The document discusses various types of cyber crimes such as hacking, cyber stalking, spamming, and cyber pornography. It provides examples of a 2015 online credit card scam where customer credit card details were misused to book air tickets. Three people were found guilty - one worked in a bank and stole customer credit card information, which he provided to another person who then used the details to book tickets online. The top 10 reported cybercrimes in 2015 are also listed, including non-delivery of payment/merchandise and FBI-related scams. Common types of cyber crimes such as hacking, cyber stalking, spamming, and software piracy are also briefly described.
This power-point present Explain about security risk by internet to government offices. here is some important tools and method for safely handheld internet
This power-point present Explain about security risk by internet to government offices. here is some important tools and method for safely handheld internet
An introduction to conversion rate optimization for WooCommerce webshops, including research techniques to discover conversion optimization opportunities.
In the last years we are reading more and more news about massive (millions) breach of passwords in web services as communities, emails services, cloud services and others.
Hackers simply are obtaining money stealing passwords and selling or misusing them.
This presentation is focus on how to protect our accounts and with this also keep sure our digital identity, our image and also our money safe from hackers businesses.
The answer is no for about 90% of the cyber assets due to the very minimal risk reduction achieved. Spend your effort elsewhere. Presentation goes over categories of security patching in ICS and recommends prioritized security patching.
Tackle Unknown Threats with Symantec Endpoint Protection 14 Machine LearningSymantec
What is machine learning and how can it be used to detect unknown threats?
What makes Symantec’s approach to machine learning different?
Defense in depth: Symantec Endpoint Protection 14
The current presentation is based on different Cyber Security Threats for 2017 published in Internet. All threats are explained at a high level but at the end of this presentation all references URL are present if you want to investigate deeply any threat.
IoT is one of the transformational trends that will shape the future of businesses in 2017 and beyond. Many firms see big opportunity in IoT uses and enterprises start to believe that IoT holds the promise to enhance customer relationships and drive business growth by improving quality, productivity, and reliability on one side, and on the other side reducing costs, risk, and theft.
The future of the marketing tech stackMarc Keating
Will Artificial Intelligence power marketing in the "Post-Modern" Era? A presentation given by Marc Keating at the B2B Marketing InTech Event, 23 February 2017.
M-Trends® 2013: Attack the Security GapFireEye, Inc.
Mandiant’s annual threat report reveals evolving trends, case studies and best practices gained from Mandiant observations to targeted attacks in the last year. The report, compiled from hundreds of Mandiant advanced threat investigations, also includes approaches that organizations can take to improve the way they detect, respond to, and contain complex breaches. For the latest M-Trends report, https://www.fireeye.com/mtrends.
PRESENTATION REPORT ON CYBER CRIME
1. INTRODUCTION
2. DIFFERENT TYPES OF CYBER CRIME
3.THE FIRST NATIONAL CONFERENCE ON NATIONAL CRIME INVESTIGATION AND CRIME FORENSICS
4.CYBER CRIME AWARENESS
5.CYBER SECURITY
6.CONCLUSION
7.FAQ
Cyber CrimeAs Internet usage is growing daily the world is coming.pdfvichu19891
Cyber Crime:
As Internet usage is growing daily the world is coming closer. The World Wide Web sounds like
a vast phenomenon but surprisingly one of its qualities is bringing the world closer making it a
smaller place to live in for its users. However, it has also managed to create another problem for
people who spend long hours browsing the Cyber World – which is cyber crimes. While law
enforcement agencies are trying to tackle this problem, it is growing steadily and many people
have become victims of hacking, theft, identity theft and malicious software. One of the best
ways to avoid being a victim of cyber crimes and protecting your sensitive information is by
making use of impenetrable security that uses a unified system of software and hardware to
authenticate any information that is sent or accessed over the Internet. However, before you can
understand more about this system, let us find out more about cyber crimes.
Types of Cyber Crimes:
When any crime is committed over the Internet it is referred to as a cyber crime. There are many
types of cyber crimes and the most common ones are explained below:
1.Hacking: This is a type of crime wherein a person’s computer is broken into so that his
personal or sensitive information can be accessed. In the United States, hacking is classified as a
felony and punishable as such. This is different from ethical hacking, which many organizations
use to check their Internet security protection. In hacking, the criminal uses a variety of software
to enter a person’s computer and the person may not be aware that his computer is being
accessed from a remote location.
