SlideShare una empresa de Scribd logo
1 de 28
Descargar para leer sin conexión
2013 NORTON REPORT
2013 NORTON REPORT
24 COUNTRIES
AUSTRALIA, BRAZIL, CANADA, CHINA, COLOMBIA, DENMARK, 

FRANCE, GERMANY, INDIA, ITALY, JAPAN, MEXICO, NETHERLANDS, 

NEW ZEALAND, POLAND, RUSSIA, SAUDI ARABIA, SINGAPORE, 

SOUTH AFRICA, SWEDEN, TURKEY, UNITED ARAB EMIRATES, 

UNITED KINGDOM, UNITED STATES OF AMERICA

!
13,022 ONLINE ADULTS AGED 18-64
WHO IS AFFECTED MOST BY CYBERCRIME?
!
!
CYBERCRIME VICTIMS MORE
LIKELY TO BE:

HIGHEST NUMBER OF CYBERCRIME
VICTIMS FOUND IN:
RUSSIA

MALE – 64%



85%

MILLENNIAL – 66%

CHINA

(COMPARED TO 58% OF FEMALES)

(COMPARED TO 54% OF BABY BOOMERS)

!

AND:
• MOBILE DEVICE OWNERS – 63%
• SOCIAL NETWORK USERS – 63%
• PUBLIC / UNSECURED WI-FI USERS –
68%
• EMERGING MARKET – 68%
• PARENT OF CHILDREN 8-17 – 65%

77%

USA 63%; CANADA 68%; UK 58%; FRANCE 45%; GERMANY 53%; ITALY 56%; SWEDEN 56%; POLAND 60%; NETHERLANDS 50%; AUSTRALIA 60%; INDIA 65%;
JAPAN 19%; SINGAPORE 61%; NEW ZEALAND 69%; TURKEY 63%; DENMARK 50%; SAUDI ARABIA 62%; UAE 71%, COLOMBIA 64%

SOUTH AFRICA

73%

ALL STATS REFER TO LIFETIME VICTIMS
KEY THEMES
!
TABLET AND SMARTPHONE CONSUMERS LEAVE SECURITY
BEHIND
ALMOST 1/2 DON’T USE BASIC PRECAUTIONS SUCH AS PASSWORDS, SECURITY
SOFTWARE OR BACK UP FILES FOR THEIR MOBILE DEVICE
MORE THAN ONE-THIRD HAVE EXPERIENCED MOBILE CYBERCRIME LAST YEAR

!
THE GLOBAL PRICE TAG OF CONSUMER CYBERCRIME

US$113 BILLION ANNUALLY, COST PER CYBERCRIME VICTIM UP 50 PERCENT

!
THE SCALE OF CONSUMER CYBERCRIME
1 MILLION+ VICTIMS DAILY

!
CREATING PERFECT STORM AS LINES BLUR BETWEEN WORK/
PLAY
49% USE THEIR PERSONAL DEVICE FOR WORK AND PLAY
AROUND ONE-IN-FIVE SHARE WORK RELATED INFORMATION WITH FRIENDS AND
FAMILY
SMARTPHONE/TABLET CONSUMERS LEAVING SECURITY
BEHIND

1/2
1/2

NEARLY
SMARTPHONE/TABLET USERS SLEEP WITH
THEIR PHONES WITHIN ARMS’ REACH
NEARLY

DON’T USE BASIC PRECAUTIONS SUCH AS

PASSWORDS, SECURITY SOFTWARE OR BACK UP FILES FOR
THEIR
MOBILE DEVICE *
ONLY

26%

OF SMARTPHONE USERS HAVE

MOBILE SECURITY SOFTWARE WITH ADVANCED
PROTECTION

57%

AREN’T AWARE 

THAT SECURITY SOLUTIONS FOR MOBILE DEVICES EXIST *
*AMONG MOBILE DEVICE USERS
CONSUMERS’ SECURITY IQ –
DELETE SUSPICIOUS
EMAILS FROM PEOPLE
THEY DON’T KNOW

HIGH ON PC, LOW ON MOBILE

HAVE AT LEAST A BASIC
FREE ANTIVIRUS SOLUTION

AVOID STORING
SENSITIVE FILES ONLINE

90%


72%

78%


VS.

VS.

VS.

60%


42%

53%

VS.

VS.

VS.

56%

33%

48%

GOOD JOB!

NEEDS
WORK!

NEEDS
WORK!
MOBILE CYBERCRIME AND LOSS

38%

HAVE EXPERIENCED MOBILE

CYBERCRIME IN PAST 12 MONTHS *

27%

OF ADULTS 


HAVE LOST THEIR MOBILE DEVICE OR HAD IT
STOLEN

*AMONG SMARTPHONE USERS
THE GLOBAL PRICE TAG OF CONSUMER
CYBERCRIME

$113

BN

ENOUGH TO HOST THE 2012
LONDON OLYMPICS NEARLY 10 TIMES
OVER
Other
0,17
Fraud
0,38

Repairs
0,24

!

83% OF DIRECT FINANCIAL
COSTS ARE A RESULT OF
FRAUD, REPAIRS, THEFT AND
LOSS

USD $298
!

Theft or loss
0,21

AVERAGE COST PER VICTIM
REPRESENTS A 50 PERCENT INCREASE OVER 2012

ALL AMOUNTS IN USD
SEE EXTRAPOLATION CALCULATIONS *
THE GLOBAL PRICE TAG OF CONSUMER
CYBERCRIME

1 BN

RUSSIA

13BN

38 BN
3 BN

37BN

EUROPE

USA

CHINA

4BN

MEXICO

INDIA

8 BN

BRAZIL

1 BN
JAPAN

1 BN

AUSTRALIA

SOUTH AFRICA

0.3BN

ALL AMOUNTS IN USD ROUNDED TO THE NEAREST BILLION
CANADA 3 BN; SINGAPORE 1 BN; NEW ZEALAND 0.1 BN; TURKEY 2 BN; SAUDI ARABIA 0.5 BN; UAE 0.3 BN; COLOMBIA 0.5 BN
THE SCALE OF CONSUMER CYBERCRIME

378 MILLION

Ổ
Ộ
VICTIMS PER YEAR
bhë

NEARLY 2.8 TIMES AS MANY BABIES BORN EACH YEAR

1 MILLION +

VICTIMS PER DAY

ENOUGH TO FILL WEMBLEY STADIUM (ENGLAND) MORE THAN 10 TIMES

12 VICTIMS PER
SECOND

SEE EXTRAPOLATION CALCULATIONS *
THE SCALE OF CONSUMER CYBERCRIME

50% OF ONLINE
ADULTS

HAVE BEEN VICTIMS OF CYBERCRIME AND / OR
NEGATIVE ONLINE SITUATIONS IN THE PAST YEAR

(e.g., RECEIVED NUDE IMAGES FROM STRANGERS OR
WERE BULLIED OR STALKED ONLINE)

41% OF ONLINE ADULTS
HAVE FALLEN VICTIM TO ATTACKS SUCH AS MALWARE,
VIRUSES, HACKING, SCAMS, FRAUD AND THEFT
BLURRING BETWEEN WORK AND PLAY

49%
36%
30%

USE THEIR PERSONAL DEVICE FOR WORK AND
PLAY*

SAY THEIR COMPANY HAS NO POLICY ON USE
OF PERSONAL DEVICES FOR WORK*

OF PARENTS LET THEIR KIDS PLAY, DOWNLOAD AND
SHOP ON THEIR WORK DEVICE **

49%

34%

27%

OF RESPONDENTS ACCESS ACCESS THEIR SOCIAL STORE PERSONAL
OR SEND PERSONAL EMAILS NETWORK THROUGH INFORMATION ON THEIR
THROUGH THEIR WORK
THEIR WORK DEVICE* WORK DEVICE*
DEVICE*
*AMONG WORKING ADULTS
**AMONG PARENTS WHO USE DEVICES PROVIDED BY THEIR
ONLINE FILE STORAGE OPENS DOOR TO OVERSHARING

24%

OF USERS SAVE BOTH WORK AND PERSONAL
DOCUMENTS TO THE SAME ONLINE FILE STORAGE ACCOUNT
ON SHARING WORK-RELATED INFORMATION THROUGH ONLINE
FILE STORAGE SITES:

18%
FRIENDS

SHARE WITH

21%

SHARE WITH FAMILY

PUTTING BOTH WORK AND
PERSONAL DOCUMENTS AT
RISK
RISKY BEHAVIOR ON SOCIAL MEDIA

LOG OUT

39% 


OF SOCIAL MEDIA
USERS DON’T LOG OUT
AFTER EACH SESSION

****
1/4 


OF SOCIAL MEDIA USERS
SHARE THEIR SOCIAL
MEDIA PASSWORDS WITH
OTHERS

?
?

