NIST Site Search
Search NIST.GOV
Custom Search
[Official NIST.GOV TIME]
Product Research

Advertise on this site
FBI Reports Online Crime At All Time High
The U.S. FBI reports that online crime is at an all time high. So why are we hearing so little about it? No Longer Supported
Though the total number of complaints were down slightly (0.3%) the total amount of money lost has increased by 25%. The raw numbers are staggering, over 98,000 cases of reported fraud that led to financial loss. The total amount of money reported loss was over $239 million, the median dollar loss per complaint was $680. eMail messages is how 73% of the cases of fraud began, 34% started at a website.

These numbers are even more staggering when you consider that other studies have shown that only a small percentage of people report these type of crimes. People are often too embarrassed when they find out they were tricked in to a scam. Often times the victim thought they about to make money in a work at home activity such as becoming a shopper for a "Secret Shopper" activity. Or they thought they were helping a charity organization build clean water facilities in a poor village some where. Once they find out they were suckered they often don't want anyone to know.

Businesses too fall victim to these crimes, though in much smaller numbers. Remember business are comprised of individuals and generally the smaller the business the more decision making power an individual may have. Many of the individual victims received unsolicited phishing and fraud messages at work. This could possibly lead to liability for the company if they failed to take appropriate measures to block illegal spam.

"Recent high activity scams commonly reported to the IC3 in 2007 were those involving pets, checks, spam, and online dating sites, all of which have proven effective as criminal devices in the hands of fraudsters."




In a time when other crime statistics are showing improvements one has to wonder why the media is showing far less attention to internet crimes than they have in years past. Perhaps they have what they consider more important things to cover (e.g. the war in Iraq, the U.S. Presidential election, etc.). But it could also be that these crimes generally take place a few people at a time. In years past there were huge worm outbreaks that effected perhaps hundreds of thousands of people at a time. That makes for a much better story than yet another grandparent in the heartland falling victim to a work at home scam. But those of us in the industry need to realize that online crimes have not gone away and that we need to stay vigilant to new vulnerabilities that can facilitate these activities.



You can download the full FBI report here.


Share or Bookmark this Article Using:
| furl | reddit | del.icio.us | magnoliacom | digg | newsvine | stumble it |



Google
WebNIST.org
NIST.govSecurityFocus.com






Posted by NIST.org on Monday 07 April 2008 - 05:51:39 | |printer friendly
Translate to: {GOOGLETRANS}
Google Ads




Headlines

»CVE-2012-3534 (gnu_gatekeeper, leap, opensuse)
GNU Gatekeeper before 3.1 does not limit the number of connections to the status port, which allows ...
»CVE-2013-0334 (bundler, fedora, opensuse)
Bundler before 1.7, when multiple top-level source lines are used, allows remote attackers to instal ...
»CVE-2013-2064 (debian_linux, fedora, libxcb, opensuse, secure_global_desktop, ubuntu_linux)
Integer overflow in X.org libxcb 1.9 and earlier allows X servers to trigger allocation of insuffici ...
»CVE-2013-5987 (gpu_driver, mac_os_x)
Unspecified vulnerability in NVIDIA graphics driver Release 331, 325, 319, 310, and 304 allows local ...
»CVE-2014-3994 (djblets, reviewboard)
Cross-site scripting (XSS) vulnerability in util/templatetags/djblets_js.py in Djblets before 0.7.30 ...
»CVE-2014-9906 (dbd-mysql, debian_linux)
Use-after-free vulnerability in DBD::mysql before 4.029 allows attackers to cause a denial of servic ...
»CVE-2015-8022 (big-ip_access_policy_manager, big-ip_advanced_firewall_manager, big-ip_analytics, big-ip_application_acceleration_manager, big-ip_application_security_manager, big-ip_edge_gateway, big-ip_global_traffic_manager, big-ip_link_controller, big-ip_local_traffic_manager, big-ip_policy_enforcement_manager, big-ip_protocol_security_manager, big-ip_wan_optimization_manager, big-ip_webaccelerator, big-ip_websafe)
The Configuration utility in F5 BIG-IP LTM, Analytics, APM, ASM, GTM, and Link Controller 11.x befor ...
»CVE-2015-8949 (dbd-mysql, debian_linux)
Use-after-free vulnerability in the my_login function in DBD::mysql before 4.033_01 allows attackers ...
»CVE-2016-0760 (sentry)
Multiple incomplete blacklist vulnerabilities in Apache Sentry before 1.7.0 allow remote authenticat ...
»CVE-2016-0915 (authentication_manager_prime_self-service)
The Self-Service Portal in EMC RSA Authentication Manager (AM) Prime Self-Service 3.0 and 3.1 before ...
»CVE-2016-1365 (application_policy_infrastructure_controller_enterprise_module)
The Grapevine update process in Cisco Application Policy Infrastructure Controller Enterprise Module ...
»CVE-2016-1457 (firepower_management_center)
The web-based GUI in Cisco Firepower Management Center 4.x and 5.x before 5.3.1.2 and 5.4.x before 5 ...
»CVE-2016-1458 (firepower_management_center)
The web-based GUI in Cisco Firepower Management Center 4.x and 5.x before 5.3.0.3, 5.3.1.x before 5. ...
»CVE-2016-1476 (ip_phone_8800_series_firmware)
Cross-site scripting (XSS) vulnerability on Cisco IP Phone 8800 devices with software 11.0 allows re ...
»CVE-2016-1477 (connected_streaming_analytics)
Cisco Connected Streaming Analytics 1.1.1 allows remote authenticated users to discover a notificati ...