2.Theft: This crime occurs when a person violates copyrights and downloads music, movies,
games and software. There are even peer sharing websites which encourage software piracy and
many of these websites are now being targeted by the FBI. Today, the justice system is
addressing this cyber crime and there are laws that prevent people from illegal downloading.
3.Cyber Stalking: This is a kind of online harassment wherein the victim is subjected to a barrage
of online messages and emails. Typically, these stalkers know their victims and instead of
resorting to offline stalking, they use the Internet to stalk. However, if they notice that cyber
stalking is not having the desired effect, they begin offline stalking along with cyber stalking to
make the victims’ lives more miserable.
4.Identity Theft: This has become a major problem with people using the Internet for cash
transactions and banking services. In this cyber crime, a criminal accesses data about a person’s
bank account, credit cards, Social Security, debit card and other sensitive information to siphon
money or to buy things online in the victim’s name. It can result in major financial losses for the
victim and even spoil the victim’s credit history.
5.Malicious Software: These are Internet-based software or programs that are used to disrupt a
network. The software is used to gain ac.
Jax london2016 cybercrime-and-the-developerSteve Poole
In the emerging world of DevOps and the Cloud, most developers are trying to learn new technologies and methodologies. The focus tends to be on adding capabilities such as resiliency and scaling to an application. Still, one critical item consistently overlooked is security.
The world of the Cyber Criminal is closer than you realize. Watch a real man-in-the-middle demonstration and learn just how simple it can be for others to steal your secrets. In this talk you’ll learn about other practical examples of how you can inadvertently leave the doors open and what you can do to keep your system secure. In the end, security is everyone’s concern and this talk will teach you a few of simple actions you can take (and some behaviours you must change) to create a more secure application in the Cloud.
This 7-second Brain Wave Ritual Attracts Money To You.!nirahealhty
Discover the power of a simple 7-second brain wave ritual that can attract wealth and abundance into your life. By tapping into specific brain frequencies, this technique helps you manifest financial success effortlessly. Ready to transform your financial future? Try this powerful ritual and start attracting money today!
Multi-cluster Kubernetes Networking- Patterns, Projects and GuidelinesSanjeev Rampal
Talk presented at Kubernetes Community Day, New York, May 2024.
Technical summary of Multi-Cluster Kubernetes Networking architectures with focus on 4 key topics.
1) Key patterns for Multi-cluster architectures
2) Architectural comparison of several OSS/ CNCF projects to address these patterns
3) Evolution trends for the APIs of these projects
4) Some design recommendations & guidelines for adopting/ deploying these solutions.
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024APNIC
Ellisha Heppner, Grant Management Lead, presented an update on APNIC Foundation to the PNG DNS Forum held from 6 to 10 May, 2024 in Port Moresby, Papua New Guinea.
# Internet Security: Safeguarding Your Digital World
In the contemporary digital age, the internet is a cornerstone of our daily lives. It connects us to vast amounts of information, provides platforms for communication, enables commerce, and offers endless entertainment. However, with these conveniences come significant security challenges. Internet security is essential to protect our digital identities, sensitive data, and overall online experience. This comprehensive guide explores the multifaceted world of internet security, providing insights into its importance, common threats, and effective strategies to safeguard your digital world.
## Understanding Internet Security
Internet security encompasses the measures and protocols used to protect information, devices, and networks from unauthorized access, attacks, and damage. It involves a wide range of practices designed to safeguard data confidentiality, integrity, and availability. Effective internet security is crucial for individuals, businesses, and governments alike, as cyber threats continue to evolve in complexity and scale.
### Key Components of Internet Security
1. **Confidentiality**: Ensuring that information is accessible only to those authorized to access it.
2. **Integrity**: Protecting information from being altered or tampered with by unauthorized parties.
3. **Availability**: Ensuring that authorized users have reliable access to information and resources when needed.
## Common Internet Security Threats
Cyber threats are numerous and constantly evolving. Understanding these threats is the first step in protecting against them. Some of the most common internet security threats include:
### Malware
Malware, or malicious software, is designed to harm, exploit, or otherwise compromise a device, network, or service. Common types of malware include:
- **Viruses**: Programs that attach themselves to legitimate software and replicate, spreading to other programs and files.
- **Worms**: Standalone malware that replicates itself to spread to other computers.
- **Trojan Horses**: Malicious software disguised as legitimate software.