?

31% 


OF SOCIAL MEDIA USERS
CONNECT WITH PEOPLE
THEY DO NOT KNOW

12% OF SOCIAL MEDIA USERS SAY SOMEONE HAS HACKED
INTO THEIR SOCIAL NETWORK ACCOUNT AND PRETENDED TO BE
THEM
MOBILE AND SOCIAL STRESSORS

49%
OF MOBILE DEVICE USERS WOULD
FEEL UPSET/CONCERNED IF THEY
LEFT HOME WITHOUT THEIR
MOBILE DEVICE

6/10 


OF MOBILE DEVICE USERS
GET ANNOYED BY OTHERS
CHECKING THEIR MOBILES
DURING A MEAL

1/4 

OF MOBILE DEVICE
USERS CHECK THEIR
MOBILES WHILE SHARING
A MEAL WITH OTHERS

25% 

OF SOCIAL NETWORK USERS
CHECK THEIR SOCIAL NETWORK
WITHIN 15 MINUTES OF WAKING
UP
CONSUMERS PICK CONVENIENCE OVER SAFETY

1/3
ADMIT THE CONVENIENCE OF
CONSTANTLY CONNECTED
OUTWEIGHED ANY
POTENTIAL SECURITY RISKS

62%

AGREE THERE IS NO SUCH
THING AS ‘ONLINE PRIVACY’
IN TODAY’S WORLD

EVEN THOUGH…

46%
WISH THEY COULD
PERMANENTLY DELETE SOME
OF THEIR PERSONAL ONLINE
CONTENT COMPLETELY

7/10 


DON’T PUT ANYTHING ON
SOCIAL NETWORKS THAT
THEY WOULDN’T WANT
THEIR PARENTS / KIDS TO SEE
CONCLUSION

50%

OF ONLINE ADULTS HAVE
BEEN VICTIMS OF CYBERCRIME
AND / OR NEGATIVE ONLINE
SITUATIONS IN THE PAST YEAR
1M+ ADULTS BECOME CYBERCRIME VICTIMS EVERY DAY THAT’S 12 VICTIMS PER SECOND

$113

BILLION

TOTAL DIRECT GLOBAL
COSTS IN JUST 12 MONTHS

CONSUMERS MOVE TO MOBILE
DEVICES BUT LEAVE PROTECTION
BEHIND
CONSUMERS ARE INCREASINGLY USING MOBILE DEVICES AND
TABLET DEVICES BUT ARE NOT PROTECTING THEMSELVES.
WHILE DESKTOP PROTECTION IS HIGH AMONG CONSUMERS,
THE CYBERCRIMINAL IS MOVING TO MOBILE AND TABLET
DEVICES WHERE CONSUMERS ARE VULNERABLE.
MOBILE DEVICE ADOPTION CONTINUES TO GROW,
SUGGESTING A DEGREE OF MOBILE DEPENDENCE, WHICH
WILL INCREASE OPPORTUNITIES FOR CYBERCRIMINALS TO
STRIKE.

!

BLURRING BETWEEN WORK AND
PERSONAL MOBILE DEVICE USAGE
AS PERSONAL MOBILE DEVICES ARE BEING USED MORE AND
MORE FOR WORK-RELATED ACTIVITIES, CONSUMERS’
LIFESTYLES ARE PUTTING BUSINESS ENVIRONMENTS AT
RISK. AN ALARMING NUMBER OF BUSINESSES HAVE NO
POLICIES IN PLACE. FOR THOSE WHO DO, OUR RESEARCH
SUGGESTS THE POLICIES ARE OFTEN NOT RESPECTED BY
THEIR EMPLOYEES.

!

CONSUMERS PICK CONVENIENCE OVER
SAFETY

MANY CONSUMERS ARE MAKING A CONSCIOUS DECISION TO
TRADE THEIR SAFETY FOR CONVENIENCE; MANY MORE ARE
UNAWARE THAT THEY’RE MAKING THE SAME TRADE. BUT, IN USD
ALL AMOUNTS
“CONSTANTLY CONNECTED” DOESN’T HAVE TO EQUAL
TOP TIPS
DEFEND YOUR DATA
A COMPREHENSIVE SECURITY SUITE PROVIDES A STRONG DEFENSE AGAINST ONLINE
THREATS. NORTON 360 MULTI-DEVICE OFFERS PROTECTION FOR PCS, SMARTPHONES AND
TABLETS, IN A SINGLE SOLUTION

THINK OF MOBILE DEVICES AS MINI-COMPUTERS
MOBILE IS THE FASTEST-GROWING TARGET FOR CYBERCRIMINALS. MAKE SURE YOUR MOBILE
DEVICE REQUIRES A PASSWORD, AND TAKE PRECAUTIONS TO ENSURE YOUR DEVICE IS
PROTECTED AGAINST THEFT, LOSS AND CYBERCRIME

BE CAUTIOUS IN THE CLOUD
WHILE CLOUD STORAGE SOLUTIONS MAKE IT EASY TO SAVE AND SHARE FILES, THEY ALSO
OPEN OTHER AVENUES FOR ATTACK. BE CAREFUL ABOUT WHO HAS ACCESS TO YOUR FILES,
AND USE A SOLUTION WITH BUILT-IN SECURITY IF POSSIBLE

SAVE SENSITIVE TRANSACTIONS FOR SECURE CONNECTIONS
FREE OR UNSECURED WI-FI NETWORKS CAN MAKE IT EASY FOR THIEVES TO EAVESDROP ON
YOUR ACTIVITY. AVOID DOING ANY SENSITIVE TRANSACTIONS LIKE BANKING OR SHOPPING
WHILE CONNECTED TO THESE NETWORKS, OR USE A PERSONAL VPN CLIENT

AFTER YOU CONNECT, DOUBLE CHECK
CHECK CREDIT CARD AND BANK STATEMENTS REGULARLY FOR FRAUDULENT TRANSACTIONS,
AND REPORT ANY SUSPICIOUS ACTIVITY TO YOUR PROVIDER AND/OR LAW ENFORCEMENT

 
!
!

go.symantec.com/nortonreport-2013
THANK YOU
ADDITIONAL FINDINGS
POTENTIALLY RISKY BEHAVIOR ON UNSECURED WI-FI

56% ACCESS
THEIR SOCIAL
NETWORK
ACCOUNT

29%

ACCESS
THEIR BANK
ACCOUNT

3/10

NEEDS
WORK!

DO NOT
ALWAYS LOG OFF
AFTER HAVING USED A
PUBLIC WI-FI
CONNECTION

54% ACCESS
PERSONAL E-MAIL

29%

SHOP

ONLINE

39%

DO NOT TAKE
ANY SPECIAL STEPS TO
PROTECT THEMSELVES
WHEN USING PUBLIC WI-FI
*AMONG FREE/UNSECURED WI-FI USERS
BLURRING LINES BETWEEN FRIENDS AND ENEMIES

1/10
41%

HAVE ACCESSED THEIR PARTNER/FRIEND’S ACCOUNTS
WITHOUT PERMISSION

DID IT BECAUSE THEY
WERE CURIOUS*

26%

WERE GOOFING AROUND
/ PLAYING A JOKE*

18%

DIDN’T TRUST THEIR
PARTNER / FRIEND TO BE
HONEST ON THEIR OWN*

*AMONG THOSE WHO HAVE ACCESSED PARTNER/FRIEND'S EMAIL/ SOCIAL MEDIA
METHODOLOGY
THE METHODOLOGY DETAIL
EDELMAN BERLAND CONDUCTED AN
ONLINE SURVEY AMONG CONSUMERS:

!
13,022 ADULTS AGED 18-64 YEARS
!
!

The survey was conducted in 24 countries (Australia,
Brazil, Canada, China, Colombia, France, Denmark,
Germany, India, Italy, Japan, Mexico, Netherlands, New
Zealand, Poland, Russia, Saudi Arabia, Singapore, South
Africa, Sweden, Turkey, United Arab Emirates, United
Kingdom and United States).

