportion examples you saw in school. If you have one hacker trying to target a network, it may take her a year or more. If you have hundreds of computers sending multiple attacks, it will take much less time. Experts from TechJury contend that botnet use rose to 34% in Q1 of 2018.</p>
<p dir="ltr"><strong><em>Facebook Attacks</em><br />
</strong>If you use social media, then the chances are you use Facebook. By Q4 of 2018 alone, it had<strong> around 2.32 billion users</strong>. The sheer number of users is a huge call for <strong>online hackers</strong>. In September 2018, about <strong>50,000,000 accounts were affected</strong> by an attack.</p>
<p dir="ltr"><strong><em>Financial Statistics</em><br />
</strong>Estimates peg the cost of malware and phishing attacks as well as virus attacks on households at about $4.55. That is more than the GDP of a number of small countries.</p>
<p dir="ltr">Although that is a lot of money, the amount shouldn’t be too surprising because some of that cost comes from charges you only catch after a transaction. In a survey conducted in 2016, three years ago, 48% of participants actually responded that they had seen charges on their bank accounts that they weren’t privy to.</p>
<p dir="ltr">In the first half of 2018 alone, it is estimated that <strong>15% of the attacks were to gain financial access</strong> be it through a virus, malware, ransomware and so on and so forth. Just take a look at the infographic below that reveals some pretty startling statistics.</p>
<p dir="ltr"><strong><em>What’s Next?</em><br />
</strong>An integral part in solving any type of problem is knowing the root cause of the issue because that allows us to set up actions to combat the problem at hand. That is the absolute basic starting point of problem-solving.</p>
<p dir="ltr">What the statistics show are the areas where we are <strong>most vulnerable or have become more vulnerable.</strong> For example, the <strong>33% increase in mobile ransomware</strong> in 2018 tells us that mobile attacks are definitely an area we need to continue to look at.</p>
<p dir="ltr">Overall diligence, an understanding of vulnerability and continuing to search for better security protocols are strategies that look to be necessary for the long haul.</p>
<p><div style="width: 810px" class="wp-caption aligncenter"><img fetchpriority="high" decoding="async" src="https://techjury.net/wp-content/uploads/2019/02/infographic-world-cyber-V2.png" alt="" width="800" height="27502" /><p class="wp-caption-text">cybersecurity 2019</p></div>
</div>
<div style="text-align: justify;"><span style="font-size: 10pt;"><strong>source:</strong> <a title="https://techjury.net/stats-about/cyber-security/" href="https://techjury.net/stats-about/cyber-security/">https://techjury.net/stats-about/cyber-security/</a></span></div>
<p>The post <a href="https://itblogsec.com/the-cyber-security-periscope-at-a-glance-2019-infographic/">The Cyber Security Periscope at a Glance 2019 (INFOGRAPHIC)</a> appeared first on <a href="https://itblogsec.com">ITBlogSec.com</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://itblogsec.com/the-cyber-security-periscope-at-a-glance-2019-infographic/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Awesome cyber security facts 2018 (INFOGRAPHIC)</title>
		<link>https://itblogsec.com/awesome-cyber-security-facts-2018/</link>
					<comments>https://itblogsec.com/awesome-cyber-security-facts-2018/#respond</comments>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Wed, 22 Aug 2018 16:32:04 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[cyber crime]]></category>
		<category><![CDATA[infographic]]></category>
		<guid isPermaLink="false">https://itblogsec.com/?p=1109</guid>