- **Ransomware**: Malware that encrypts a user's files and demands a ransom for the decryption key.
- **Spyware**: Software that secretly monitors and collects user information.
### Phishing
Phishing is a social engineering attack that aims to steal sensitive information such as usernames, passwords, and credit card details. Attackers often masquerade as trusted entities in email or other communication channels, tricking victims into providing their information.
### Man-in-the-Middle (MitM) Attacks
MitM attacks occur when an attacker intercepts and potentially alters communication between two parties without their knowledge. This can lead to the unauthorized acquisition of sensitive information.
### Denial-of-Service (DoS) and Distributed Denial-of-Service (DDoS) Attacks
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptxBrad Spiegel Macon GA
Brad Spiegel Macon GA’s journey exemplifies the profound impact that one individual can have on their community. Through his unwavering dedication to digital inclusion, he’s not only bridging the gap in Macon but also setting an example for others to follow.
3. What Is CYBER CRIMEWhat Is CYBER CRIME
• Cybercrime is defined as a crime in which a computer is the object of theCybercrime is defined as a crime in which a computer is the object of the
crime (hacking, phishing, spamming) or is used as a tool to commit ancrime (hacking, phishing, spamming) or is used as a tool to commit an
offense (child pornography, hate crimes). Cybercriminals may use computeroffense (child pornography, hate crimes). Cybercriminals may use computer
technology to access personal information, business trade secrets, or usetechnology to access personal information, business trade secrets, or use
the Internet for exploitive or malicious purposes. Criminals can also usethe Internet for exploitive or malicious purposes. Criminals can also use
computers for communication and document or data storage. Criminals whocomputers for communication and document or data storage. Criminals who
perform these illegal activities are often referred to as hackers.perform these illegal activities are often referred to as hackers.
• Cybercrime may also be referred to as computer crime.Cybercrime may also be referred to as computer crime.
4. tRuE ExaMplE of CYBER CRIMEtRuE ExaMplE of CYBER CRIME
IN 2015 Three people held guilty in online credit card scamIN 2015 Three people held guilty in online credit card scam
• Customers credit card details were misused through online means for
booking air-tickets. These culprits were caught by the city Cyber Crime
Investigation Cell in pune. It is found that details misused were belonging to 100
people.
•Mr. Parvesh Chauhan, ICICI Prudential Life Insurance officer had complained
on behalf of one of his customer. In this regard Mr. Sanjeet Mahavir Singh
Lukkad, Dharmendra Bhika Kale and Ahmead Sikandar Shaikh were arrested.
Lukkad being employeed at a private institution, Kale was his friend. Shaiklh was
employed in one of the branches of State Bank of India .
5. • According to the information provided by the police, one of the customer received a SMS
based alert for purchasing of the ticket even when the credit card was being held by him.
Customer was alert and came to know something was fishy; he enquired and came to
know about the misuse. He contacted the Bank in this regards. Police observed
involvement of many Bank's in this reference.
• The tickets were book through online means. Police requested for the log details and got
the information of the Private Institution. Investigation revealed that the details were
obtained from State Bank of India . Shaikh was working in the credit card department;
due to this he had access to credit card details of some customers. He gave that
information to Kale. Kale in return passed this information to his friend Lukkad. Using the
information obtained from Kale Lukkad booked tickets. He used to sell these tickets to
customers and get money for the same. He had given few tickets to various other
institutions.
6. • Cyber Cell head DCP Sunil Pulhari and PI Mohan MohadikarCyber Cell head DCP Sunil Pulhari and PI Mohan Mohadikar
A.P.I Kate were involved in eight days of investigation andA.P.I Kate were involved in eight days of investigation and
finally caught the culprits.finally caught the culprits.
• In this regards various Banks have been contacted; alsoIn this regards various Banks have been contacted; also
four air-line industries were contacted.four air-line industries were contacted.
DCP Sunil Pulhari has requested customers who have fallenDCP Sunil Pulhari has requested customers who have fallen
in to this trap to inform police authorities on 2612-4452 orin to this trap to inform police authorities on 2612-4452 or
2612-3346 if they have any problems.2612-3346 if they have any problems.
7. In 2015, thE top tEn REpoRtEd CYBERCRIMEsIn 2015, thE top tEn REpoRtEd CYBERCRIMEs
• 1.1. Non-delivery payment/ merchandise—Non-delivery payment/ merchandise—14.4 percent of the14.4 percent of the
sellers/purchasers did not receive payment/merchandise.sellers/purchasers did not receive payment/merchandise.