!

The survey was conducted in the primary language of
each country, and questions asked were identical across
all countries.

!

Interviews were conducted between 4th July 2013
– 1st August 2013.

!

The margin of error for the total sample of adults
(n=13,022) is + 0.9% at the 95% level of confidence.

!
!
!

Important notes:

!

The Norton Cybercrime Report is an annual report
commissioned by Norton by Symantec aimed at
understanding how cybercrime affects consumers and
how the adoption and evolution of new technologies
impacts consumers’ security. The research was
conducted by Edelman Berland, an international
research agency. Findings are based on self-reported
experiences of over 13,000 adults across 24 countries.

!

1000 adult respondents were interviewed in each of USA
and India. The global data has been weighted to ensure
all countries have equal representation of n=500 adults.

!
Additional notes:
!

Developed Markets: USA, Canada, UK, France, Germany,
Italy, Sweden, Netherlands, Australia, Japan, Singapore,
New Zealand, Denmark
Emerging Markets: Brazil, Mexico, Poland, India, China,
Russia, Turkey, Saudi Arabia, UAE, Colombia, South Africa

!

Millennials: aged 18-34
Boomers: aged 45-64
DEFINITION OF CYBERCRIME

Cybercrime is defined as any of the following activities:
!
• Computer viruses or malicious software appeared on my computer
• I responded to a forged, ‘spoofed’ or fake email or website which captured my personal details such as passwords, credit
card numbers, or bank account information thinking it was a legitimate request in order to access information or provide
information to a legitimate organization, such as my bank, etc.
• Someone has hacked into my email account and pretended to be me
• Someone has hacked into my social networking profile and pretended to be me
• I responded to an online scam
• I experienced online credit card fraud
• I experienced identity theft
•  My phone was infected and a text message was sent from my mobile phone without my permission or knowledge that I
later had to pay for
• My screen was locked and an alert was shown, which told me to pay a fine to get it unlocked
• My smartphone was lost or stolen and someone found it and used it without my permission
• An app appeared on my smartphone that I didn’t download
• I’ve had someone purporting to be from a computer company call me to inform that I have an infected computer
• I experienced another type of cybercrime on my cell / mobile phone / tablet device
• I experienced another type of cybercrime on my desktop or laptop computer
DEFINITION OF CYBERCRIME

Cybercrime and /or negative online experience is defined
as any of the following activities:
!
• Computer viruses or malicious software appeared on my computer
• I responded to a forged, ‘spoofed’ or fake email or website which captured my personal details such as passwords, credit
card numbers, or bank account information thinking it was a legitimate request in order to access information or provide
information to a legitimate organization, such as my bank, etc.
• Someone has hacked into my email account and pretended to be me
• Someone has hacked into my social networking profile and pretended to be me
• I responded to an online scam
• I experienced online credit card fraud
• I experienced identity theft
•  My phone was infected and a text message was sent from my mobile phone without my permission or knowledge that I
later had to pay for
• My screen was locked and an alert was shown, which told me to pay a fine to get it unlocked
• My smartphone was lost or stolen and someone found it and used it without my permission
• An app appeared on my smartphone that I didn’t download
• I’ve had someone purporting to be from a computer company call me to inform that I have an infected computer
• I experienced another type of cybercrime on my cell / mobile phone / tablet device
• I experienced another type of cybercrime on my desktop or laptop computer
• I experienced someone posting private/intimate photos or videos of me without my permission
• I was approached online by someone in an unwanted sexual way
• I have experienced online bullying, online stalking, online hate crime or other forms of online harassment
• I have received SMS text messages from people I do not know, requesting me to click on an embedded link or stating that
I have received a voicemail and need to dial a number which is not my voicemail to retrieve it
• I have received unwanted nude images of someone I don’t know
• I have received unwanted nude images of someone I do know
EXTRAPOLATIONS CALCULATIONS
1) Nearly 380 million victims in 24 countries
over past 12 months
Online adults per country x % cybercrime
victims past 12 months per country =
377,943,431 (sum of 24 countries).

!

2) 12 cybercrime victims every second / 719
cybercrime victims every minute / 43,144 per
hour / more than 1 million per day impacting
almost 378 million adults in the past year in
24 countries*
Victims over past 12 months (as above)
377,943,431 / 365 days per year / 24 hours / 60
minutes / 60 seconds

!

3) Cybercrime is big business costing $113
billion in the last year in 24 countries
Victims over past 12 months (per country) x
average financial cost of cybercrime (per
country in US currency). Figure shown in the
sum of all countries total cost.

Más contenido relacionado

La actualidad más candente

Indonesia market overview 2015
Indonesia market overview 2015Indonesia market overview 2015
Indonesia market overview 2015Ho Ngoc Hieu
 
We Are Social’s Guide to Social, Digital and Mobile in Vietnam (2nd Edition, ...
We Are Social’s Guide to Social, Digital and Mobile in Vietnam (2nd Edition, ...We Are Social’s Guide to Social, Digital and Mobile in Vietnam (2nd Edition, ...
We Are Social’s Guide to Social, Digital and Mobile in Vietnam (2nd Edition, ...We Are Social Singapore
 
Better Security Through Big Data Analytics
Better Security Through Big Data AnalyticsBetter Security Through Big Data Analytics
Better Security Through Big Data AnalyticsSymantec
 
Digital trends 2017
Digital trends 2017Digital trends 2017
Digital trends 2017Alisha Gupta
 
Avast Q1 Security Report 2015
Avast Q1 Security Report 2015Avast Q1 Security Report 2015
Avast Q1 Security Report 2015Avast
 
Internet Safety: Social, Mobile, Messy
Internet Safety: Social, Mobile, MessyInternet Safety: Social, Mobile, Messy
Internet Safety: Social, Mobile, MessyMarian Merritt
 
Indonesia - the social media capital of the world
Indonesia - the social media capital of the worldIndonesia - the social media capital of the world
Indonesia - the social media capital of the worldOn Device Research
 
Games on Smartphones & Tablets: Demand, Revenue, Cost, Business Model, Usage,...
Games on Smartphones & Tablets: Demand, Revenue, Cost, Business Model, Usage,...Games on Smartphones & Tablets: Demand, Revenue, Cost, Business Model, Usage,...
Games on Smartphones & Tablets: Demand, Revenue, Cost, Business Model, Usage,...Flurry, Inc.
 
Mobile usage trends 2015
Mobile usage trends 2015Mobile usage trends 2015
Mobile usage trends 2015Alina Slichuk
 

La actualidad más candente (11)

Indonesia market overview 2015
Indonesia market overview 2015Indonesia market overview 2015
Indonesia market overview 2015
 
We Are Social’s Guide to Social, Digital and Mobile in Vietnam (2nd Edition, ...
We Are Social’s Guide to Social, Digital and Mobile in Vietnam (2nd Edition, ...We Are Social’s Guide to Social, Digital and Mobile in Vietnam (2nd Edition, ...
We Are Social’s Guide to Social, Digital and Mobile in Vietnam (2nd Edition, ...
 
Better Security Through Big Data Analytics
Better Security Through Big Data AnalyticsBetter Security Through Big Data Analytics
Better Security Through Big Data Analytics
 
Digital trends 2017
Digital trends 2017Digital trends 2017
Digital trends 2017
 
Avast Q1 Security Report 2015
Avast Q1 Security Report 2015Avast Q1 Security Report 2015
Avast Q1 Security Report 2015
 
Mobile Users in Indonesia
Mobile Users in IndonesiaMobile Users in Indonesia
Mobile Users in Indonesia
 
Internet Safety: Social, Mobile, Messy
Internet Safety: Social, Mobile, MessyInternet Safety: Social, Mobile, Messy
Internet Safety: Social, Mobile, Messy
 
Indonesia - the social media capital of the world
Indonesia - the social media capital of the worldIndonesia - the social media capital of the world
Indonesia - the social media capital of the world
 
Peter Farago
Peter FaragoPeter Farago
Peter Farago
 
Games on Smartphones & Tablets: Demand, Revenue, Cost, Business Model, Usage,...
Games on Smartphones & Tablets: Demand, Revenue, Cost, Business Model, Usage,...Games on Smartphones & Tablets: Demand, Revenue, Cost, Business Model, Usage,...
Games on Smartphones & Tablets: Demand, Revenue, Cost, Business Model, Usage,...
 
