<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>cyber security Archives - ITBlogSec.com</title>
	<atom:link href="https://itblogsec.com/tag/cyber-security/feed/" rel="self" type="application/rss+xml" />
	<link>https://itblogsec.com/tag/cyber-security/</link>
	<description>IT, network, security and hacking</description>
	<lastBuildDate>Mon, 22 Apr 2019 10:37:38 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.8.3</generator>
	<item>
		<title>The Cyber Security Periscope at a Glance 2019 (INFOGRAPHIC)</title>
		<link>https://itblogsec.com/the-cyber-security-periscope-at-a-glance-2019-infographic/</link>
					<comments>https://itblogsec.com/the-cyber-security-periscope-at-a-glance-2019-infographic/#respond</comments>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Mon, 22 Apr 2019 10:08:43 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Other]]></category>
		<category><![CDATA[cyber crime]]></category>
		<category><![CDATA[cyber security]]></category>
		<guid isPermaLink="false">https://itblogsec.com/?p=1168</guid>

					<description><![CDATA[<p>Cybersecurity will be a hot topic for as long as we are using computers and the internet. With the massive expansion of IoT devices, mobile, and technology in general, we can only expect to see this industry growing in the years to come to keep us safe from online thefts and data breaches. Let’s review some of the most common types of cyber attacks. You’ll be surprised when you see the stats and learn that this issue is much more serious than you probably thought.</p>
<p>The post <a href="https://itblogsec.com/the-cyber-security-periscope-at-a-glance-2019-infographic/">The Cyber Security Periscope at a Glance 2019 (INFOGRAPHIC)</a> appeared first on <a href="https://itblogsec.com">ITBlogSec.com</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h2 style="text-align: justify;">The Cyber Security Periscope at a Glance 2019 (INFOGRAPHIC)</h2>
<p dir="ltr" style="text-align: justify;"><strong>Cybersecurity</strong> will be a hot topic for as long as we are using computers and the internet. With the massive expansion of <strong>IoT devices</strong>, <strong>mobile</strong>, and technology in general, we can only expect to see this industry growing in the years to come to keep us safe from online thefts and <strong><a title="https://techjury.net/stats-about/biggest-data-breaches/" href="https://techjury.net/stats-about/biggest-data-breaches/">data breaches</a>.</strong></p>
<p dir="ltr" style="text-align: justify;">Let’s review some of the most common types of cyber attacks. You’ll be surprised when you see the stats and learn that this issue is much more serious than you probably thought.</p>
<div style="text-align: justify;">
<h5 dir="ltr"><strong>A Glance at the Statistics</strong></h5>
<p dir="ltr"><strong><em>Botnets</em><br />
</strong><a title="https://www.pandasecurity.com/mediacenter/security/what-is-a-botnet/" href="https://www.pandasecurity.com/mediacenter/security/what-is-a-botnet/">Robot networks or botnets</a> are groups of computers acting much like an army with the <strong>aim of attacking one specific computer or groups</strong> of computers.</p>
<p dir="ltr">Think in terms of the inverse proportion examples you saw in school. If you have one hacker trying to target a network, it may take her a year or more. If you have hundreds of computers sending multiple attacks, it will take much less time. Experts from TechJury contend that botnet use rose to 34% in Q1 of 2018.</p>
<p dir="ltr"><strong><em>Facebook Attacks</em><br />
</strong>If you use social media, then the chances are you use Facebook. By Q4 of 2018 alone, it had<strong> around 2.32 billion users</strong>. The sheer number of users is a huge call for <strong>online hackers</strong>. In September 2018, about <strong>50,000,000 accounts were affected</strong> by an attack.</p>
<p dir="ltr"><strong><em>Financial Statistics</em><br />
</strong>Estimates peg the cost of malware and phishing attacks as well as virus attacks on households at about $4.55. That is more than the GDP of a number of small countries.</p>
<p dir="ltr">Although that is a lot of money, the amount shouldn’t be too surprising because some of that cost comes from charges you only catch after a transaction. In a survey conducted in 2016, three years ago, 48% of participants actually responded that they had seen charges on their bank accounts that they weren’t privy to.</p>
<p dir="ltr">In the first half of 2018 alone, it is estimated that <strong>15% of the attacks were to gain financial access</strong> be it through a virus, malware, ransomware and so on and so forth. Just take a look at the infographic below that reveals some pretty startling statistics.</p>
<p dir="ltr"><strong><em>What’s Next?</em><br />
</strong>An integral part in solving any type of problem is knowing the root cause of the issue because that allows us to set up actions to combat the problem at hand. That is the absolute basic starting point of problem-solving.</p>
<p dir="ltr">What the statistics show are the areas where we are <strong>most vulnerable or have become more vulnerable.</strong> For example, the <strong>33% increase in mobile ransomware</strong> in 2018 tells us that mobile attacks are definitely an area we need to continue to look at.</p>
<p dir="ltr">Overall diligence, an understanding of vulnerability and continuing to search for better security protocols are strategies that look to be necessary for the long haul.</p>
<p><div style="width: 810px" class="wp-caption aligncenter"><img fetchpriority="high" decoding="async" src="https://techjury.net/wp-content/uploads/2019/02/infographic-world-cyber-V2.png" alt="" width="800" height="27502" /><p class="wp-caption-text">cybersecurity 2019</p></div>
</div>
<div style="text-align: justify;"><span style="font-size: 10pt;"><strong>source:</strong> <a title="https://techjury.net/stats-about/cyber-security/" href="https://techjury.net/stats-about/cyber-security/">https://techjury.net/stats-about/cyber-security/</a></span></div>
<p>The post <a href="https://itblogsec.com/the-cyber-security-periscope-at-a-glance-2019-infographic/">The Cyber Security Periscope at a Glance 2019 (INFOGRAPHIC)</a> appeared first on <a href="https://itblogsec.com">ITBlogSec.com</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://itblogsec.com/the-cyber-security-periscope-at-a-glance-2019-infographic/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>

<!--
Performance optimized by W3 Total Cache. Learn more: https://www.boldgrid.com/w3-total-cache/

Object Caching 0/141 objects using XCache
Page Caching using Disk: Enhanced 

Served from: itblogsec.com @ 2025-11-28 23:53:37 by W3 Total Cache
-->