• 2.2. FBI-related scams—FBI-related scams—13.2 percent of criminals pose as the FBI to defraud13.2 percent of criminals pose as the FBI to defraud
victims.victims.
• 3.3. Identity Theft—Identity Theft—9.8 percent were unauthorized use of personal identifying9.8 percent were unauthorized use of personal identifying
information to commit crimes.information to commit crimes.
• 4.4. Computer crimes—Computer crimes—9.1 percent were crimes that target a computer or9.1 percent were crimes that target a computer or
were facilitated by a computer.were facilitated by a computer.
• 5.5. Miscellaneous fraud—Miscellaneous fraud—8.6 percent of scams and fraud included8.6 percent of scams and fraud included
sweepstakes and workfrom-home scamssweepstakes and workfrom-home scams
8. • 6.6. Advance fee fraud—Advance fee fraud—7.6 percent were the Nigerian letter scam.7.6 percent were the Nigerian letter scam.
• 7.7. SpamSpam—6.9 percent of users received unsolicited, mass—6.9 percent of users received unsolicited, mass
produced bulk messages.produced bulk messages.
• 8.8. Auction fraud—Auction fraud—5.9 percent was fraudulent or misleading5.9 percent was fraudulent or misleading
information in the context of an online auction site.information in the context of an online auction site.
• 9.9. Credit card fraud—Credit card fraud—5.3 percent was fraudulent charging of5.3 percent was fraudulent charging of
goods and/or services to a victim’s account.goods and/or services to a victim’s account.
• 10.10. Overpayment fraud—Overpayment fraud—5.3 percent of victims deposited bad5.3 percent of victims deposited bad
9. thE CoMMon tYpEs of CYBER CRIMEs MaY BEthE CoMMon tYpEs of CYBER CRIMEs MaY BE
dIsCussEd undER thE folloWIng hEads.dIsCussEd undER thE folloWIng hEads.
• 1. Hacking And Three types of hacker-1. Hacking And Three types of hacker-
a) White Hat Hackersa) White Hat Hackers
b) Black Hat Hackersb) Black Hat Hackers
c) Grey Hat Hackersc) Grey Hat Hackers
2. Cyber Stalking2. Cyber Stalking
3. Spamming3. Spamming
4. Cyber Pornography4. Cyber Pornography
12. • 1. Hacking –1. Hacking –
A hacker is an unauthorized user who attempts toA hacker is an unauthorized user who attempts to
or gains access to an information system. Hackingor gains access to an information system. Hacking
is a crime even if there is no visible damage to theis a crime even if there is no visible damage to the
system, since it is an invasion in to the privacy ofsystem, since it is an invasion in to the privacy of
data. There are different classes of Hackersdata. There are different classes of Hackers
13. Three Types Of hackersThree Types Of hackers
• A) White Hat Hackers -A) White Hat Hackers - They believe thatThey believe that
information sharing is good, and that it is their dutyinformation sharing is good, and that it is their duty
to share their expertise by facilitating access toto share their expertise by facilitating access to
information. However there are some white hatinformation. However there are some white hat
hackers who are just “joy riding" on computerhackers who are just “joy riding" on computer
systemssystems
14. • B) Black Hat Hackers -B) Black Hat Hackers - They cause damageThey cause damage
after intrusion. They may steal or modify dataafter intrusion. They may steal or modify data
or insert viruses or worms which damage theor insert viruses or worms which damage the
system. They are also called ‘crackers’.system. They are also called ‘crackers’.
15. • C) Grey Hat Hackers -C) Grey Hat Hackers - Typically ethical but occasionallyTypically ethical but occasionally
violates hacker ethics Hackers will hack into networks,violates hacker ethics Hackers will hack into networks,
stand-alone computers and software. Network hackers trystand-alone computers and software. Network hackers try
to gain unauthorized access to private computer networksto gain unauthorized access to private computer networks
just for challenge, curiosity, and distribution of information.just for challenge, curiosity, and distribution of information.
