Why Cybercrime Now Exceeds Conventional Crime

cyber-security-laws-5-638.jpg?cb=1426621844

 

Online crime worldwide is increasingly displacing conventional forms of property crime, such as burglary and robbery.

In London, for example, police report that organized crime syndicates have been increasingly embracing cybercrime - in particular, payment card fraud and identity scams - given the potential for a vastly greater return on their investment, as well as much lower risk, UK cybersecurity expert Alan Woodward says in an interview.

"It's no longer the spotty youth in his bedroom, committing some opportunistic crime," says Woodward, a visiting professor at the University of Surrey who is also a cybersecurity adviser to the association of European police agencies known as Europol. "Some of these are very highly orchestrated crimes. They require money and they require some quite sophisticated software to be written. And indeed, 'crime as a service' is actually growing as a genre online."

Earlier this year, London's mayor's office and Metropolitan Police released an online theft and fraud report, noting that 70 percent of all fraud now involves the Internet.

But fraud-related losses may be dramatically underreported. Woodward says that in the UK alone, the City of London Police, which takes the lead on fraud investigations, estimates that £2.2 billion ($3.4 billion) is lost to card fraud every year. But police also suspect that 85 percent of fraud is not being reported by consumers, meaning that annually, actual losses might total £12.1 billion ($18.7 billion).

The good news, however, is that police forces in many countries - not just across Europe, but also in North America - have been conducting joint operations where they have been able to track back crimes, shut down criminal organizations and, in many cases, prosecute suspects. 

However, statements by the UK government that overall crime in the UK is reducing take little account of the substantial increase in cyber crime, which often goes unreported and uninvestigated.

DataBreachToday:

 

 

« Using Threat Intelligence Against Cybercriminals
FBI Urges Firms to Plan For Cyber Attack »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

CipherMail

CipherMail

CipherMail provides email security products which allow organizations world wide to automatically protect their email against unauthorized access both in transit and at rest.

CSIRT-CY

CSIRT-CY

CSIRT-CY is the National Computer Security Incident Response Team for Cyprus.

Sectigo

Sectigo

Sectigo is a leading cybersecurity provider of digital identity solutions, including TLS / SSL certificates, DevOps, IoT, and enterprise-grade PKI management, as well as multi-layered web security.

Institute of Informatics and Telematics (IIT)

Institute of Informatics and Telematics (IIT)

IIT carries out activities of research, assessment, technology transfer and training in the field of Information and Communication Technologies and of Computational Sciences.

QuillAudits

QuillAudits

QuillAudits offers advanced Ethereum, EOS, TRON smart contract audit, blockchain protocol security and formal verification to ensure your platform’s integrity.

Appsec Phoenix

Appsec Phoenix

Appsec Phoenix is an end to end vulnerability management platform that focuses on workflows, threat feed, and real time data.

Netstar

Netstar

Netstar is an IT Support company based in Central London providing fully managed IT Support, Cyber Security and Technology Consulting services.

Security Risk Management (SRM)

Security Risk Management (SRM)

SRM provide a comprehensive security risk management service encompassing people, processes, technology, governance, compliance and risk management.

Traced

Traced

TRACED is changing the detection paradigm. Empowering defenders to go on the offense to engage cyber attackers before they compromise your organization.

Sentryc

Sentryc

Sentryc provides automated monitoring of brands on online marketplaces and social media making online brand protection processes faster, more clearly structured and more efficient.

OSP Cyber Academy

OSP Cyber Academy

OSP Cyber Academy are a managed service provider of cyber, information security and data protection training.

VENZA

VENZA

VENZA is a data protection company that can help organisations mitigate their vulnerabilities and ensure compliance, keeping guests and their data safe from breaches.

Lineaje

Lineaje

Lineaje solves critical Software Supply Chain security problems faced by every organization that builds, uses or sells software.

Databarracks

Databarracks

Databarracks deliver award winning IT resilience and continuity services. We help organisations get the most out of the cloud and protect their data, wherever it lives.

Hive

Hive

Hive is a leading provider of cloud-based AI solutions to understand, search, and generate content, and is trusted by hundreds of the world's largest and most innovative organizations.

Resmo

Resmo

Resmo is an all in one platform for SaaS app and access management for modern IT teams.