Mobile usage trends 2015
Mobile usage trends 2015Mobile usage trends 2015
Mobile usage trends 2015
 

Similar a Estudio cibercimen-2013-ciberinvestigacion

2012 norton cybercrime_report_master_final_050912
2012 norton cybercrime_report_master_final_0509122012 norton cybercrime_report_master_final_050912
2012 norton cybercrime_report_master_final_050912TimelineCR
 
Awareness about cybercrime among youth
Awareness about cybercrime among youthAwareness about cybercrime among youth
Awareness about cybercrime among youthnirmal00776
 
Norton Cyber Security Insights Report 2017
Norton Cyber Security Insights Report 2017Norton Cyber Security Insights Report 2017
Norton Cyber Security Insights Report 2017CheapSSLsecurity
 
Why Your Mobile Device Isn’t As Secure As You Think
Why Your Mobile Device Isn’t As Secure As You ThinkWhy Your Mobile Device Isn’t As Secure As You Think
Why Your Mobile Device Isn’t As Secure As You ThinkBlue Coat
 
Ericsson ConsumerLab: Privacy, security and safety online
Ericsson ConsumerLab: Privacy, security and safety onlineEricsson ConsumerLab: Privacy, security and safety online
Ericsson ConsumerLab: Privacy, security and safety onlineEricsson
 
Consumer Mobile Policy & Security - Lightspeed & Kantar
Consumer Mobile Policy & Security - Lightspeed & KantarConsumer Mobile Policy & Security - Lightspeed & Kantar
Consumer Mobile Policy & Security - Lightspeed & KantarMerlien Institute
 
Security Risks of Uneducated Employees
Security Risks of Uneducated EmployeesSecurity Risks of Uneducated Employees
Security Risks of Uneducated EmployeesOriginIT
 
Mobile infographic 2015_english
Mobile infographic 2015_englishMobile infographic 2015_english
Mobile infographic 2015_englisheasysolmaria
 
How consumers use technology and its impact on their lives.
How consumers use technology and its impact on their lives.How consumers use technology and its impact on their lives.
How consumers use technology and its impact on their lives.robertpresz7
 
La Tecnología Digital en México en 2018
La Tecnología Digital en México en 2018La Tecnología Digital en México en 2018
La Tecnología Digital en México en 2018We Are Social
 
Internet of Things: From Everyday Devices to Conduits of Commerce
Internet of Things: From Everyday Devices to Conduits of CommerceInternet of Things: From Everyday Devices to Conduits of Commerce
Internet of Things: From Everyday Devices to Conduits of CommerceEuromonitor International
 
Experian Cybersecurity Survey
Experian Cybersecurity Survey Experian Cybersecurity Survey
Experian Cybersecurity Survey Experian_US
 
Juniper Trusted Mobility Index 2012
Juniper Trusted Mobility Index 2012Juniper Trusted Mobility Index 2012
Juniper Trusted Mobility Index 2012Juniper Networks
 
TeleSign Consumer Account Security Report 2015 FINAL
TeleSign Consumer Account Security Report 2015 FINALTeleSign Consumer Account Security Report 2015 FINAL
TeleSign Consumer Account Security Report 2015 FINALPeggy Lawless
 

Similar a Estudio cibercimen-2013-ciberinvestigacion (20)

Norton Cyber Crime Report 2013
Norton Cyber Crime Report 2013Norton Cyber Crime Report 2013
Norton Cyber Crime Report 2013
 
2012 norton cybercrime_report_master_final_050912
2012 norton cybercrime_report_master_final_0509122012 norton cybercrime_report_master_final_050912
2012 norton cybercrime_report_master_final_050912
 
Awareness about cybercrime among youth
Awareness about cybercrime among youthAwareness about cybercrime among youth
Awareness about cybercrime among youth
 
Norton Cyber Security Insights Report 2017
Norton Cyber Security Insights Report 2017Norton Cyber Security Insights Report 2017
Norton Cyber Security Insights Report 2017
 
Why Your Mobile Device Isn’t As Secure As You Think
Why Your Mobile Device Isn’t As Secure As You ThinkWhy Your Mobile Device Isn’t As Secure As You Think
Why Your Mobile Device Isn’t As Secure As You Think
 
Ericsson ConsumerLab: Privacy, security and safety online
Ericsson ConsumerLab: Privacy, security and safety onlineEricsson ConsumerLab: Privacy, security and safety online
Ericsson ConsumerLab: Privacy, security and safety online
 
Consumer Mobile Policy & Security - Lightspeed & Kantar
Consumer Mobile Policy & Security - Lightspeed & KantarConsumer Mobile Policy & Security - Lightspeed & Kantar
Consumer Mobile Policy & Security - Lightspeed & Kantar
 
Security Risks of Uneducated Employees
Security Risks of Uneducated EmployeesSecurity Risks of Uneducated Employees
Security Risks of Uneducated Employees
 
Mobile infographic 2015_english
Mobile infographic 2015_englishMobile infographic 2015_english
Mobile infographic 2015_english
 
How consumers use technology and its impact on their lives.
How consumers use technology and its impact on their lives.How consumers use technology and its impact on their lives.
How consumers use technology and its impact on their lives.
 
Liberation from Location: El Salvador
Liberation from Location: El SalvadorLiberation from Location: El Salvador
Liberation from Location: El Salvador
 
Not logging on, but living on
Not logging on, but living onNot logging on, but living on
Not logging on, but living on
 
La Tecnología Digital en México en 2018
La Tecnología Digital en México en 2018La Tecnología Digital en México en 2018
La Tecnología Digital en México en 2018
 
Bilal Al Mourad - Ipsos - ICT Kuwait 2015 - MASHUP MENA Conference
Bilal Al Mourad  - Ipsos -  ICT Kuwait 2015 - MASHUP MENA Conference Bilal Al Mourad  - Ipsos -  ICT Kuwait 2015 - MASHUP MENA Conference
Bilal Al Mourad - Ipsos - ICT Kuwait 2015 - MASHUP MENA Conference
 
Tips and Tricks on Securing your Android Devices
Tips and Tricks on Securing your Android DevicesTips and Tricks on Securing your Android Devices
Tips and Tricks on Securing your Android Devices
 
Internet of Things: From Everyday Devices to Conduits of Commerce
Internet of Things: From Everyday Devices to Conduits of CommerceInternet of Things: From Everyday Devices to Conduits of Commerce
Internet of Things: From Everyday Devices to Conduits of Commerce
 
Experian Cybersecurity Survey
Experian Cybersecurity Survey Experian Cybersecurity Survey
Experian Cybersecurity Survey
 
Juniper Trusted Mobility Index 2012
Juniper Trusted Mobility Index 2012Juniper Trusted Mobility Index 2012
Juniper Trusted Mobility Index 2012
 
Read, like & shares
Read, like & sharesRead, like & shares
Read, like & shares
 
TeleSign Consumer Account Security Report 2015 FINAL
TeleSign Consumer Account Security Report 2015 FINALTeleSign Consumer Account Security Report 2015 FINAL
TeleSign Consumer Account Security Report 2015 FINAL
 

Más de Selva Orejón

Guia de ciberseguridad para menores de Europol:
Guia de ciberseguridad para menores de Europol: Guia de ciberseguridad para menores de Europol:
Guia de ciberseguridad para menores de Europol: Selva Orejón
 
Instagram protocolo-onbranding
Instagram protocolo-onbrandingInstagram protocolo-onbranding
Instagram protocolo-onbrandingSelva Orejón
 
Doble factor verificación google protocolo onBRANDING
Doble factor verificación google protocolo onBRANDINGDoble factor verificación google protocolo onBRANDING
Doble factor verificación google protocolo onBRANDINGSelva Orejón
 
Doble factor-verificacion-apple-protocolo-onbranding
Doble factor-verificacion-apple-protocolo-onbrandingDoble factor-verificacion-apple-protocolo-onbranding
Doble factor-verificacion-apple-protocolo-onbrandingSelva Orejón
 
smmday-2020-hackeo-cuentas-Selva-Orejon-onBRANDING
smmday-2020-hackeo-cuentas-Selva-Orejon-onBRANDINGsmmday-2020-hackeo-cuentas-Selva-Orejon-onBRANDING
smmday-2020-hackeo-cuentas-Selva-Orejon-onBRANDINGSelva Orejón
 