Crackers perform unauthorized intrusion with damage likeCrackers perform unauthorized intrusion with damage like
stealing or changing of information or inserting malwarestealing or changing of information or inserting malware
(viruses or worms(viruses or worms
16. • 2. Cyber Stalking –2. Cyber Stalking –
crime involves use of internet to harasscrime involves use of internet to harass
someone. The behavior includes falsesomeone. The behavior includes false
accusations, threats etc. Normally, majority ofaccusations, threats etc. Normally, majority of
cyber stalkers are men and the majority ofcyber stalkers are men and the majority of
victims are women.victims are women.
17. • 3. Spamming –3. Spamming –
Spamming is sending of unsolicited bulk andSpamming is sending of unsolicited bulk and
commercial messages over the internet. Althoughcommercial messages over the internet. Although
irritating to most email users, it is not illegal unlessirritating to most email users, it is not illegal unless
it causes damage such as overloading network andit causes damage such as overloading network and
disrupting service to subscribers or createsdisrupting service to subscribers or creates
.negative impact on consumer attitudes towards.negative impact on consumer attitudes towards
Internet Service Provider.Internet Service Provider.
18. • 4. Cyber Pornography –4. Cyber Pornography –
Women and children are victims ofWomen and children are victims of
sexual exploitation through internet. Pedophilessexual exploitation through internet. Pedophiles
use the internet to send photos of illegal childuse the internet to send photos of illegal child
pornography to targeted children so as topornography to targeted children so as to
attract children to such funs. Later they areattract children to such funs. Later they are
sexually exploited for gains.sexually exploited for gains.
19. • 5.5. PhishingPhishing ––
It is a criminally fraudulent process ofIt is a criminally fraudulent process of
acquiring sensitive information such asacquiring sensitive information such as
username, passwords and credit card detailsusername, passwords and credit card details
by disguising as a trustworthy entity in anby disguising as a trustworthy entity in an
electronic communication.electronic communication.
20. • 6. Software Piracy –6. Software Piracy –
It is an illegal reproduction and distributionIt is an illegal reproduction and distribution
of software for business or personal use. This isof software for business or personal use. This is
considered to be a type of infringement of copy rightconsidered to be a type of infringement of copy right
and a violation of a license agreement. Since theand a violation of a license agreement. Since the
unauthorized user is not a party to the licenseunauthorized user is not a party to the license
agreement it is difficult to find out remedies.agreement it is difficult to find out remedies.
21. • 7. Corporate Espionage –7. Corporate Espionage –
It means theft of trade secrets through illegal meansIt means theft of trade secrets through illegal means
such as wire taps or illegal intrusions.such as wire taps or illegal intrusions.
• 8. Money Laundering –8. Money Laundering –
It means moving of illegally acquired cash throughIt means moving of illegally acquired cash through
financial and other systems so that it appears to be legally acquired. eg.financial and other systems so that it appears to be legally acquired. eg.
Transport cash to a country having less stringent banking regulations andTransport cash to a country having less stringent banking regulations and
move it back by way of loans the interest of which can re deducted from hismove it back by way of loans the interest of which can re deducted from his
taxes. This is possible prior to computer and internet technology, electronictaxes. This is possible prior to computer and internet technology, electronic
transfers have made it easier and more successful.transfers have made it easier and more successful.
22. 9. Password Sniffers -9. Password Sniffers -
Password sniffers arePassword sniffers are
programmes that monitor and record the name andprogrammes that monitor and record the name and
password of network users as they log in, jeopardizingpassword of network users as they log in, jeopardizing
security at a site. Whoever installs the sniffer cansecurity at a site. Whoever installs the sniffer can
impersonate an authorized user and log in to access onimpersonate an authorized user and log in to access on
restricted documents.restricted documents.
23. • 10. Credit Card Fraud –10. Credit Card Fraud –
In U.S.A. half a billion dollars have beenIn U.S.A. half a billion dollars have been
lost annually by consumers who have credit cards andlost annually by consumers who have credit cards and
calling card numbers. These are stolen from on-linecalling card numbers. These are stolen from on-line
databases.databases.
• 11. Web Jacking –11. Web Jacking –
The term refers to forceful taking ofThe term refers to forceful taking of
control of a web site by cracking the password.control of a web site by cracking the password.
24. • 12. Cyber terrorism -12. Cyber terrorism - The use of computer resources toThe use of computer resources to
intimidate or coerce government, the civilian population orintimidate or coerce government, the civilian population or
any segment thereof in furtherance of political or socialany segment thereof in furtherance of political or social
objectives is called cyber terrorism. Individuals and groupsobjectives is called cyber terrorism. Individuals and groups
quite often try to exploit anonymous character of thequite often try to exploit anonymous character of the
internet to threaten governments and terrorize the citizensinternet to threaten governments and terrorize the citizens
of the country.of the country.
