NIST Site Search
Search NIST.GOV
Custom Search
[Official NIST.GOV TIME]
Product Research

Advertise on this site
FBI Reports Online Crime At All Time High
The U.S. FBI reports that online crime is at an all time high. So why are we hearing so little about it? No Longer Supported
Though the total number of complaints were down slightly (0.3%) the total amount of money lost has increased by 25%. The raw numbers are staggering, over 98,000 cases of reported fraud that led to financial loss. The total amount of money reported loss was over $239 million, the median dollar loss per complaint was $680. eMail messages is how 73% of the cases of fraud began, 34% started at a website.

These numbers are even more staggering when you consider that other studies have shown that only a small percentage of people report these type of crimes. People are often too embarrassed when they find out they were tricked in to a scam. Often times the victim thought they about to make money in a work at home activity such as becoming a shopper for a "Secret Shopper" activity. Or they thought they were helping a charity organization build clean water facilities in a poor village some where. Once they find out they were suckered they often don't want anyone to know.

Businesses too fall victim to these crimes, though in much smaller numbers. Remember business are comprised of individuals and generally the smaller the business the more decision making power an individual may have. Many of the individual victims received unsolicited phishing and fraud messages at work. This could possibly lead to liability for the company if they failed to take appropriate measures to block illegal spam.

"Recent high activity scams commonly reported to the IC3 in 2007 were those involving pets, checks, spam, and online dating sites, all of which have proven effective as criminal devices in the hands of fraudsters."




In a time when other crime statistics are showing improvements one has to wonder why the media is showing far less attention to internet crimes than they have in years past. Perhaps they have what they consider more important things to cover (e.g. the war in Iraq, the U.S. Presidential election, etc.). But it could also be that these crimes generally take place a few people at a time. In years past there were huge worm outbreaks that effected perhaps hundreds of thousands of people at a time. That makes for a much better story than yet another grandparent in the heartland falling victim to a work at home scam. But those of us in the industry need to realize that online crimes have not gone away and that we need to stay vigilant to new vulnerabilities that can facilitate these activities.



You can download the full FBI report here.


Share or Bookmark this Article Using:
| furl | reddit | del.icio.us | magnoliacom | digg | newsvine | stumble it |



Google
WebNIST.org
NIST.govSecurityFocus.com






Posted by NIST.org on Monday 07 April 2008 - 05:51:39 | |printer friendly
Translate to: French German Italian Spanish Portuguese GTM_LAN_DUTCH Russian Chinese Arabic Korean English
Google Ads




Headlines

»NCCoE Speaker Series March 2015
»New NIST Tools to Help Boost Wireless Channel Frequencies and Capacity
»NIST Announces Pilot Grants Competition to Improve Security and Privacy of Online Identity Verification Systems
»Vendors Sought to Develop Model System to Monitor Security of Energy Industry Networked Control Systems
»NIST Releases Update of Industrial Control Systems Security Guide for Final Public Review
»Cybersecurity Summit Technical Workshop
»NIST Forensic Science Standards Committees to Hold First Public Meetings in February 2015
»NIST Security Guide Walks Organizations Through the Mobile App Security Vetting Process
»Open-Source Software for Quantum Information
»NIST Requests Round Two Comments on its Cryptographic Standards Process
»Symposium to Focus on Future of Voting Systems
»NIST Meeting: Cybersecurity Is a Key Ingredient In the Manufacturing Mix
»Future of Voting Systems Symposium II
»Global City Teams Challenge Tech Jam
»NIST Announces Initial Members of Forensic Science Digital Evidence Subcommittee