Protocolo onbranding-filtracion-exfiltracion
Protocolo onbranding-filtracion-exfiltracionProtocolo onbranding-filtracion-exfiltracion
Protocolo onbranding-filtracion-exfiltracionSelva Orejón
 
Protocolo onbranding-recuperacion-cuenta-google
Protocolo onbranding-recuperacion-cuenta-googleProtocolo onbranding-recuperacion-cuenta-google
Protocolo onbranding-recuperacion-cuenta-googleSelva Orejón
 
Protocolo onbranding-twitter-hackeado-hackeo
Protocolo onbranding-twitter-hackeado-hackeoProtocolo onbranding-twitter-hackeado-hackeo
Protocolo onbranding-twitter-hackeado-hackeoSelva Orejón
 
Protocolo onbranding sextorsion revenge porn el porno de la venganza
Protocolo onbranding sextorsion revenge porn el porno de la venganzaProtocolo onbranding sextorsion revenge porn el porno de la venganza
Protocolo onbranding sextorsion revenge porn el porno de la venganzaSelva Orejón
 
Protocolo onbranding-iphone-fallecido-muerto
Protocolo onbranding-iphone-fallecido-muertoProtocolo onbranding-iphone-fallecido-muerto
Protocolo onbranding-iphone-fallecido-muertoSelva Orejón
 
Protocolo onbranding ransomware cryptolocker
Protocolo onbranding ransomware cryptolockerProtocolo onbranding ransomware cryptolocker
Protocolo onbranding ransomware cryptolockerSelva Orejón
 
Protocolo onbranding-perdida-robo-android
Protocolo onbranding-perdida-robo-androidProtocolo onbranding-perdida-robo-android
Protocolo onbranding-perdida-robo-androidSelva Orejón
 
Protocolo onbranding hackeo facebook hackeado
Protocolo onbranding hackeo facebook hackeadoProtocolo onbranding hackeo facebook hackeado
Protocolo onbranding hackeo facebook hackeadoSelva Orejón
 
Filtración de contraseñas y correos: PROTOCOLO EXFILTRACION
Filtración de contraseñas y correos: PROTOCOLO EXFILTRACIONFiltración de contraseñas y correos: PROTOCOLO EXFILTRACION
Filtración de contraseñas y correos: PROTOCOLO EXFILTRACIONSelva Orejón
 
onBRANDING ciberseguro axa
onBRANDING ciberseguro axaonBRANDING ciberseguro axa
onBRANDING ciberseguro axaSelva Orejón
 
Plan identidad digital 2 eae
Plan identidad digital 2 eaePlan identidad digital 2 eae
Plan identidad digital 2 eaeSelva Orejón
 
Plan identidad digital 1
Plan identidad digital 1Plan identidad digital 1
Plan identidad digital 1Selva Orejón
 
Gestion crisis eae selva orejon
Gestion crisis eae selva orejonGestion crisis eae selva orejon
Gestion crisis eae selva orejonSelva Orejón
 

Más de Selva Orejón (20)

Guia de ciberseguridad para menores de Europol:
Guia de ciberseguridad para menores de Europol: Guia de ciberseguridad para menores de Europol:
Guia de ciberseguridad para menores de Europol:
 
onBRANDING logo
onBRANDING logoonBRANDING logo
onBRANDING logo
 
Instagram protocolo-onbranding
Instagram protocolo-onbrandingInstagram protocolo-onbranding
Instagram protocolo-onbranding
 
Doble factor verificación google protocolo onBRANDING
Doble factor verificación google protocolo onBRANDINGDoble factor verificación google protocolo onBRANDING
Doble factor verificación google protocolo onBRANDING
 
Doble factor-verificacion-apple-protocolo-onbranding
Doble factor-verificacion-apple-protocolo-onbrandingDoble factor-verificacion-apple-protocolo-onbranding
Doble factor-verificacion-apple-protocolo-onbranding
 
smmday-2020-hackeo-cuentas-Selva-Orejon-onBRANDING
smmday-2020-hackeo-cuentas-Selva-Orejon-onBRANDINGsmmday-2020-hackeo-cuentas-Selva-Orejon-onBRANDING
smmday-2020-hackeo-cuentas-Selva-Orejon-onBRANDING
 
Protocolo onbranding-filtracion-exfiltracion
Protocolo onbranding-filtracion-exfiltracionProtocolo onbranding-filtracion-exfiltracion
Protocolo onbranding-filtracion-exfiltracion
 
Protocolo onbranding-recuperacion-cuenta-google
Protocolo onbranding-recuperacion-cuenta-googleProtocolo onbranding-recuperacion-cuenta-google
Protocolo onbranding-recuperacion-cuenta-google
 
Protocolo onbranding-twitter-hackeado-hackeo
Protocolo onbranding-twitter-hackeado-hackeoProtocolo onbranding-twitter-hackeado-hackeo
Protocolo onbranding-twitter-hackeado-hackeo
 
Protocolo onbranding sextorsion revenge porn el porno de la venganza
Protocolo onbranding sextorsion revenge porn el porno de la venganzaProtocolo onbranding sextorsion revenge porn el porno de la venganza
Protocolo onbranding sextorsion revenge porn el porno de la venganza
 
Protocolo onbranding-iphone-fallecido-muerto
Protocolo onbranding-iphone-fallecido-muertoProtocolo onbranding-iphone-fallecido-muerto
Protocolo onbranding-iphone-fallecido-muerto
 
Protocolo onbranding ransomware cryptolocker
Protocolo onbranding ransomware cryptolockerProtocolo onbranding ransomware cryptolocker
Protocolo onbranding ransomware cryptolocker
 
Protocolo onbranding-perdida-robo-android
Protocolo onbranding-perdida-robo-androidProtocolo onbranding-perdida-robo-android
Protocolo onbranding-perdida-robo-android
 
Protocolo onbranding hackeo facebook hackeado
Protocolo onbranding hackeo facebook hackeadoProtocolo onbranding hackeo facebook hackeado
Protocolo onbranding hackeo facebook hackeado
 
Filtración de contraseñas y correos: PROTOCOLO EXFILTRACION
Filtración de contraseñas y correos: PROTOCOLO EXFILTRACIONFiltración de contraseñas y correos: PROTOCOLO EXFILTRACION
Filtración de contraseñas y correos: PROTOCOLO EXFILTRACION
 
onBRANDING ciberseguro axa
onBRANDING ciberseguro axaonBRANDING ciberseguro axa
onBRANDING ciberseguro axa
 
mapa de publicos
mapa de publicosmapa de publicos
mapa de publicos
 
Plan identidad digital 2 eae
Plan identidad digital 2 eaePlan identidad digital 2 eae
Plan identidad digital 2 eae
 
Plan identidad digital 1
Plan identidad digital 1Plan identidad digital 1
Plan identidad digital 1
 
Gestion crisis eae selva orejon
Gestion crisis eae selva orejonGestion crisis eae selva orejon
Gestion crisis eae selva orejon
 

Último

Event mailer assignment progress report .pdf
Event mailer assignment progress report .pdfEvent mailer assignment progress report .pdf
Event mailer assignment progress report .pdftbatkhuu1
 
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...lizamodels9
 
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature Set
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature SetCreating Low-Code Loan Applications using the Trisotech Mortgage Feature Set
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature SetDenis Gagné
 
9599632723 Top Call Girls in Delhi at your Door Step Available 24x7 Delhi
9599632723 Top Call Girls in Delhi at your Door Step Available 24x7 Delhi9599632723 Top Call Girls in Delhi at your Door Step Available 24x7 Delhi
9599632723 Top Call Girls in Delhi at your Door Step Available 24x7 DelhiCall Girls in Delhi
 
Sales & Marketing Alignment: How to Synergize for Success
Sales & Marketing Alignment: How to Synergize for SuccessSales & Marketing Alignment: How to Synergize for Success
Sales & Marketing Alignment: How to Synergize for SuccessAggregage
 
Regression analysis: Simple Linear Regression Multiple Linear Regression
Regression analysis:  Simple Linear Regression Multiple Linear RegressionRegression analysis:  Simple Linear Regression Multiple Linear Regression
Regression analysis: Simple Linear Regression Multiple Linear RegressionRavindra Nath Shukla
 
