SlideShare a Scribd company logo
1 of 15
Website Security Threats: September 2013 Update
WEBSITE SECURITY THREATS:
SEPTEMBER 2013 UPDATE
Thursday 26th September 2013
Andrew Shepherd
andrew_shepherd@symantec.com
Andrew Horbury
andrew_horbury@symantec.com
Agenda
• The month in numbers
• Hackers for hire
• Data breaches
• ATM Trojans
• Celebrity infections
Website Security Threats: September 2013 Update
The month in numbers….
• Over 48% of people who quit Facebook did it because of privacy concerns
• Hackers set up a 10,000 USD bounty for the first person who can crack the
iPhone 5S fingerprint scanner
• The average cost associated with a cyberattack for small businesses was
almost 8,700 USD
• 78% of smartphone users say they won't download an untrusted app
• New research says 51% of US teenagers avoid certain apps over privacy
concerns
• It's no wonder that phishing attacks still work - 30% would open an email
even if it seemed suspicious
• Speaking of Phishing…about 20% more brands were targeted by attackers in
the first half of 2013.
Website Security Threats: September 2013 Update
Hackers for hire
http://www.symantec.com/connect/blogs/hidden-lynx-professional-hackers-hire
Website Security Threats: September 2013 Update
Types of companies being attacked from inside and out
Website Security Threats: September 2013 Update
The volume of attacks
against smaller businesses
increased x 3
when compared with 2011,
resulting in its
percentage almost doubling
from 18%
to 31%
Hackers for Hire
THE SCALE OF CONSUMER CYBERCRIME
2/3 ONLINE ADULTS
HAVE BEEN VICTIMS OF CYBERCRIME IN THEIR
LIFETIME
46% VICTIMS IN PAST YEAR
CLOSE TO HALF OF ONLINE ADULTS HAVE FALLEN VICTIM TO ATTACKS SUCH AS
MALWARE, VIRUSES, HACKING, SCAMS, FRAUD & THEFT
18VICTIMS PER SECOND
THE SCALE OF CONSUMER CYBERCRIME
556 MILLION VICTIMS PER YEAR
MORE THAN THE ENTIRE POPULATION OF THE EUROPEAN UNION
1.5+ MILLION
VICTIMS PER DAY
$110 BN
FRAUD; 42%
THEFT OR LOSS;
17%
REPAIRS; 26%
OTHER; 15%
85% OF DIRECT FINANCIAL COSTS
ARE A RESULT OF FRAUD,
REPAIRS, THEFT & LOSS
USD $197
AVERAGE COST PER VICTIM
THE GLOBAL PRICE TAG OF CONSUMER CYBERCRIME
THE COST AMERICANS SPEND ANNUALLY ON FAST FOOD
ENOUGH TO BUY A WEEK’S WORTH OF NUTRITIOUS FOOD
FOR A FAMILY OF FOUR IN THE UNITED STATES
THE SCALE OF CONSUMER CYBERCRIME
ONE-AND-A-HALF MILLION VICTIMS DAILY
THE GLOBAL PRICE TAG OF CONSUMER CYBERCRIME
US $110 BILLION ANNUALLY
CHANGING FACE OF CYBERCRIME
CYBERCRIME GOES SOCIAL AND MOBILE
SECURITY IQ: MIXED REPORT CARD FOR CONSUMERS
CONSUMERS WISE UP TO TRADITIONAL THREATS, BUT MANY STILL
UNAWARE AS TO HOW CYBERCRIME IS RAPIDLY EVOLVING
STRONG PASSWORDS ARE KEY
EMAIL A POTENTIAL GATEWAY FOR CYBERCRIMINALS
KEY THEMES
Website Security Threats: September 2013 Update
Consumers are becoming less vigilant about protecting
their safety online
• Consumers are becoming less vigilant about protecting their
safety online
• Almost 30% said that they use secured wireless networks,
down from 36% last year
• 42% use passwords with upper and lower case letters,
numbers and/or symbols, compared to 49% in 2012
• 39% conduct transactions through reputable websites only,
down from 48% last year and 60% in 2011.
• 17% use a PIN or password to lock a smartphone while just 8%
use a mobile security app or feature.
Website Security Threats: September 2013 Update
German Data breach
• 2 Million identities stolen in
Germany
• Names, addresses, dob, genders
and banking details compromised
• Attacker was an insider.
Website Security Threats: September 2013 Update
Money for (almost nothing)
Compromised ATMs in
Mexico handing out cash to
criminals.
Website Security Threats: September 2013 Update
Car passes physical safety tests….
but fails the security test.
Website Security Threats: September 2013 Update
iPhone 5S Finger print
Website Security Threats: September 2013 Update
The new iPhone fingerprint reader relies on
the living layer of skin in order to
authenticate the owner.
Lily who?
Users searching for Lily Collins pictures and downloads, have a 14.5% chance of
visiting a website with spyware, adware, spam and other malware.
Website Security Threats: September 2013 Update
Link Glossary (Press Print screen now)
• What happens in an internet
minute
– http://intel.ly/15sGJgy
• Facebook Privacy concerns
– http://bit.ly/1b57zdu
• App concerns
– http://bit.ly/15sHINH
• Hidden Lynx; Hackers for hire
blog post
– http://bit.ly/18VVyZM
• Insider threats
– http://bit.ly/1eGx8Wk
• Cyber Attacks on SMB
– http://bit.ly/1gZOLNF
• Iphone finger print reader
needs your living finger….
– http://bit.ly/18YGYL8
• Iphone fingerprint hack
– http://bit.ly/1bFqiPF
• Celebs the lure for malware
– http://bit.ly/16yVBDZ
Website Security Threats: September 2013 Update
Thank you!
Copyright © 2012 Symantec Corporation. All rights reserved. Symantec and the Symantec Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in
the U.S. and other countries. Other names may be trademarks of their respective owners.
This document is provided for informational purposes only and is not intended as advertising. All warranties relating to the information in this document, either express or implied,
are disclaimed to the maximum extent allowed by law. The information in this document is subject to change without notice.
Andrew Shepherd
andrew_shepherd@symantec.com / +44 7912 552896
Andrew Horbury
andrew_horbury@symantec.com / +44 7703 468966
Website Security Threats: September 2013 Update
Next webinar: 24th October 2013
9.30am GMT/10.30am CET