Date published: 2016-08-24T04:50:04Z
Details

»FTC Releases Alert on Louisiana Flood Disaster Scams
Original release date: August 23, 2016 The Federal Trade Commission (FTC) has released an ale ...
»Fortinet Releases Security Advisory
Original release date: August 22, 2016 Fortinet has released a security advisory to highlight ...
»Cisco Releases Security Updates
Original release date: August 20, 2016 Cisco has released security updates to address vulnera ...
»Cisco Releases Security Update
Original release date: August 12, 2016 Cisco has released a security update to address a vuln ...
»Microsoft Releases August 2016 Security Bulletin
Original release date: August 09, 2016 Microsoft has released nine updates to address vulnera ...
»VMware Releases Security Update
Original release date: August 05, 2016 VMware has released a security update to address vulne ...
»Apple Releases Security Update
Original release date: August 05, 2016 Apple has released a security update to address a vuln ...
»Cisco Releases Security Updates
Original release date: August 03, 2016 Cisco has released security updates to address vulnera ...
»Mozilla Releases Security Updates
Original release date: August 03, 2016 Mozilla has released security updates to address multi ...
»Cybersecurity Tips for the Rio Olympics
Original release date: August 02, 2016 As the 2016 Olympic Games begin in Rio de Janeiro, US- ...


Date published: not known
Details

»Throwback Thursday: Olympic Games
In 1994, along with the Olympic Games came an Olympic virus, from a ...
»VB2016 call for last-minute papers opened, discounts announced
Announcing the VB2016 call for last-minute papers and a number of d ...
»Guest Blog: Malicious Scripts Gaining Prevalence in Brazil
In the run up to VB2016, we invited the conference sponsors to writ ...
»Romanian university website compromised to serve Neutrino exploit kit
The website of the Carol Davila University of Medicine and Pharmacy ...
»It's 2016. Can we stop using MD5 in malware analyses?
While there are no actually risks involved in using MD5s in malware ...
»Throwback Thursday: Holding the Bady
In 2001, ‘Code Red’ caused White House administrators to change the ...
»Paper: The Journey of Evasion Enters Behavioural Phase
A new paper by FireEye researcher Ankit Anubhav provides an overvie ...
»Guest blog: Espionage toolkit uncovered targeting Central and Eastern Europe
Recently, ESET researchers uncovered a new espionage toolkit target ...
»Avast acquires AVG for $1.3bn
Anti-virus vendor Avast has announced the acquisition of its rival ...