					<description><![CDATA[<p>As people are leaning more and more towards the digital world, cybercrime is becoming an issue that cannot be ignored. Although many individuals and businesses are doing all they can to prevent such attacks, a big risk of them still persists. There are various types of attacks that could occur and for many reasons, but one thing is certain - you don’t want to be the victim of cybercrime</p>
<p>The post <a href="https://itblogsec.com/awesome-cyber-security-facts-2018/">Awesome cyber security facts 2018 (INFOGRAPHIC)</a> appeared first on <a href="https://itblogsec.com">ITBlogSec.com</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h2>Awesome cyber security facts 2018 (INFOGRAPHIC)</h2>
<p style="text-align: justify;">As people are leaning more and more towards the digital world, <strong>cybercrime is becoming an issue</strong> that cannot be ignored. Although many individuals and businesses are <strong>doing all they can to prevent such attacks</strong>, a big risk of them still persists. There are various types of attacks that could occur and for many reasons, but one thing is certain &#8211; you don’t want to be the victim of cybercrime.</p>
<p style="text-align: justify;">The more creative cyber criminals get &#8211; the more resources are spent on cyber security. It is estimated that, <strong>by 2020, around $101.6 billion will be spent on cybersecurity software, services and, hardware.</strong></p>
<p style="text-align: justify;">In case you run a small or middle-sized business &#8211; t<strong>he most common recommendations are</strong>:</p>
<ol>
<li style="text-align: justify;">Organize cyber security awareness trainings for employees.</li>
<li>Keep computer and operating system software up-to-date.</li>
<li>Use spam filtering for your mail accounts.</li>
<li>Create backups of your data.</li>
<li>Limit access to corporate information.</li>
<li>Organize cyber security awareness trainings for employees</li>
</ol>
<p><a href="https://itblogsec.com/wp-content/uploads/2018/08/awesome-cyber-security-facts-IG-final.png" target="_blank" rel="noopener"><img decoding="async" class="aligncenter wp-image-1110 size-full" src="https://itblogsec.com/wp-content/uploads/2018/08/awesome-cyber-security-facts-IG-final.png" alt="" width="990" height="16211" srcset="https://itblogsec.com/wp-content/uploads/2018/08/awesome-cyber-security-facts-IG-final.png 990w, https://itblogsec.com/wp-content/uploads/2018/08/awesome-cyber-security-facts-IG-final-768x12576.png 768w" sizes="(max-width: 990px) 100vw, 990px" /></a></p>
<p><span style="font-size: 10pt;"><strong>source:</strong> <a href="https://www.everycloudtech.com/awesome-cyber-security-facts" target="_blank" rel="noopener">https://www.everycloudtech.com/awesome-cyber-security-facts</a></span></p>
<p>The post <a href="https://itblogsec.com/awesome-cyber-security-facts-2018/">Awesome cyber security facts 2018 (INFOGRAPHIC)</a> appeared first on <a href="https://itblogsec.com">ITBlogSec.com</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://itblogsec.com/awesome-cyber-security-facts-2018/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>77 facts about cyber crimes one should know in 2018 (INFOGRAPHIC)</title>
		<link>https://itblogsec.com/77-facts-cyber-crimes-one-know-2018-infographic/</link>
					<comments>https://itblogsec.com/77-facts-cyber-crimes-one-know-2018-infographic/#respond</comments>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Sat, 17 Feb 2018 11:25:49 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[cyber crime]]></category>
		<category><![CDATA[infographic]]></category>
		<guid isPermaLink="false">http://itblogsec.com/?p=1068</guid>

					<description><![CDATA[<p>How many information is out there, purposely being concealed for the sake of greater good, for the sake of our own safety? The number is probably unfathomable. Today, when everything is online, and our lives are intertwined with a world most of us know nothing about, privacy and safety become an issue of epic proportions.</p>
<p>The post <a href="https://itblogsec.com/77-facts-cyber-crimes-one-know-2018-infographic/">77 facts about cyber crimes one should know in 2018 (INFOGRAPHIC)</a> appeared first on <a href="https://itblogsec.com">ITBlogSec.com</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h2>77 facts about cyber crimes one should know in 2018 (INFOGRAPHIC)</h2>
<p style="text-align: justify;">As a society, we cherish our right to privacy probably more than anything else. Sharing is great, and we all enjoy it, but there is always that other side, the untold story, the personal, the secret. Now, let’s extrapolate this to a societal level. How many information is out there, purposely being concealed for the sake of greater good, for the sake of our own safety? The number is probably unfathomable. Today, when everything is online, and our lives are intertwined with a world most of us know nothing about, privacy and safety become an issue of epic proportions.</p>
<p style="text-align: justify;">That is why we need to talk about cybercrime and <a href="https://bestvpns.co.uk/">utilize the very </a>best VPNs. However, instead of writing a tract of tedious length, here is an infographic that outlines the most important cybercrime facts all of us should be aware of in 2018.</p>
<p style="text-align: justify;">
 <img decoding="async" class="aligncenter" src="https://bestvpns.co.uk/wp-content/uploads/2017/12/Cyber_Crime_Facts_Ready_For_Review.png" alt="Cyber_Crime_Facts" width="990" height="19003" /></p>
<p><span style="font-size: 10pt;"><strong>source:</strong> <a href="https://bestvpns.co.uk" target="_blank" rel="noopener">https://bestvpns.co.uk</a></span></p>
<p>The post <a href="https://itblogsec.com/77-facts-cyber-crimes-one-know-2018-infographic/">77 facts about cyber crimes one should know in 2018 (INFOGRAPHIC)</a> appeared first on <a href="https://itblogsec.com">ITBlogSec.com</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://itblogsec.com/77-facts-cyber-crimes-one-know-2018-infographic/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>

<!--
Performance optimized by W3 Total Cache. Learn more: https://www.boldgrid.com/w3-total-cache/

Object Caching 0/171 objects using XCache
Page Caching using Disk: Enhanced 

Served from: itblogsec.com @ 2025-12-02 00:13:26 by W3 Total Cache
-->