25. 12 Ways to Protect yourself from cyber crime12 Ways to Protect yourself from cyber crime
• Use anti-virus software:Use anti-virus software:
• Didn't expect, don't clickDidn't expect, don't click
• Different site, different passwords:Different site, different passwords:
• If in doubt, blockIf in doubt, block
• Don't bank on public wi-fiDon't bank on public wi-fi
• Only shop online on secure sitesOnly shop online on secure sites
26. • More than one email accountMore than one email account
• Ignore pop-upsIgnore pop-ups
• MACs are as vulnerable as PCsMACs are as vulnerable as PCs
• Two-step verificationTwo-step verification
• Lock down your FB accountLock down your FB account
• Don't store your card details on websites:Don't store your card details on websites:
27. What is cyber laW?What is cyber laW?
• Cyber LawCyber Law or Internet or Internet lawlaw is a term that is a term that
encapsulates the legal issues related to use of theencapsulates the legal issues related to use of the
Internet. It is less a distinct field of Internet. It is less a distinct field of lawlaw than than
intellectual property or contract intellectual property or contract lawlaw, as it is a, as it is a
domain covering many areas of domain covering many areas of lawlaw and regulation. and regulation.
28. What is cyber attacks&tyPes?
• A Cyber Attacks in simple terms, is an attacks onA Cyber Attacks in simple terms, is an attacks on
your digital system originating from malicious acts ofyour digital system originating from malicious acts of
an anonymous source.an anonymous source.
• Cyber attacks allows for an illegal access to yourCyber attacks allows for an illegal access to your
digital device, while gaining access or control of yourdigital device, while gaining access or control of your
digital device.digital device.
31. What is hacking
• Hacking is the practice of modifying the features of aHacking is the practice of modifying the features of a
system, in order to accomplish a goal outside of thesystem, in order to accomplish a goal outside of the
creator's original purpose. The person who iscreator's original purpose. The person who is
consistently engaging in hacking activities, and hasconsistently engaging in hacking activities, and has
accepted hacking as a lifestyle and philosophy ofaccepted hacking as a lifestyle and philosophy of
their choice, is called a hacker.their choice, is called a hacker.
32.
33. Victims per yearVictims per year 556 million556 million
Victims per dayVictims per day Over 1.5 millionOver 1.5 million
Victims per secondVictims per second 1818
Identities exposedIdentities exposed More than 232.4 millionMore than 232.4 million
Yearly Cyber Crime Victim Count EstimateYearly Cyber Crime Victim Count Estimate
More than 600,000 FaceBook accounts are compromised every day.More than 600,000 FaceBook accounts are compromised every day.
15% of social network users have reported that their profiles have been hacked by pretenders.15% of social network users have reported that their profiles have been hacked by pretenders.
1 in 10 social network users said they’d fallen victim to a scam or fake link on social network platforms1 in 10 social network users said they’d fallen victim to a scam or fake link on social network platforms
34. Attack TypesAttack Types %%
Viruses, malware, worms, trojansViruses, malware, worms, trojans 50%50%
Criminal insiderCriminal insider 33%33%
Theft of data-bearing devicesTheft of data-bearing devices 28%28%
SQL injectionSQL injection 28%28%
PhishingPhishing 22%22%
Web-based attacksWeb-based attacks 17%17%
Social engineeringSocial engineering 17%17%
OtherOther 11%11%
Common Types Of Cyber AttacksCommon Types Of Cyber Attacks
Botnets have been using as many as 120,000 infected “Botnets have been using as many as 120,000 infected “zombiezombie” computers to send out spam each day.” computers to send out spam each day.
35. GenderGender %age%age
MaleMale 71%71%
FemalesFemales 63%63%
% Of Cybercrime Victims By Gender% Of Cybercrime Victims By Gender
59% of 59% of ex-employeesex-employees admitted to stealing company data when leaving previous jobs admitted to stealing company data when leaving previous jobs
37. top 15 countries Where cyber attackstop 15 countries Where cyber attacks
originateoriginate
Countries Attacks
Russia 2,448,525
Taiwan 925,910
Germany 780,142
Ukraine 566,524
Hungary 367,329
USA 355,466
Romania 350,485