Date published: not known
Details

»Guidance for Defending Against Destructive Malware
Original release date: March 03, 2015 | Last revised: March 04, 2015 The Information Assuranc ...
»FTC Details the Top 10 Imposter Scams of 2014
Original release date: March 02, 2015 The Federal Trade Commission (FTC) has released an advi ...
»Cisco IPv6 Denial of Service Vulnerability
Original release date: February 25, 2015 Cisco has identified a vulnerability that could allo ...
»Samba Remote Code Execution Vulnerability
Original release date: February 24, 2015 Linux and Unix based operating systems employing Sam ...
»Mozilla Releases Security Updates for Firefox, Firefox ESR, and Thunderbird
Original release date: February 24, 2015 The Mozilla Foundation has released security updates ...
»Lenovo Computers Vulnerable to HTTPS Spoofing
Original release date: February 20, 2015 | Last revised: March 04, 2015 Lenovo consumer perso ...
»IRS Issues Warning for a Scam Targeting Tax Preparers
Original release date: February 18, 2015 The Internal Revenue Service (IRS) has issued a pres ...
»ISC Releases Security Updates for BIND
Original release date: February 18, 2015 The Internet Systems Consortium (ISC) has released s ...
»Microsoft Releases February 2015 Security Bulletin
Original release date: February 10, 2015 Microsoft has released updates to address vulnerabil ...
»Microsoft Releases Critical Security Update for Internet Explorer
Original release date: February 10, 2015 Microsoft has released a critical security update to ...


Date published: not known
Details

»VB2014 paper: Leaving our ZIP undone: how to abuse ZIP to deliver malware apps
Gregory Panakkal explains there are different ways of looking at APK files - and that sometimes has ...
»FREAK attack takes HTTPS connections back to 1990s security
Golden keys from the (first) crypto wars have come back to haunt us. When a web client makes a secur ...
»Paper: Script in a lossy stream
Dénes Óvári explains how to store code in lossily compressed JPEG data. Malformed PDF ...
»TorrentLocker spam has DMARC enabled
Use of email authentication technique unlikely to bring any advantage. Last week, Trend Micro resear ...
»VB2014 paper: Caphaw - the advanced persistent pluginer
Micky Pun and Neo Tan analyse the banking trojan that is best known for spreading through Skype. Sin ...
»M3AAWG releases BCP document on dealing with child sexual abuse material
Subject may make many feel uncomfortable, but it is essential that we know how to deal with it. The ...
»Hacker group takes over Lenovo's DNS
As emails were sent to wrong servers, DNSSEC might be worth looking into. Although, after some initi ...
»Coordinated action takes down Ramnit botnet infrastructure
Malware remains present on infected machines; 2012 Virus Bulletin paper worth studying. A coordinate ...
»Almost 50% increase in reported vulnerabilities as non-Windows operating systems lead the table
Each discovered vulnerability is actually a good news story. Last week, security firm GFI published ...


Date published: not known
Details

»Which Apps Should You Secure First? Wrong Question.
Instead, develop security instrumentation capability and stop wasting time on '4 terrible tactics' t ...
»How Secure Are You?
The NIST Cybersecurity Framework can help you understand your risks.
»North Korean Government Not Likely Behind Malware On Nation's Official News Site
Contrary to initial assumptions of North Korean government involvement, watering hole attack appears ...
»Apple Pay Fraud Gives Us A New Reason To Hate Data Breaches And SSNs
There may already be millions of dollars in losses, but you can't blame Apple for this one.
»Securing Our Electric Power Grid Is Critical
Highly complex infrastructure systems require protection against cyberattacks.
»Black Hat Asia 2015: Break All the Security
You can't spell 'exploit' without 'Black Hat.' Wait, that didn't come out right... how embarrassing. ...
»A 'Building Code' For Internet of Things Security, Privacy
In the fast emerging IoT, medical device safety is reaching a critical juncture. Here are three chal ...
»Enterprises Thirsting For Third-Party Threat Data
New report shows enterprises more heavily weighing risks of data loss and cyber attacks in evaluatio ...
»Breach Victims Three Times Likelier To Be Identity Theft Victims
Twenty-eight percent of them say they later avoided the merchants that failed to protect their perso ...