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service JamshedpurVIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service JamshedpurSuhani Kapoor
 
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999Tina Ji
 
M.C Lodges -- Guest House in Jhang.
M.C Lodges --  Guest House in Jhang.M.C Lodges --  Guest House in Jhang.
M.C Lodges -- Guest House in Jhang.Aaiza Hassan
 
Tech Startup Growth Hacking 101 - Basics on Growth Marketing
Tech Startup Growth Hacking 101  - Basics on Growth MarketingTech Startup Growth Hacking 101  - Basics on Growth Marketing
Tech Startup Growth Hacking 101 - Basics on Growth MarketingShawn Pang
 
Grateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdfGrateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdfPaul Menig
 
BEST ✨ Call Girls In Indirapuram Ghaziabad ✔️ 9871031762 ✔️ Escorts Service...
BEST ✨ Call Girls In  Indirapuram Ghaziabad  ✔️ 9871031762 ✔️ Escorts Service...BEST ✨ Call Girls In  Indirapuram Ghaziabad  ✔️ 9871031762 ✔️ Escorts Service...
BEST ✨ Call Girls In Indirapuram Ghaziabad ✔️ 9871031762 ✔️ Escorts Service...noida100girls
 
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRLMONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRLSeo
 
Best Basmati Rice Manufacturers in India
Best Basmati Rice Manufacturers in IndiaBest Basmati Rice Manufacturers in India
Best Basmati Rice Manufacturers in IndiaShree Krishna Exports
 
Monthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxMonthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxAndy Lambert
 
Value Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and painsValue Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and painsP&CO
 
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableDipal Arora
 
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesMysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesDipal Arora
 

Último (20)

Event mailer assignment progress report .pdf
Event mailer assignment progress report .pdfEvent mailer assignment progress report .pdf
Event mailer assignment progress report .pdf
 
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
 
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature Set
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature SetCreating Low-Code Loan Applications using the Trisotech Mortgage Feature Set
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature Set
 
9599632723 Top Call Girls in Delhi at your Door Step Available 24x7 Delhi
9599632723 Top Call Girls in Delhi at your Door Step Available 24x7 Delhi9599632723 Top Call Girls in Delhi at your Door Step Available 24x7 Delhi
9599632723 Top Call Girls in Delhi at your Door Step Available 24x7 Delhi
 
Forklift Operations: Safety through Cartoons
Forklift Operations: Safety through CartoonsForklift Operations: Safety through Cartoons
Forklift Operations: Safety through Cartoons
 
VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
 
Sales & Marketing Alignment: How to Synergize for Success
Sales & Marketing Alignment: How to Synergize for SuccessSales & Marketing Alignment: How to Synergize for Success
Sales & Marketing Alignment: How to Synergize for Success
 
Regression analysis: Simple Linear Regression Multiple Linear Regression
Regression analysis:  Simple Linear Regression Multiple Linear RegressionRegression analysis:  Simple Linear Regression Multiple Linear Regression
Regression analysis: Simple Linear Regression Multiple Linear Regression
 
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service JamshedpurVIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
 
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999
 
M.C Lodges -- Guest House in Jhang.
M.C Lodges --  Guest House in Jhang.M.C Lodges --  Guest House in Jhang.
M.C Lodges -- Guest House in Jhang.
 
Tech Startup Growth Hacking 101 - Basics on Growth Marketing
Tech Startup Growth Hacking 101  - Basics on Growth MarketingTech Startup Growth Hacking 101  - Basics on Growth Marketing
Tech Startup Growth Hacking 101 - Basics on Growth Marketing
 
Grateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdfGrateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdf
 
BEST ✨ Call Girls In Indirapuram Ghaziabad ✔️ 9871031762 ✔️ Escorts Service...
BEST ✨ Call Girls In  Indirapuram Ghaziabad  ✔️ 9871031762 ✔️ Escorts Service...BEST ✨ Call Girls In  Indirapuram Ghaziabad  ✔️ 9871031762 ✔️ Escorts Service...
BEST ✨ Call Girls In Indirapuram Ghaziabad ✔️ 9871031762 ✔️ Escorts Service...
 
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRLMONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
 
Best Basmati Rice Manufacturers in India
Best Basmati Rice Manufacturers in IndiaBest Basmati Rice Manufacturers in India
Best Basmati Rice Manufacturers in India
 
Monthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxMonthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptx
 
Value Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and painsValue Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and pains
 
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
 
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesMysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
 