More Related Content

What's hot

Arrott Htcia St Johns 101020
Arrott Htcia St Johns 101020Arrott Htcia St Johns 101020
Arrott Htcia St Johns 101020
Anthony Arrott
 

What's hot (11)

Arrott Htcia St Johns 101020
Arrott Htcia St Johns 101020Arrott Htcia St Johns 101020
Arrott Htcia St Johns 101020
 
Google & microsoft joins apple vs fbi
Google & microsoft joins apple vs fbiGoogle & microsoft joins apple vs fbi
Google & microsoft joins apple vs fbi
 
Dz hackevent 2019 Middle East Cyberwars V3
Dz hackevent 2019 Middle East Cyberwars V3Dz hackevent 2019 Middle East Cyberwars V3
Dz hackevent 2019 Middle East Cyberwars V3
 
The What If's of Hostile:Evil Personas
The What If's of Hostile:Evil PersonasThe What If's of Hostile:Evil Personas
The What If's of Hostile:Evil Personas
 
Targeted Defense for Malware & Targeted Attacks
Targeted Defense for Malware & Targeted AttacksTargeted Defense for Malware & Targeted Attacks
Targeted Defense for Malware & Targeted Attacks
 
The Next Cyber Warfare Wave: AR and VR Worlds
The Next Cyber Warfare Wave: AR and VR WorldsThe Next Cyber Warfare Wave: AR and VR Worlds
The Next Cyber Warfare Wave: AR and VR Worlds
 
Symantec intelligence report august 2015
Symantec intelligence report august 2015Symantec intelligence report august 2015
Symantec intelligence report august 2015
 
