Why Cybercrime Now Exceeds Conventional Crime

cyber-security-laws-5-638.jpg?cb=1426621844

 

Online crime worldwide is increasingly displacing conventional forms of property crime, such as burglary and robbery.

In London, for example, police report that organized crime syndicates have been increasingly embracing cybercrime - in particular, payment card fraud and identity scams - given the potential for a vastly greater return on their investment, as well as much lower risk, UK cybersecurity expert Alan Woodward says in an interview.

"It's no longer the spotty youth in his bedroom, committing some opportunistic crime," says Woodward, a visiting professor at the University of Surrey who is also a cybersecurity adviser to the association of European police agencies known as Europol. "Some of these are very highly orchestrated crimes. They require money and they require some quite sophisticated software to be written. And indeed, 'crime as a service' is actually growing as a genre online."

Earlier this year, London's mayor's office and Metropolitan Police released an online theft and fraud report, noting that 70 percent of all fraud now involves the Internet.

But fraud-related losses may be dramatically underreported. Woodward says that in the UK alone, the City of London Police, which takes the lead on fraud investigations, estimates that £2.2 billion ($3.4 billion) is lost to card fraud every year. But police also suspect that 85 percent of fraud is not being reported by consumers, meaning that annually, actual losses might total £12.1 billion ($18.7 billion).

The good news, however, is that police forces in many countries - not just across Europe, but also in North America - have been conducting joint operations where they have been able to track back crimes, shut down criminal organizations and, in many cases, prosecute suspects. 

However, statements by the UK government that overall crime in the UK is reducing take little account of the substantial increase in cyber crime, which often goes unreported and uninvestigated.

DataBreachToday:

 

 

« Using Threat Intelligence Against Cybercriminals
FBI Urges Firms to Plan For Cyber Attack »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

CCN-CERT

CCN-CERT

CCN-CERT is the Spanish national government computer security incident response centre.

Securi-Tay

Securi-Tay

Securi-Tay is an information Security conference held by the Ethical Hacking Society at Abertay University, Dundee.

Authorize.Net

Authorize.Net

Authorize.Net is a Payment Gateway which provides the complex infrastructure and security necessary to ensure fast, reliable and secure transactions.

Armadillo Sec

Armadillo Sec

Armadillo provide penetration testing and vulnerability assessment services.

Nexusguard

Nexusguard

Nexusguard is at the forefront of the fight against malicious Internet attacks, protecting organizations worldwide from threats to their websites, services, and reputations.

Enigmatos

Enigmatos

Enigmatos is an Israeli based Automotive Cyber Security company. We provide solutions to the ever growing threat of vehicle hacking.

ENAC

ENAC

ENAC is the national accreditation body for Spain. The directory of members provides details of organisations offering certification services for ISO 27001.

ArmorText

ArmorText

ArmorText offers a seamless channel for communication and collaboration for organizations concerned with keeping communication data private and secure.

SOOHO

SOOHO

SOOHO helps to detect security vulnerabilities earlier. Our blockchain security platform audits from smart contracts to on-chain transactions.

Quantum Generation

Quantum Generation

Quantum Cyber Security for a new age of communications. We are developing the largest decentralized orbital, and ground quantum mesh network based on blockchain technology.

Black Hills Information Security (BHIS)

Black Hills Information Security (BHIS)

Black Hills Information Security provide security testing and vulnerability assessment services.

Center for Education & Research in Information Assurance & Security (CERIAS)

Center for Education & Research in Information Assurance & Security (CERIAS)

CERIAS is one of the world’s leading centers for research and education in areas of information and cyber security.

Gula Tech Adventures

Gula Tech Adventures

Gula Tech Adventures invests in companies and nonprofits that help close the gap in needed technology and workforce to defend the country in cyberspace.

Axiata Digital Labs

Axiata Digital Labs

Axiata Digital Labs is the technology hub of Axiata Group Berhad Malaysia which is one of the leading groups in telecommunication in Asia.

Probity

Probity

Probity Inc. is a certified software development and systems engineering company, providing support to federal government and national defense related clients.

Armata Cyber Security

Armata Cyber Security

Armata exists to bring Cyber Security to all people – from home users and SMBs to large enterprises. We believe all users have the right to an affordable yet effective Cyber Security solution.