April
23
0 likes
0 comments
0 shares

Report Marks 2013 Top Year for Cyber Crime

Verizon is scheduled to release a report which outlines findings showing 2013 to be a historic year for cyber crime, according to an article published on the Re/Code website. Between the monumental attack unleashed against Target which compromised “the credit and debit card numbers of some 40 million consumers” and those against Twitter, Facebook and others, the article notes that 2013 was a time when computer security incidents became a “mainstream” concern of the public.

The telecom firm’s “Data Breach Investigations Report” shows that “nearly all of the 1,300-plus data breaches confirmed last year were carried out using only nine basic attack patterns” but also highlights in the same data stream that “the number of overall attacks is on the rise” –  which is probably not a big surprise. The Verizon report (which contains more data to analyze than any other report of its kind) outlines “data on attacks from 50 companies and organizations, covering more than 63,000 computer security incidents and 1,347 confirmed breaches in 95 countries“, according to the article. The article states that “72 percent of all attacks” were executed by implementing “one of three methods” which can change according to the targeted industry.

The article states that when analysts examine the “financial industry” they find that  “75 percent of attacks involved hacking Web applications, launching distributed denial of service (DDoS) attacks, or card skimming“, when a cyber criminal “obtains a scan of a credit or debit card with the intention of using it to commit fraud“. Surprisingly, according to the article, 2013’s data showed that “financial motivations” for attacks were in the decline while “attempts to steal intellectual property” were on the increase. Jay Jacobs, a Verizon analyst who co-authored the firm’s report, was quoted in the article to say, “It’s not all about money anymore but who has the intellectual property.”

Read more in the full article about what types of data was compromised most frequently and in what environments these attacks occurred making 2013 an historic year.

Share:

LEAVE A COMMENT





This site uses Akismet to reduce spam. Learn how your comment data is processed.