Date published: not known
Details
Main Menu
· Home
Current Security News
 
US-CERT Current Activity

» FTC Releases Alert on Louisiana Flood Disaster Scams
[23 Aug 2016 05:48pm]

» Fortinet Releases Security Advisory
[22 Aug 2016 02:36pm]

» Cisco Releases Security Updates
[20 Aug 2016 12:56am]

» Cisco Releases Security Update
[12 Aug 2016 01:31pm]

» Microsoft Releases August 2016 Security Bulletin
[09 Aug 2016 12:55pm]

» VMware Releases Security Update
[05 Aug 2016 01:38pm]

» Apple Releases Security Update
[05 Aug 2016 01:25pm]

» Cisco Releases Security Updates
[03 Aug 2016 02:33pm]

» Mozilla Releases Security Updates
[03 Aug 2016 02:27pm]

» Cybersecurity Tips for the Rio Olympics
[02 Aug 2016 07:39pm]

***
US-CERT Alerts

» TA16-187A: Symantec and Norton Security Products Contain Critical Vulnerabilities
[05 Jul 2016 08:50am]

» TA16-144A: WPAD Name Collision Vulnerability
[23 May 2016 05:38am]

» TA16-132A: Exploitation of SAP Business Applications
[11 May 2016 05:31am]

» TA16-105A: Apple Ends Support for QuickTime for Windows; New Vulnerabilities Announced
[14 Apr 2016 01:48pm]

» TA16-091A: Ransomware and Recent Variants
[31 Mar 2016 04:00pm]

» TA15-337A: Dorkbot
[03 Dec 2015 04:40pm]

» TA15-314A: Compromised Web Servers and Web Shells - Threat Awareness and Guidance
[10 Nov 2015 06:12pm]

» TA15-286A: Dridex P2P Malware
[13 Oct 2015 05:23am]

» TA15-240A: Controlling Outbound DNS Access
[28 Aug 2015 11:31am]

» TA15-213A: Recent Email Phishing Campaigns – Mitigation and Response Recommendations
[01 Aug 2015 04:01pm]

***
Computerworld Security

» 19% of shoppers would abandon a retailer that’s been hacked
[23 Aug 2016 02:39pm]

» How to get your network and security teams working together
[23 Aug 2016 01:42pm]

» Free course: Responding to cybersecurity incidents
[23 Aug 2016 11:05am]

» IDG Contributor Network: Third-party vendors -- your weakest link?
[23 Aug 2016 08:46am]

» Alleged NSA hackers probably gave away a small fortune by leaking exploits
[23 Aug 2016 05:19am]

» Groups oppose U.S. plan to collect social media info from visitors
[23 Aug 2016 04:22am]

» Side channel power, the new security front
[23 Aug 2016 04:00am]

» Republicans subpoena three tech firms over Clinton emails
[22 Aug 2016 05:34pm]

» Many hospitals transmit your health records unencrypted
[22 Aug 2016 02:39pm]

» Despite billions spent on cybersecurity, companies aren’t truly safe from hacks
[22 Aug 2016 02:01pm]

» Malware alert: Dump on WikiLeaks contained over 3,000 malicious files
[22 Aug 2016 11:46am]

» 'Important government projects,' redefined
[22 Aug 2016 04:00am]

» NBA holds its first hackathon -- should your company, too?
[19 Aug 2016 02:17pm]

» Ransomware attracts FTC attention
[19 Aug 2016 02:10pm]

» Shared code in Snowden leaks and NSA breach back up hackers' claims
[19 Aug 2016 10:24am]

***
Microsoft Security Advisories

» 3179528 - Update for Kernel Mode Blacklist - Version: 1.0
[09 Aug 2016 11:00am]

» 2880823 - Deprecation of SHA-1 Hashing Algorithm for Microsoft Root Certificate Program - Version: 2.0
[18 May 2016 11:00am]

» 3155527 - Update to Cipher Suites for FalseStart - Version: 1.0
[10 May 2016 11:00am]

» 3152550 - Update to Improve Wireless Mouse Input Filtering - Version: 1.1
[22 Apr 2016 11:00am]

» 3137909 - Vulnerabilities in ASP.NET Templates Could Allow Tampering - Version: 1.1
[10 Feb 2016 11:00am]

» 2871997 - Update to Improve Credentials Protection and Management - Version: 5.0
[09 Feb 2016 11:00am]

» 3123479 - Deprecation of SHA-1 Hashing Algorithm for Microsoft Root Certificate Program - Version: 1.0
[12 Jan 2016 11:00am]

