Skip to main content

What’s Biting Us

Who and What Does Cybercrime Hurt?

  • Chapter
  • First Online:
Personal Cybersecurity
  • 2419 Accesses

Abstract

Cyberspace has become a dangerous place. Cybercrime danger has grown during the last two decades. Computers used to be the domain of scientists and engineers with pocket protectors and too many ballpoint pens, not sophisticated criminals and menacing bullies. Almost every computer is connected to every other computer in the world via the Internet, offering unprecedented opportunities for communications and simultaneous opportunities for remote exploitation. This chapter summarizes the cybercrime problem, which ranges from annoying social media trolls to well-planned corporate attacks that strike tens of millions of victims.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 49.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    CBS. “ These Cybercrime Statistics Will Make You Think Twice About Your Password: Where’s the CSI Cyber team when you need them?” March 3, 2015.

    www.cbs.com/shows/csi-cyber/news/1003888/these-cybercrime-statistics-will-make-you-think-twice-about-your-password-where-s-the-csi-cyber-team-when-you-need-them -/. Accessed December 2015.

  2. 2.

    See Taylor Armerding, CIO, February 16, 2012. www.cio.com/article/2399262/data-breach/the-15-worst-data-security-breaches-of-the-21st-century.html . Accessed December 2015.

  3. 3.

    Phil Ducklin. “Internet of Things- do you really need a kettle that can boil your security dry?” Naked Security. October 10, 2015. https://nakedsecurity.sophos.com/2015/10/20/internet-of-things-do-you-really-need-a-kettle-that-can-boil-your-security-dry/ . Accessed December 2015.

  4. 4.

    Alexandra Burlacu. “Experts Warn It Just Takes 10 Seconds To Hack Fitbit Fitness Trackers: Here’s Fitbit’s Response.” Tech Times. October 24, 2015. www.techtimes.com/articles/98427/20151024/experts-warn-it-just-takes-10-seconds-to-hack-fitbit-fitness-trackers-heres-fitbits-response.htm . Accessed December 2015. Fitbit denied that the hack can do damage. Let’s hope that they are working on a fix. They would not be the first to stick their head in the sand and hope the problem goes away.

  5. 5.

    See Arbor Networks. “Arbor Networks 10th Annual Worldwide Infrastructure Security Report Finds 50X Increase in DDoS Attack Size in Past Decade.” www.arbornetworks.com/news-and-events/press-releases/recent-press-releases/5351-arbor-networks-10th-annual-worldwide-infrastructure-security-report-finds-50x-increase-in-ddos-attack-size-in-past-decade . Accessed December 2015.

  6. 6.

    See Akamai Technologies, Inc. “State of the Internet Security Report Q3 2015.”

    www.stateoftheinternet.com/downloads/pdfs/2015-cloud-security-report-q3.pdf . Accessed December 2015.

  7. 7.

    For an overview of the size and resilience of botnets, see Karl Thomas, “Nine Bad Botnets and The Damage They Did,” February 25, 2015. www.welivesecurity.com/2015/02/25/nine-bad-botnets-damage/ . Accessed December 2015.

  8. 8.

    Countries that are able to shut off the outside world have their own vulnerabilities. They may be isolated against their will by a hostile attack on their gateways. A country, active in international business, such as China, shut off from online business contact with their international partners by a hostile cyberforce could be economically devastated.

  9. 9.

    See Federal Bureau of Investigation, Internet Crime Complaint Center, 2014 Internet Crime Report. www.ic3.gov/media/annualreport/2014_IC3Report.pdf . Accessed December 2015. p. 47.

  10. 10.

    Center for Disease Control. Bullying Fact Sheet. www.cdc.gov/violenceprevention/pdf/bullying_factsheet.pdf . Accessed December 2015.

  11. 11.

    See http://newsroom.fb.com/company-info/ . Accessed December 2015.

  12. 12.

    See https://about.twitter.com/company . Accessed December 2015.

  13. 13.

    See Federal Bureau of Investigation, Internet Crime Complaint Center, 2014 Internet Crime Report. www.ic3.gov/media/annualreport/2014_IC3Report.pdf . Accessed December 2015. p. 41.

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Marvin Waschke

About this chapter

Cite this chapter

Waschke, M. (2017). What’s Biting Us. In: Personal Cybersecurity. Apress, Berkeley, CA. https://doi.org/10.1007/978-1-4842-2430-4_1

Download citation

Publish with us

Policies and ethics