Estudio cibercimen-2013-ciberinvestigacion

  • 2. 2013 NORTON REPORT 24 COUNTRIES AUSTRALIA, BRAZIL, CANADA, CHINA, COLOMBIA, DENMARK, 
 FRANCE, GERMANY, INDIA, ITALY, JAPAN, MEXICO, NETHERLANDS, 
 NEW ZEALAND, POLAND, RUSSIA, SAUDI ARABIA, SINGAPORE, 
 SOUTH AFRICA, SWEDEN, TURKEY, UNITED ARAB EMIRATES, 
 UNITED KINGDOM, UNITED STATES OF AMERICA ! 13,022 ONLINE ADULTS AGED 18-64
  • 3. WHO IS AFFECTED MOST BY CYBERCRIME? ! ! CYBERCRIME VICTIMS MORE LIKELY TO BE: HIGHEST NUMBER OF CYBERCRIME VICTIMS FOUND IN: RUSSIA MALE – 64% 
 85% MILLENNIAL – 66% CHINA (COMPARED TO 58% OF FEMALES) (COMPARED TO 54% OF BABY BOOMERS) ! AND: • MOBILE DEVICE OWNERS – 63% • SOCIAL NETWORK USERS – 63% • PUBLIC / UNSECURED WI-FI USERS – 68% • EMERGING MARKET – 68% • PARENT OF CHILDREN 8-17 – 65% 77% USA 63%; CANADA 68%; UK 58%; FRANCE 45%; GERMANY 53%; ITALY 56%; SWEDEN 56%; POLAND 60%; NETHERLANDS 50%; AUSTRALIA 60%; INDIA 65%; JAPAN 19%; SINGAPORE 61%; NEW ZEALAND 69%; TURKEY 63%; DENMARK 50%; SAUDI ARABIA 62%; UAE 71%, COLOMBIA 64% SOUTH AFRICA 73% ALL STATS REFER TO LIFETIME VICTIMS
  • 4. KEY THEMES ! TABLET AND SMARTPHONE CONSUMERS LEAVE SECURITY BEHIND ALMOST 1/2 DON’T USE BASIC PRECAUTIONS SUCH AS PASSWORDS, SECURITY SOFTWARE OR BACK UP FILES FOR THEIR MOBILE DEVICE MORE THAN ONE-THIRD HAVE EXPERIENCED MOBILE CYBERCRIME LAST YEAR ! THE GLOBAL PRICE TAG OF CONSUMER CYBERCRIME US$113 BILLION ANNUALLY, COST PER CYBERCRIME VICTIM UP 50 PERCENT ! THE SCALE OF CONSUMER CYBERCRIME 1 MILLION+ VICTIMS DAILY ! CREATING PERFECT STORM AS LINES BLUR BETWEEN WORK/ PLAY 49% USE THEIR PERSONAL DEVICE FOR WORK AND PLAY AROUND ONE-IN-FIVE SHARE WORK RELATED INFORMATION WITH FRIENDS AND FAMILY
  • 5. SMARTPHONE/TABLET CONSUMERS LEAVING SECURITY BEHIND 1/2 1/2 NEARLY SMARTPHONE/TABLET USERS SLEEP WITH THEIR PHONES WITHIN ARMS’ REACH NEARLY DON’T USE BASIC PRECAUTIONS SUCH AS PASSWORDS, SECURITY SOFTWARE OR BACK UP FILES FOR THEIR MOBILE DEVICE * ONLY 26% OF SMARTPHONE USERS HAVE MOBILE SECURITY SOFTWARE WITH ADVANCED PROTECTION 57% AREN’T AWARE 
 THAT SECURITY SOLUTIONS FOR MOBILE DEVICES EXIST * *AMONG MOBILE DEVICE USERS
  • 6. CONSUMERS’ SECURITY IQ – DELETE SUSPICIOUS EMAILS FROM PEOPLE THEY DON’T KNOW HIGH ON PC, LOW ON MOBILE HAVE AT LEAST A BASIC FREE ANTIVIRUS SOLUTION AVOID STORING SENSITIVE FILES ONLINE 90%
 72% 78%
 VS. VS. VS. 60%
 42% 53% VS. VS. VS. 56% 33% 48% GOOD JOB! NEEDS WORK! NEEDS WORK!
  • 7. MOBILE CYBERCRIME AND LOSS 38% HAVE EXPERIENCED MOBILE CYBERCRIME IN PAST 12 MONTHS * 27% OF ADULTS 
 HAVE LOST THEIR MOBILE DEVICE OR HAD IT STOLEN *AMONG SMARTPHONE USERS
  • 8. THE GLOBAL PRICE TAG OF CONSUMER CYBERCRIME $113 BN ENOUGH TO HOST THE 2012 LONDON OLYMPICS NEARLY 10 TIMES OVER Other 0,17 Fraud 0,38 Repairs 0,24 ! 83% OF DIRECT FINANCIAL COSTS ARE A RESULT OF FRAUD, REPAIRS, THEFT AND LOSS USD $298 ! Theft or loss 0,21 AVERAGE COST PER VICTIM REPRESENTS A 50 PERCENT INCREASE OVER 2012 ALL AMOUNTS IN USD SEE EXTRAPOLATION CALCULATIONS *
  • 9. THE GLOBAL PRICE TAG OF CONSUMER CYBERCRIME 1 BN RUSSIA 13BN 38 BN 3 BN 37BN EUROPE USA CHINA 4BN MEXICO INDIA 8 BN BRAZIL 1 BN JAPAN 1 BN AUSTRALIA SOUTH AFRICA 0.3BN ALL AMOUNTS IN USD ROUNDED TO THE NEAREST BILLION CANADA 3 BN; SINGAPORE 1 BN; NEW ZEALAND 0.1 BN; TURKEY 2 BN; SAUDI ARABIA 0.5 BN; UAE 0.3 BN; COLOMBIA 0.5 BN
  • 10. THE SCALE OF CONSUMER CYBERCRIME 378 MILLION Ổ Ộ VICTIMS PER YEAR bhë NEARLY 2.8 TIMES AS MANY BABIES BORN EACH YEAR 1 MILLION + VICTIMS PER DAY ENOUGH TO FILL WEMBLEY STADIUM (ENGLAND) MORE THAN 10 TIMES 12 VICTIMS PER SECOND SEE EXTRAPOLATION CALCULATIONS *
  • 11. THE SCALE OF CONSUMER CYBERCRIME 50% OF ONLINE ADULTS
 HAVE BEEN VICTIMS OF CYBERCRIME AND / OR NEGATIVE ONLINE SITUATIONS IN THE PAST YEAR
 (e.g., RECEIVED NUDE IMAGES FROM STRANGERS OR WERE BULLIED OR STALKED ONLINE) 41% OF ONLINE ADULTS HAVE FALLEN VICTIM TO ATTACKS SUCH AS MALWARE, VIRUSES, HACKING, SCAMS, FRAUD AND THEFT
  • 12. BLURRING BETWEEN WORK AND PLAY 49% 36% 30% USE THEIR PERSONAL DEVICE FOR WORK AND PLAY* SAY THEIR COMPANY HAS NO POLICY ON USE OF PERSONAL DEVICES FOR WORK* OF PARENTS LET THEIR KIDS PLAY, DOWNLOAD AND SHOP ON THEIR WORK DEVICE ** 49% 34% 27% OF RESPONDENTS ACCESS ACCESS THEIR SOCIAL STORE PERSONAL OR SEND PERSONAL EMAILS NETWORK THROUGH INFORMATION ON THEIR THROUGH THEIR WORK THEIR WORK DEVICE* WORK DEVICE* DEVICE* *AMONG WORKING ADULTS **AMONG PARENTS WHO USE DEVICES PROVIDED BY THEIR
  • 13. ONLINE FILE STORAGE OPENS DOOR TO OVERSHARING 24% OF USERS SAVE BOTH WORK AND PERSONAL DOCUMENTS TO THE SAME ONLINE FILE STORAGE ACCOUNT ON SHARING WORK-RELATED INFORMATION THROUGH ONLINE FILE STORAGE SITES: 18% FRIENDS SHARE WITH 21% SHARE WITH FAMILY PUTTING BOTH WORK AND PERSONAL DOCUMENTS AT RISK
  • 14. RISKY BEHAVIOR ON SOCIAL MEDIA LOG OUT 39% 
 OF SOCIAL MEDIA USERS DON’T LOG OUT AFTER EACH SESSION **** 1/4 
 OF SOCIAL MEDIA USERS SHARE THEIR SOCIAL MEDIA PASSWORDS WITH OTHERS ? ? ? 31% 
 OF SOCIAL MEDIA USERS CONNECT WITH PEOPLE THEY DO NOT KNOW 12% OF SOCIAL MEDIA USERS SAY SOMEONE HAS HACKED INTO THEIR SOCIAL NETWORK ACCOUNT AND PRETENDED TO BE THEM
  • 15. MOBILE AND SOCIAL STRESSORS 49% OF MOBILE DEVICE USERS WOULD FEEL UPSET/CONCERNED IF THEY LEFT HOME WITHOUT THEIR MOBILE DEVICE 6/10 
 OF MOBILE DEVICE USERS GET ANNOYED BY OTHERS CHECKING THEIR MOBILES DURING A MEAL 1/4 
 OF MOBILE DEVICE USERS CHECK THEIR MOBILES WHILE SHARING A MEAL WITH OTHERS 25% 
 OF SOCIAL NETWORK USERS CHECK THEIR SOCIAL NETWORK WITHIN 15 MINUTES OF WAKING UP
  • 16. CONSUMERS PICK CONVENIENCE OVER SAFETY 1/3 ADMIT THE CONVENIENCE OF CONSTANTLY CONNECTED OUTWEIGHED ANY POTENTIAL SECURITY RISKS 62% AGREE THERE IS NO SUCH THING AS ‘ONLINE PRIVACY’ IN TODAY’S WORLD EVEN THOUGH… 46% WISH THEY COULD PERMANENTLY DELETE SOME OF THEIR PERSONAL ONLINE CONTENT COMPLETELY 7/10 
 DON’T PUT ANYTHING ON SOCIAL NETWORKS THAT THEY WOULDN’T WANT THEIR PARENTS / KIDS TO SEE
  • 17. CONCLUSION 50% OF ONLINE ADULTS HAVE BEEN VICTIMS OF CYBERCRIME AND / OR NEGATIVE ONLINE SITUATIONS IN THE PAST YEAR 1M+ ADULTS BECOME CYBERCRIME VICTIMS EVERY DAY THAT’S 12 VICTIMS PER SECOND $113 BILLION TOTAL DIRECT GLOBAL COSTS IN JUST 12 MONTHS CONSUMERS MOVE TO MOBILE DEVICES BUT LEAVE PROTECTION BEHIND CONSUMERS ARE INCREASINGLY USING MOBILE DEVICES AND TABLET DEVICES BUT ARE NOT PROTECTING THEMSELVES. WHILE DESKTOP PROTECTION IS HIGH AMONG CONSUMERS, THE CYBERCRIMINAL IS MOVING TO MOBILE AND TABLET DEVICES WHERE CONSUMERS ARE VULNERABLE. MOBILE DEVICE ADOPTION CONTINUES TO GROW, SUGGESTING A DEGREE OF MOBILE DEPENDENCE, WHICH WILL INCREASE OPPORTUNITIES FOR CYBERCRIMINALS TO STRIKE. ! BLURRING BETWEEN WORK AND PERSONAL MOBILE DEVICE USAGE AS PERSONAL MOBILE DEVICES ARE BEING USED MORE AND MORE FOR WORK-RELATED ACTIVITIES, CONSUMERS’ LIFESTYLES ARE PUTTING BUSINESS ENVIRONMENTS AT RISK. AN ALARMING NUMBER OF BUSINESSES HAVE NO POLICIES IN PLACE. FOR THOSE WHO DO, OUR RESEARCH SUGGESTS THE POLICIES ARE OFTEN NOT RESPECTED BY THEIR EMPLOYEES. ! CONSUMERS PICK CONVENIENCE OVER SAFETY MANY CONSUMERS ARE MAKING A CONSCIOUS DECISION TO TRADE THEIR SAFETY FOR CONVENIENCE; MANY MORE ARE UNAWARE THAT THEY’RE MAKING THE SAME TRADE. BUT, IN USD ALL AMOUNTS “CONSTANTLY CONNECTED” DOESN’T HAVE TO EQUAL