Trojan and Virus,Trojan horse,virus,how to make and defend the virus
Trojan and Virus,Trojan horse,virus,how to make and defend the virusTrojan and Virus,Trojan horse,virus,how to make and defend the virus
Trojan and Virus,Trojan horse,virus,how to make and defend the virus
 
READ THIS BEFORE USING FACEAPP! FACEAPP PRIVACY CONCERNS?
READ THIS BEFORE USING FACEAPP! FACEAPP PRIVACY CONCERNS?READ THIS BEFORE USING FACEAPP! FACEAPP PRIVACY CONCERNS?
READ THIS BEFORE USING FACEAPP! FACEAPP PRIVACY CONCERNS?
 
Laptop theft statistics
Laptop theft statisticsLaptop theft statistics
Laptop theft statistics
 
5 biggest cyber attacks and most famous hackers
5 biggest cyber attacks and most famous hackers5 biggest cyber attacks and most famous hackers
5 biggest cyber attacks and most famous hackers
 

Similar to Website Security Threats: September 2013 Update

proofpoint-blindspots-visibility-white-paper
proofpoint-blindspots-visibility-white-paperproofpoint-blindspots-visibility-white-paper
proofpoint-blindspots-visibility-white-paper
Ken Spencer Brown
 
Symantec's Internet Security Threat Report for the Government Sector
Symantec's Internet Security Threat Report for the Government SectorSymantec's Internet Security Threat Report for the Government Sector
Symantec's Internet Security Threat Report for the Government Sector
Symantec
 

Similar to Website Security Threats: September 2013 Update (20)

Symantec Website Security Threat Report 2014 - RapidSSLOnline
Symantec Website Security Threat Report 2014 - RapidSSLOnlineSymantec Website Security Threat Report 2014 - RapidSSLOnline
Symantec Website Security Threat Report 2014 - RapidSSLOnline
 
Protecting Yourself Against Mobile Phishing
Protecting Yourself Against Mobile PhishingProtecting Yourself Against Mobile Phishing
Protecting Yourself Against Mobile Phishing
 
Cyber security olive green mint ppt .pdf
Cyber security olive green mint ppt .pdfCyber security olive green mint ppt .pdf
Cyber security olive green mint ppt .pdf
 
proofpoint-blindspots-visibility-white-paper
proofpoint-blindspots-visibility-white-paperproofpoint-blindspots-visibility-white-paper
proofpoint-blindspots-visibility-white-paper
 
6 Cybersecurity Trends to Watch in 2019
6 Cybersecurity Trends to Watch in 20196 Cybersecurity Trends to Watch in 2019
6 Cybersecurity Trends to Watch in 2019
 
Cyber Landscape in the Philippines.pptx
Cyber Landscape in the Philippines.pptxCyber Landscape in the Philippines.pptx
Cyber Landscape in the Philippines.pptx
 
The Social Takeover
The Social TakeoverThe Social Takeover
The Social Takeover
 
Key Findings from the 2015 IBM Cyber Security Intelligence Index
Key Findings from the 2015 IBM Cyber Security Intelligence IndexKey Findings from the 2015 IBM Cyber Security Intelligence Index
Key Findings from the 2015 IBM Cyber Security Intelligence Index
 
Mozilla - Let's take back the web
Mozilla - Let's take back the webMozilla - Let's take back the web
Mozilla - Let's take back the web
 
A Survey On Cyber Crime Information Security
A Survey On  Cyber Crime   Information SecurityA Survey On  Cyber Crime   Information Security
A Survey On Cyber Crime Information Security
 
Cybersecurity - Webinar Session
Cybersecurity - Webinar SessionCybersecurity - Webinar Session
Cybersecurity - Webinar Session
 
The Digital Insurer Award - Hanover Re (cyber)
The Digital Insurer Award - Hanover Re (cyber)The Digital Insurer Award - Hanover Re (cyber)
The Digital Insurer Award - Hanover Re (cyber)
 
Symantec's Internet Security Threat Report for the Government Sector
Symantec's Internet Security Threat Report for the Government SectorSymantec's Internet Security Threat Report for the Government Sector
Symantec's Internet Security Threat Report for the Government Sector
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
BLURRING BOUNDARIES
BLURRING BOUNDARIESBLURRING BOUNDARIES
BLURRING BOUNDARIES
 
"Cyber crime", or computer-oriented crime..!!
"Cyber crime", or computer-oriented crime..!!"Cyber crime", or computer-oriented crime..!!
"Cyber crime", or computer-oriented crime..!!
 