Date published: Thu, 05 Mar 2015 14:40:47 EST
Details
Main Menu
· Home
Current Security News
 
SANS Internet Storm Center, InfoCON: green

» Infocon: green

» XML: A New Vector For An Old Trick, (Thu, Mar 5th)
[05 Mar 2015 11:53am]

» Cuckoo Sandbox 1.2 released http://cuckoosandbox.org/2015-03-04-cuckoo-sandbox-12.html, (Thu, Mar 5th)
[05 Mar 2015 10:01am]

» Anybody Doing Anything About ANY Queries?, (Thu, Mar 5th)
[05 Mar 2015 09:26am]

» ISC StormCast for Thursday, March 5th 2015 http://isc.sans.edu/podcastdetail.html?id=4383, (Thu, Mar 5th)
[04 Mar 2015 07:48pm]

» Putty 0.64 released last week (sorry, we missed it) - private-key-not-wiped-2 and diffie-hellman-range-check security issues resolved. See http://www.chiark.greenend.org.uk/~sgtatham/putty/ and http://www.chiark.greenend.org.uk/~sgtatham/putty/changes.ht, (Wed, Mar 4th)
[04 Mar 2015 03:42pm]

» Wireshark 1.10.13 (old stable) and 1.12.4 (stable) released - see https://www.wireshark.org/download.html and https://www.wireshark.org/docs/relnotes/, (Wed, Mar 4th)
[04 Mar 2015 03:39pm]

» March OUCH! Newsletter: Gaming Online Safely & Securely http://www.securingthehuman.org/ouch, (Wed, Mar 4th)
[04 Mar 2015 07:55am]

» No Wireshark? No TCPDump? No Problem!, (Wed, Mar 4th)
[04 Mar 2015 07:16am]

» Freak Attack - Surprised? No. Worried? A little. , (Wed, Mar 4th)
[03 Mar 2015 09:06pm]

» ISC StormCast for Wednesday, March 4th 2015 http://isc.sans.edu/podcastdetail.html?id=4381, (Wed, Mar 4th)
[03 Mar 2015 08:52pm]

***
CNET News.com

» Microsoft defends opening Hotmail account of blogger in espionage case
[20 Mar 2014 06:47pm]

» Syria's Internet goes dark for several hours
[20 Mar 2014 04:25pm]

» Symantec fires CEO Steve Bennett
[20 Mar 2014 03:07pm]

» Microsoft sniffed blogger's Hotmail account to trace leak
[20 Mar 2014 01:28pm]

» Microsoft sniffed private Hotmail account to trace trade secret leak
[20 Mar 2014 01:28pm]

» IBM's new services zero in on fraud, financial crime
[20 Mar 2014 07:31am]

» Despite assault on privacy, Page sees value in online openness
[19 Mar 2014 08:00pm]

» Hackers transform EA Web page into Apple ID phishing scheme
[19 Mar 2014 05:21pm]

» NSA top lawyer says tech giants knew about data collection
[19 Mar 2014 02:57pm]

» Microsoft touts study showing the cost of pirated software
[19 Mar 2014 06:55am]

» Microsoft touts study showing cost of malware in pirated software
[19 Mar 2014 06:55am]

» How to spy on your lover, the smartphone way
[18 Mar 2014 01:24pm]

» Mt. Gox update lets users see their Bitcoin balances
[18 Mar 2014 06:38am]

» Fake Malaysia Airlines links spread malware
[17 Mar 2014 05:12pm]

» IBM: No, we did not help NSA spy on customers
[17 Mar 2014 01:15pm]

***

***



***


More IT Security
News Feeds
More Sponsors

Advertise on this site
RSS Feeds
Our news can be syndicated by using these rss feeds.
rss1.0
rss2.0
rdf
Symantec News

NIST.org is in no way connected to the U.S. government site NIST.gov

This site is © John Herron, CISSP. All Rights Reserved.

Please visit daily to stay up to date on all your IT Security compliance issues.

http://www.nist.org -
Hosted by BlueHost. We've never had a better hosting company.
{THEMEDISCLAIMER}