  • 18. TOP TIPS DEFEND YOUR DATA A COMPREHENSIVE SECURITY SUITE PROVIDES A STRONG DEFENSE AGAINST ONLINE THREATS. NORTON 360 MULTI-DEVICE OFFERS PROTECTION FOR PCS, SMARTPHONES AND TABLETS, IN A SINGLE SOLUTION THINK OF MOBILE DEVICES AS MINI-COMPUTERS MOBILE IS THE FASTEST-GROWING TARGET FOR CYBERCRIMINALS. MAKE SURE YOUR MOBILE DEVICE REQUIRES A PASSWORD, AND TAKE PRECAUTIONS TO ENSURE YOUR DEVICE IS PROTECTED AGAINST THEFT, LOSS AND CYBERCRIME BE CAUTIOUS IN THE CLOUD WHILE CLOUD STORAGE SOLUTIONS MAKE IT EASY TO SAVE AND SHARE FILES, THEY ALSO OPEN OTHER AVENUES FOR ATTACK. BE CAREFUL ABOUT WHO HAS ACCESS TO YOUR FILES, AND USE A SOLUTION WITH BUILT-IN SECURITY IF POSSIBLE SAVE SENSITIVE TRANSACTIONS FOR SECURE CONNECTIONS FREE OR UNSECURED WI-FI NETWORKS CAN MAKE IT EASY FOR THIEVES TO EAVESDROP ON YOUR ACTIVITY. AVOID DOING ANY SENSITIVE TRANSACTIONS LIKE BANKING OR SHOPPING WHILE CONNECTED TO THESE NETWORKS, OR USE A PERSONAL VPN CLIENT AFTER YOU CONNECT, DOUBLE CHECK CHECK CREDIT CARD AND BANK STATEMENTS REGULARLY FOR FRAUDULENT TRANSACTIONS, AND REPORT ANY SUSPICIOUS ACTIVITY TO YOUR PROVIDER AND/OR LAW ENFORCEMENT  
  • 22. POTENTIALLY RISKY BEHAVIOR ON UNSECURED WI-FI 56% ACCESS THEIR SOCIAL NETWORK ACCOUNT 29% ACCESS THEIR BANK ACCOUNT 3/10 NEEDS WORK! DO NOT ALWAYS LOG OFF AFTER HAVING USED A PUBLIC WI-FI CONNECTION 54% ACCESS PERSONAL E-MAIL 29% SHOP ONLINE 39% DO NOT TAKE ANY SPECIAL STEPS TO PROTECT THEMSELVES WHEN USING PUBLIC WI-FI *AMONG FREE/UNSECURED WI-FI USERS
  • 23. BLURRING LINES BETWEEN FRIENDS AND ENEMIES 1/10 41% HAVE ACCESSED THEIR PARTNER/FRIEND’S ACCOUNTS WITHOUT PERMISSION DID IT BECAUSE THEY WERE CURIOUS* 26% WERE GOOFING AROUND / PLAYING A JOKE* 18% DIDN’T TRUST THEIR PARTNER / FRIEND TO BE HONEST ON THEIR OWN* *AMONG THOSE WHO HAVE ACCESSED PARTNER/FRIEND'S EMAIL/ SOCIAL MEDIA
  • 25. THE METHODOLOGY DETAIL EDELMAN BERLAND CONDUCTED AN ONLINE SURVEY AMONG CONSUMERS: ! 13,022 ADULTS AGED 18-64 YEARS ! ! The survey was conducted in 24 countries (Australia, Brazil, Canada, China, Colombia, France, Denmark, Germany, India, Italy, Japan, Mexico, Netherlands, New Zealand, Poland, Russia, Saudi Arabia, Singapore, South Africa, Sweden, Turkey, United Arab Emirates, United Kingdom and United States). ! The survey was conducted in the primary language of each country, and questions asked were identical across all countries. ! Interviews were conducted between 4th July 2013 – 1st August 2013. ! The margin of error for the total sample of adults (n=13,022) is + 0.9% at the 95% level of confidence. ! ! ! Important notes: ! The Norton Cybercrime Report is an annual report commissioned by Norton by Symantec aimed at understanding how cybercrime affects consumers and how the adoption and evolution of new technologies impacts consumers’ security. The research was conducted by Edelman Berland, an international research agency. Findings are based on self-reported experiences of over 13,000 adults across 24 countries. ! 1000 adult respondents were interviewed in each of USA and India. The global data has been weighted to ensure all countries have equal representation of n=500 adults. ! Additional notes: ! Developed Markets: USA, Canada, UK, France, Germany, Italy, Sweden, Netherlands, Australia, Japan, Singapore, New Zealand, Denmark Emerging Markets: Brazil, Mexico, Poland, India, China, Russia, Turkey, Saudi Arabia, UAE, Colombia, South Africa ! Millennials: aged 18-34 Boomers: aged 45-64
  • 26. DEFINITION OF CYBERCRIME Cybercrime is defined as any of the following activities: ! • Computer viruses or malicious software appeared on my computer • I responded to a forged, ‘spoofed’ or fake email or website which captured my personal details such as passwords, credit card numbers, or bank account information thinking it was a legitimate request in order to access information or provide information to a legitimate organization, such as my bank, etc. • Someone has hacked into my email account and pretended to be me • Someone has hacked into my social networking profile and pretended to be me • I responded to an online scam • I experienced online credit card fraud • I experienced identity theft •  My phone was infected and a text message was sent from my mobile phone without my permission or knowledge that I later had to pay for • My screen was locked and an alert was shown, which told me to pay a fine to get it unlocked • My smartphone was lost or stolen and someone found it and used it without my permission • An app appeared on my smartphone that I didn’t download • I’ve had someone purporting to be from a computer company call me to inform that I have an infected computer • I experienced another type of cybercrime on my cell / mobile phone / tablet device • I experienced another type of cybercrime on my desktop or laptop computer
  • 27. DEFINITION OF CYBERCRIME Cybercrime and /or negative online experience is defined as any of the following activities: ! • Computer viruses or malicious software appeared on my computer • I responded to a forged, ‘spoofed’ or fake email or website which captured my personal details such as passwords, credit card numbers, or bank account information thinking it was a legitimate request in order to access information or provide information to a legitimate organization, such as my bank, etc. • Someone has hacked into my email account and pretended to be me • Someone has hacked into my social networking profile and pretended to be me • I responded to an online scam • I experienced online credit card fraud • I experienced identity theft •  My phone was infected and a text message was sent from my mobile phone without my permission or knowledge that I later had to pay for • My screen was locked and an alert was shown, which told me to pay a fine to get it unlocked • My smartphone was lost or stolen and someone found it and used it without my permission • An app appeared on my smartphone that I didn’t download • I’ve had someone purporting to be from a computer company call me to inform that I have an infected computer • I experienced another type of cybercrime on my cell / mobile phone / tablet device • I experienced another type of cybercrime on my desktop or laptop computer • I experienced someone posting private/intimate photos or videos of me without my permission • I was approached online by someone in an unwanted sexual way • I have experienced online bullying, online stalking, online hate crime or other forms of online harassment • I have received SMS text messages from people I do not know, requesting me to click on an embedded link or stating that I have received a voicemail and need to dial a number which is not my voicemail to retrieve it • I have received unwanted nude images of someone I don’t know • I have received unwanted nude images of someone I do know
  • 28. EXTRAPOLATIONS CALCULATIONS 1) Nearly 380 million victims in 24 countries over past 12 months Online adults per country x % cybercrime victims past 12 months per country = 377,943,431 (sum of 24 countries). ! 2) 12 cybercrime victims every second / 719 cybercrime victims every minute / 43,144 per hour / more than 1 million per day impacting almost 378 million adults in the past year in 24 countries* Victims over past 12 months (as above) 377,943,431 / 365 days per year / 24 hours / 60 minutes / 60 seconds ! 3) Cybercrime is big business costing $113 billion in the last year in 24 countries Victims over past 12 months (per country) x average financial cost of cybercrime (per country in US currency). Figure shown in the sum of all countries total cost.