Most notable apt_ attacks_of_2015_and_2016 predictions
Most notable apt_ attacks_of_2015_and_2016 predictionsMost notable apt_ attacks_of_2015_and_2016 predictions
Most notable apt_ attacks_of_2015_and_2016 predictions
 
Tips and Tricks on Securing your Android Devices
Tips and Tricks on Securing your Android DevicesTips and Tricks on Securing your Android Devices
Tips and Tricks on Securing your Android Devices
 
User authentication-info-graphic
User authentication-info-graphicUser authentication-info-graphic
User authentication-info-graphic
 
The Major Types of Cybercrime
The Major Types of CybercrimeThe Major Types of Cybercrime
The Major Types of Cybercrime
 

More from Symantec Website Security

More from Symantec Website Security (20)

Symantec Code Sign (NAM)
Symantec Code Sign (NAM)Symantec Code Sign (NAM)
Symantec Code Sign (NAM)
 
Symantec Code Signing (SE)
Symantec Code Signing (SE)Symantec Code Signing (SE)
Symantec Code Signing (SE)
 
Сертификаты подписания кода Symantec
Сертификаты подписания кода SymantecСертификаты подписания кода Symantec
Сертификаты подписания кода Symantec
 
Symantec Code Signing (IT)
Symantec Code Signing (IT)Symantec Code Signing (IT)
Symantec Code Signing (IT)
 
Symantec Code Signing (FR)
Symantec Code Signing (FR)Symantec Code Signing (FR)
Symantec Code Signing (FR)
 
Code signing de Symantec (ES)
Code signing de Symantec (ES)Code signing de Symantec (ES)
Code signing de Symantec (ES)
 
Symantec Code Signing (DE)
Symantec Code Signing (DE)Symantec Code Signing (DE)
Symantec Code Signing (DE)
 
Symantec Code Signing (CH)
Symantec Code Signing (CH)Symantec Code Signing (CH)
Symantec Code Signing (CH)
 
Symantec Code Signing (UK)
Symantec Code Signing (UK)Symantec Code Signing (UK)
Symantec Code Signing (UK)
 
Um guia de e-commerce para a aquisição e manutenção de novos clientes da Syma...
Um guia de e-commerce para a aquisição e manutenção de novos clientes da Syma...Um guia de e-commerce para a aquisição e manutenção de novos clientes da Syma...
Um guia de e-commerce para a aquisição e manutenção de novos clientes da Syma...
 
Guide Symantec de conquête et de fidélisation de nouveaux clients sur vos sit...
Guide Symantec de conquête et de fidélisation de nouveaux clients sur vos sit...Guide Symantec de conquête et de fidélisation de nouveaux clients sur vos sit...
Guide Symantec de conquête et de fidélisation de nouveaux clients sur vos sit...
 
Guida per l'e-commerce Symantec - Come acquisire nuovi clienti e conservarli
Guida per l'e-commerce Symantec - Come acquisire nuovi clienti e conservarliGuida per l'e-commerce Symantec - Come acquisire nuovi clienti e conservarli
Guida per l'e-commerce Symantec - Come acquisire nuovi clienti e conservarli
 
Guía de comercio electrónico de Symantec: Cómo atraer y retener a nuevos clients
Guía de comercio electrónico de Symantec: Cómo atraer y retener a nuevos clientsGuía de comercio electrónico de Symantec: Cómo atraer y retener a nuevos clients
Guía de comercio electrónico de Symantec: Cómo atraer y retener a nuevos clients
 
