Millennials More Likely To Fall Victim To Cybercrime

Millennials are more likely to fall victim to online and phone-based scams than the 70-plus set, a recent survey.

According to data recently released by the US Federal Trade Commission, (FTC) 40 percent of US millennials, those aged 20-29, who reported being a victim of a fraud last year said it also cost them money.

For fraud victims over 70, only 18 percent admitted to losing money. The older the mark, however, the bigger the amount ripped off.

  • The median loss was $1,092 for those over 80 and $621 for those 70-79, the FTC said.
  • For care-free (and often cash-light) Americans in their 20s, the median loss was only $400.
  • The FTC based its compilations for 2017 on 2.7 million consumer reports submitted directly to the agency or indirectly filed with law enforcement and organizations like the Council of Better Business Bureaus.
  • While submissions were down 10 percent last year, money lost to fraud increased 7 percent to $905 million, the FTC said.
  • Phony debt collections remained the No. 1 consumer complaint (23 percent of the total), followed by identity theft (14 percent) and imposter scams (13 percent).
  • The FTC defines imposter scams as someone pretending to be a government official, tech support representative, a loved one in trouble or someone else in order to get consumers to give the scammer money.

Although they ranked third in complaint volume, imposter scams cost FTC-complaining consumers more money, $328 million, than any other type of fraud.

Scammers mostly worked the phones, which were instrumental in 70 percent of the complaints. But their efforts yielded an illicit gain in only 9 percent of reported cases.

Wire transfers served as the preferred payment mechanism for fraudsters, accounting for nearly half of complaints submitted to the FTC that identified a form of payment.

NYPost:

You Might Also Read: 

Dark Web Fraud Undetectable By Police:

What Makes A  Cyber Criminal?:

 

« UK Will Have Driverless Cars By 2021
Charities Are Vulnerable To Severe Cyber Attacks »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

CoSoSys Endpoint Protector

CoSoSys Endpoint Protector

Endpoint Protector by CoSoSys is an advanced all-in-one DLP solution for Windows, macOS, and Linux, that puts an end to unintentional data leaks and protects from malicious data theft.

ProfitBricks

ProfitBricks

ProfitBricks is a secure cloud computing infrastructure-as-a-service (IaaS) solution.

Assured Data Protection

Assured Data Protection

Assured Data Protection specialises in data protection and disaster recovery services for large SME and enterprise organisations.

California Cybersecurity Institute (CCI) - Cal poly

California Cybersecurity Institute (CCI) - Cal poly

The CCI provides a hands-on research and learning environment to explore new cyber technologies and train and test tactics alongside law enforcement and cyberforensics experts.

Defence Intelligence

Defence Intelligence

Defence Intelligence is an information security firm specializing in advanced malware protection.

Idaptive

Idaptive

Idaptive delivers Next-Gen Access through a zero trust approach. Idaptive secures access everywhere with single sign-on, adaptive MFA, EMM and analytics.

Verifi

Verifi

Verifi is an award-winning provider of end-to-end payment protection and risk management solutions.

Intraprise Health

Intraprise Health

Intraprise Health is a Certified HITRUST Assessor and award-winning provider of health information security products and services.

SEMNet

SEMNet

SEMNet is an IT solutions provider and an infrastructure and security consulting firm.

Sekuro

Sekuro

Sekuro is your leading governance and cyber security partner. Building organisational resilience. Enabling fearless innovation.

Telindus

Telindus

Telindus is the strategic IT partner for the flexible organization of the future. We build optimal IT infrastructure with four components: networking, cloud, cybersecurity and data & AI.

AArete

AArete

AArete is a global management and technology consulting firm specializing in strategic profitability improvement, digital transformation, and advisory services.

NetHope

NetHope

NetHope is a membership-based organization serving the international nonprofit humanitarian, development, and conservation sector through digital transformation.

Deloitte Denmark

Deloitte Denmark

Swift incident management, worldwide support, and advanced defense strategies ensure comprehensive recovery and enterprise security with our IR service.

runZero

runZero

runZero delivers the most complete security visibility possible, providing you the ultimate foundation for successfully managing exposures and compliance.

Applaudo

Applaudo

Applaudo specializes in helping the world’s most admired brands optimize their IT solutions, reduce delivery costs, and accelerate their digital transformation.