» 3109853 - Update to Improve TLS Session Resumption Interoperability - Version: 1.0
[12 Jan 2016 11:00am]

» 3118753 - Updates for ActiveX Kill Bits 3118753 - Version: 1.0
[12 Jan 2016 11:00am]

» 2755801 - Update for Vulnerabilities in Adobe Flash Player in Internet Explorer and Microsoft Edge - Version: 53.0
[05 Jan 2016 11:00am]

» 3057154 - Update to Harden Use of DES Encryption - Version: 1.1
[08 Dec 2015 11:00am]

» 3123040 - Inadvertently Disclosed Digital Certificate Could Allow Spoofing - Version: 1.0
[08 Dec 2015 11:00am]

» 3119884 - Inadvertently Disclosed Digital Certificates Could Allow Spoofing - Version: 1.0
[30 Nov 2015 11:00am]

» 3108638 - Update for Windows Hyper-V to Address CPU Weakness - Version: 1.0
[10 Nov 2015 11:00am]

» 3097966 - Inadvertently Disclosed Digital Certificates Could Allow Spoofing - Version: 2.0
[13 Oct 2015 11:00am]

***
WIRED

» Security News This Week: Eddie Bauer Stores, Hotels and Hospitals Hacked
[20 Aug 2016 05:00am]

» WIRED’s Latest HTTPS Update: We’re Almost There, Folks
[19 Aug 2016 06:27pm]

» Hackers Trick Facial-Recognition Logins With Photos From Facebook (What Else?)
[19 Aug 2016 06:00am]

» Twitter Says It Suspended 360,000 Suspected Terrorist Accounts in a Year
[18 Aug 2016 10:07am]

» Why #LochteGate Is the Diversion America Deserves
[18 Aug 2016 09:43am]

» Voting Machines Are a Mess—But the Feds Have a (Kinda) Plan
[18 Aug 2016 05:00am]

» The Shadow Brokers Mess Is What Happens When the NSA Hoards Zero-Days
[17 Aug 2016 06:34pm]

» No One Wants to Buy Those Stolen NSA-Linked ‘Cyberweapons’
[16 Aug 2016 01:26pm]

» The Baltimore PD’s Race Bias Extends to High-Tech Spying, Too
[16 Aug 2016 06:01am]

» Hackers Claim to Auction Data They Stole From NSA-Linked Spies
[15 Aug 2016 12:02pm]

***
Network World Security

» NYT says Moscow bureau was targeted by cyberattack
[24 Aug 2016 12:27am]

» Ashley Madison misled users with a fake security award
[23 Aug 2016 03:42pm]

» Where the monsters live
[23 Aug 2016 11:46am]

» Epic Games forum hack underscores the need to install security patches
[23 Aug 2016 11:39am]

» Review: Promisec goes the extra step to secure PCs
[13 Jul 2016 06:21am]

» 4 tools for managing firewall rules
[07 Jul 2016 11:03am]

» 10 advanced endpoint protection tools
[05 Jul 2016 04:00am]

» How to buy endpoint security products
[05 Jul 2016 04:00am]

» 7 trends in advanced endpoint protection
[05 Jul 2016 04:00am]

» 10 cutting-edge tools that take endpoint security to a new level
[05 Jul 2016 04:00am]

» Buyer’s Guide to 9 multi-factor authentication products
[06 Jun 2016 04:00am]

» 5 trends shaking up multi-factor authentication
[06 Jun 2016 04:00am]

» 9-vendor authentication roundup: The good, the bad and the ugly
[06 Jun 2016 04:00am]

» Ashley Madison misled users with a fake security award
[23 Aug 2016 03:42pm]

» Epic Games forum hack underscores the need to install security patches
[23 Aug 2016 11:39am]

***


More IT Security
News Feeds
More Sponsors

Advertise on this site
RSS Feeds
Our news can be syndicated by using these rss feeds.
rss1.0
rss2.0
rdf

NIST.org is in no way connected to the U.S. government site NIST.gov

This site is © John Herron, CISSP. All Rights Reserved.

Please visit daily to stay up to date on all your IT Security compliance issues.

http://www.nist.org -
Hosted by BlueHost. We've never had a better hosting company.
{THEMEDISCLAIMER}