Guía de comercio electrónico de Symantec: Cómo atraer y retener a nuevos clients
Guía de comercio electrónico de Symantec: Cómo atraer y retener a nuevos clientsGuía de comercio electrónico de Symantec: Cómo atraer y retener a nuevos clients
Guía de comercio electrónico de Symantec: Cómo atraer y retener a nuevos clients
 
Guide Symantec de conquête et de fidélisation de nouveaux clients sur vos sit...
Guide Symantec de conquête et de fidélisation de nouveaux clients sur vos sit...Guide Symantec de conquête et de fidélisation de nouveaux clients sur vos sit...
Guide Symantec de conquête et de fidélisation de nouveaux clients sur vos sit...
 
Leitfaden von Symantec: „Das 1×1 der Kundengewinnung und -bindung im E-Commerce“
Leitfaden von Symantec: „Das 1×1 der Kundengewinnung und -bindung im E-Commerce“Leitfaden von Symantec: „Das 1×1 der Kundengewinnung und -bindung im E-Commerce“
Leitfaden von Symantec: „Das 1×1 der Kundengewinnung und -bindung im E-Commerce“
 
Symantec: The rise of hacktivism and insider threats
Symantec: The rise of hacktivism and insider threatsSymantec: The rise of hacktivism and insider threats
Symantec: The rise of hacktivism and insider threats
 
Symantec Website Security Threats: February 2014 Update.
Symantec Website Security Threats: February 2014 Update.Symantec Website Security Threats: February 2014 Update.
Symantec Website Security Threats: February 2014 Update.
 
Symantec SSL Explained
Symantec SSL ExplainedSymantec SSL Explained
Symantec SSL Explained
 
Website Security Threats - January 2014 Update
Website Security Threats - January 2014 Update Website Security Threats - January 2014 Update
Website Security Threats - January 2014 Update
 

Recently uploaded

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 

Recently uploaded (20)

Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 

Website Security Threats: September 2013 Update

  • 1. Website Security Threats: September 2013 Update WEBSITE SECURITY THREATS: SEPTEMBER 2013 UPDATE Thursday 26th September 2013 Andrew Shepherd andrew_shepherd@symantec.com Andrew Horbury andrew_horbury@symantec.com
  • 2. Agenda • The month in numbers • Hackers for hire • Data breaches • ATM Trojans • Celebrity infections Website Security Threats: September 2013 Update
  • 3. The month in numbers…. • Over 48% of people who quit Facebook did it because of privacy concerns • Hackers set up a 10,000 USD bounty for the first person who can crack the iPhone 5S fingerprint scanner • The average cost associated with a cyberattack for small businesses was almost 8,700 USD • 78% of smartphone users say they won't download an untrusted app • New research says 51% of US teenagers avoid certain apps over privacy concerns • It's no wonder that phishing attacks still work - 30% would open an email even if it seemed suspicious • Speaking of Phishing…about 20% more brands were targeted by attackers in the first half of 2013. Website Security Threats: September 2013 Update
  • 4.
  • 6. Types of companies being attacked from inside and out Website Security Threats: September 2013 Update The volume of attacks against smaller businesses increased x 3 when compared with 2011, resulting in its percentage almost doubling from 18% to 31%
  • 7. Hackers for Hire THE SCALE OF CONSUMER CYBERCRIME 2/3 ONLINE ADULTS HAVE BEEN VICTIMS OF CYBERCRIME IN THEIR LIFETIME 46% VICTIMS IN PAST YEAR CLOSE TO HALF OF ONLINE ADULTS HAVE FALLEN VICTIM TO ATTACKS SUCH AS MALWARE, VIRUSES, HACKING, SCAMS, FRAUD & THEFT 18VICTIMS PER SECOND THE SCALE OF CONSUMER CYBERCRIME 556 MILLION VICTIMS PER YEAR MORE THAN THE ENTIRE POPULATION OF THE EUROPEAN UNION 1.5+ MILLION VICTIMS PER DAY $110 BN FRAUD; 42% THEFT OR LOSS; 17% REPAIRS; 26% OTHER; 15% 85% OF DIRECT FINANCIAL COSTS ARE A RESULT OF FRAUD, REPAIRS, THEFT & LOSS USD $197 AVERAGE COST PER VICTIM THE GLOBAL PRICE TAG OF CONSUMER CYBERCRIME THE COST AMERICANS SPEND ANNUALLY ON FAST FOOD ENOUGH TO BUY A WEEK’S WORTH OF NUTRITIOUS FOOD FOR A FAMILY OF FOUR IN THE UNITED STATES THE SCALE OF CONSUMER CYBERCRIME ONE-AND-A-HALF MILLION VICTIMS DAILY THE GLOBAL PRICE TAG OF CONSUMER CYBERCRIME US $110 BILLION ANNUALLY CHANGING FACE OF CYBERCRIME CYBERCRIME GOES SOCIAL AND MOBILE SECURITY IQ: MIXED REPORT CARD FOR CONSUMERS CONSUMERS WISE UP TO TRADITIONAL THREATS, BUT MANY STILL UNAWARE AS TO HOW CYBERCRIME IS RAPIDLY EVOLVING STRONG PASSWORDS ARE KEY EMAIL A POTENTIAL GATEWAY FOR CYBERCRIMINALS KEY THEMES Website Security Threats: September 2013 Update
  • 8. Consumers are becoming less vigilant about protecting their safety online • Consumers are becoming less vigilant about protecting their safety online • Almost 30% said that they use secured wireless networks, down from 36% last year • 42% use passwords with upper and lower case letters, numbers and/or symbols, compared to 49% in 2012 • 39% conduct transactions through reputable websites only, down from 48% last year and 60% in 2011. • 17% use a PIN or password to lock a smartphone while just 8% use a mobile security app or feature. Website Security Threats: September 2013 Update
  • 9. German Data breach • 2 Million identities stolen in Germany • Names, addresses, dob, genders and banking details compromised • Attacker was an insider. Website Security Threats: September 2013 Update
  • 10. Money for (almost nothing) Compromised ATMs in Mexico handing out cash to criminals. Website Security Threats: September 2013 Update
  • 11. Car passes physical safety tests…. but fails the security test. Website Security Threats: September 2013 Update
  • 12. iPhone 5S Finger print Website Security Threats: September 2013 Update The new iPhone fingerprint reader relies on the living layer of skin in order to authenticate the owner.
  • 13. Lily who? Users searching for Lily Collins pictures and downloads, have a 14.5% chance of visiting a website with spyware, adware, spam and other malware. Website Security Threats: September 2013 Update
  • 14. Link Glossary (Press Print screen now) • What happens in an internet minute – http://intel.ly/15sGJgy • Facebook Privacy concerns – http://bit.ly/1b57zdu • App concerns – http://bit.ly/15sHINH • Hidden Lynx; Hackers for hire blog post – http://bit.ly/18VVyZM • Insider threats – http://bit.ly/1eGx8Wk • Cyber Attacks on SMB – http://bit.ly/1gZOLNF • Iphone finger print reader needs your living finger…. – http://bit.ly/18YGYL8 • Iphone fingerprint hack – http://bit.ly/1bFqiPF • Celebs the lure for malware – http://bit.ly/16yVBDZ Website Security Threats: September 2013 Update
  • 15. Thank you! Copyright © 2012 Symantec Corporation. All rights reserved. Symantec and the Symantec Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners. This document is provided for informational purposes only and is not intended as advertising. All warranties relating to the information in this document, either express or implied, are disclaimed to the maximum extent allowed by law. The information in this document is subject to change without notice. Andrew Shepherd andrew_shepherd@symantec.com / +44 7912 552896 Andrew Horbury andrew_horbury@symantec.com / +44 7703 468966 Website Security Threats: September 2013 Update Next webinar: 24th October 2013 9.30am GMT/10.30am CET