As you read this the cyber security industry continues to grow. More and more specialists are joining the field, just as more and more malware is launched daily – more than in any time in history.
If you use the internet, you are at risk of a cyber attack. This is why we wanted to discuss with you some of the most wicked cyber security facts that you might wish you had known about previously. Well, at least you will be able to protect yourself going forward.
#1 The FBI’s most wanted cyber criminals in the world
The FBI’s Most Wanted cyber criminal list is ever changing but right now there are 19 individuals on that list, and each is responsible for consumer losses starting at $350,000 and ranging to more than $100 million. They are located around the world and the FBI offers huge rewards for their capture.
For example, currently the FBI’s most wanted cyber is the JABBERZEUS subjects, which are a group of individuals implicated in a wide-range of racketeering schemes that install unauthorized malicious software onto the victim’s computer.
This Zeus Trojan is financial malware captured personal identification numbers, passwords, bank account numbers, and other confidential information needed to log into online banking accounts.
#2 Social media is the favorite target of hackers
Social networking is a popular way that online users spend their time, and it is by far the most preferred way for users to stay in contact with their friends and families.
This is the reason cyber attackers love to make use of social media. Those users who spend a great deal of time on social media almost always click links posted by their trusted friends, which hackers take advantage of for their own use.
#3 The most expensive computer virus ever!
Have you ever wondered just how much damage a computer virus could actually do? Let look at a convincing example with this next fact: MyDoom is believed to be the most expensive virus worldwide and to ever occur in the history of cyber security attacks, causing an estimated $38.5 billion in financial damage.
It was in January 2004 that MyDoom, which was believed to have originated in Russia, was first spotted and it was the fastest-spreading email worm ever, having exceeded all previous records. The author of the virus was never identified.
#4 Over half of all security breaches are inside jobs
You may be shocked to discover that 59 percent of employees that are fired or quit steal proprietary corporate data. Companies acknowledge that these kinds of security risks occur and strategies are created to alleviate them.
#5 Social engineering – the favorite way cyber criminals like to manipulate victims
People are the weakest link when it comes to cyber security, which is why psychological manipulation of cyber attack victims is so common.
The definition of social engineering when it relates to information security, refers to the psychological manipulation of people into either divulging confidential information or performing confidential actions.
This confidence trick is used for the purpose of gathering information, system access, and fraud.
#6 Most computers are vulnerable to exploit kits
It’s a fact that 99% of computers have Adobe Reader, Adobe Fflash, and Java on them. This means that 99% of computer users are vulnerable to exploit kits.
The vulnerabilities that these types of hacks create are enormously critical: it just takes a single click on an infected ad banner for a hacker to have full access to your computer.
Adobe Flash vulnerabilities are huge which is why cyber criminals target the so many of their attacks through this channel. When they use the security holes in Flash, your computer can be infected with with ransomware, like Teslacrypt, CTB Locker, and CryptoLocker variants.
#7 The main motivation driving cyber attacks is hacktivism
Hacktivism makes up about half of the cyber attacks ever launched around the globe. Hacktivism represents a rebellious use of computer networks which are being used to promote a political agenda.
These individuals have a link to the hacker culture and they have ethics, which are generally associated with human rights, free speech, freedom of speech, etc.
It appears that the term has a positive spin, but the problem is it really is dependent on the individual who is using it. Hacktivism can be a productive type of civil disobedience, a technology hack that is politically motivated, or it can be a vague anti-systemic gesture.
#8 Funds lost after cyber attacks are not recovered 68% of the time
In addition to the associated costs of cyber crime, there are many other problems that affect companies at the global level.
It becomes more and more difficult to spot cyber attacks and resolve any and all security issues that they may create.
Cyber security threats need to be treated with care no matter whether they are big or small. Never take chances when it comes to precautions and try to put up your own protection system to always stay safe.