Cyber Crime Black Market Exploding Worldwide
August 13, 2012 8:08 PM
comment(s) - last by
Infographic explaining cyber crime and security
(Source: Rasmussen College)
Governments and police authorities are scrambling to try and catch up to global demand of stolen information from cyber criminals
Growing up in the United States, children are continually warned about potential “real-world” crime that plagues only a small number of the population each year. However, more people are now becoming victims of cyber crimes, and there is very little being done to help protect Internet users – and companies routinely targeted.
Increasingly, the looming threat of cyber crime is hitting us at a rapid pace –researchers estimate organized crime groups collected more than $388 billion from identity theft and other crimes in 2011. Amazingly, cyber crimes are quickly approaching the $411 billion industry involving the trafficking and selling of illegal narcotics, according to Rasmussen College researchers.
Criminals are developing their cyber crime skills that include phishing, internet scams, identity theft, and other sophisticated attempts to steal personal information.
For internet users looking to protect themselves, researchers have a few basic tips: not using a single password for all online accounts, avoid clicking unsafe links, connecting to secure Wi-Fi accounts, keep security software updated, and be careful about what you’re posting on the Internet.
That’s all fine and dandy for casual Internet users, but what if the problem is a structural issue from corporations and the government?
The U.S. government is now making its own cyber security a more pressing matter, though very few people seem to know what to do.
Senators Jay Rockefeller (D-W. Va) and Joseph Lieberman (I-Conn.), the Senate Homeland Security Committee Chairman, believe the Pres. Obama administration should utilize an executive order for cyber security. Lieberman and Rockefeller haven’t had success with efforts in Washington because certain industries aren’t happy they’d be forced to adhere to stricter digital standards.
Obama is interested in
seeking longer prison sentences
for digital criminals, and Defense Secretary Leon Panetta has
a cyber operation plan
to standardize military cyber operations.
Even with all of this talk regarding U.S. vulnerabilities, the U.S. government has found success launching coordinated attacks. In addition to temporarily
crippling Al Qaeda
, the U.S. has used Stuxnet and Flame to
target Iranian computer networks
In the long term, government legislation will not help protect the US government – and its citizens – from cyber attacks, but elected officials trying to ignore the problem won’t do any good.
This article is over a month old, voting and posting comments is disabled
8/16/2012 9:48:44 AM
it should be evident by now to most everyone that our most commonly used software is built to be exploited for market research, "data mining", and surveillance. cybercrime is just opportunistic misuse of that design.
consider alternatives. I'm now building my 2d Linux box.
think about "cloud computing". just another means of keeping track of what you're up to
tracking can range from innocuous to nuisance to malicious . theoretically tracking results in, at most, a little "targeted advertising". but this might not be all that could be the result. there are trolls out there looking to instigate various extortion schemes. and worse
it's time to put serious thought into the question: who -- besides me -- is using my computer, -- and for what ??
8/14/2012 11:18:33 AM
One of the largest problems your hear on the news as well as in my job is the exchange of information between companies. If one of the partners that you're doing business with doesn't have adequate security (usually the case if your business is small or their business is small), your consciousness doesn't translate into overall security of information.
The increase prison time is not going to make a difference because there too much money to be made. It's like treating the symptoms than to address the real issue of corporate responsibility.
It is the small things that are less invasive that will help here
8/18/2012 7:18:20 AM
There are some fairly minor things that can be done to really help cut down on international cyber security. The first would be a way to filter based on national origin(IP address blocks and web content requirements that indicate what country the content is from, if the country and IP block do not match, the filter kicks in). Yes, there CAN be forgeries for the IP, but this sort of thing would help. I don't need ANY content from China, Russia, or anywhere in Africa or South America, so why not let me filter this crap out automatically? ISPs for the most part who are concerned about security must wonder if it would make sense to auto-filter IP addresses originating from China and other places where most spam and attacks originate. China has their own firewall to filter people there from content, so why are we allowing them to even connect on ports other than 80?
8/18/2012 8:51:55 AM
we need to root out the deficiencies that enable cybercrime rather than "treating the symptoms" -- as noted by another writer on this blog.
study the methodology used by cyber-criminals:
1. impersonation: assuming a false identity. Proper deployment of public key encryption (PGP,GnuPG) on e/mails, transactions, and software transmittals is the place to start
2. injection: (un-authorized updates) -- SQL, iFrame, "Man in the Browser", root kits, ...
3. executable documents: most modern documents -- html, flash, spreadsheets, word, jpeg, pdf -- can conatin executable code -- java, vbs, byte code, C#, .net, php ...
as a result all modern documents must be handled as though they were .exe files
this means we have to take a step back and re-examine the construction of our operating software
the operating software must never run an un-known program in "real" mode -- such programs must be run in "user mode"
in "user mode" programs are not allowed to actually run: we only allow simulation: testing to see what the program wants to do
to accomplish this, in user mode a program is not allowed to execute any privileged instruction.
privileged instructions include input/output, and memory allocation or access. these operations must be requested by the application program and the operating system will check these for proper permissions ( remember authentications above ) before performing such requests for the application
now we need to examine the security features of the x86/x64 chips to see how this could be done -- and whether it is actually being sufficiently implemented
the x86/x64 chips provide 4 privilege levels -- "ring0,1,2,3 as well as both memory protection and virtual memory
are these all being used properly?
read all the hacker reports
also Root Kit arsenal
then think about switching to Linux. I'm building my 2d "nix" box now. there's a lot of good software; maybe not every favorite from the earlier system but anyone interested in security is going to want to take a look. grab an older PC and put Ubuntu in; check it out.
"I want people to see my movies in the best formats possible. For [Paramount] to deny people who have Blu-ray sucks!" -- Movie Director Michael Bay
Latest By Michael Hatamoto
Nationalist Hackers From Turkey Cause Chaos, Deface Dozens of Sites
March 16, 2015, 12:29 PM
Flood of Apple Watch Knockoffs Hitting the Black Market in China
March 13, 2015, 10:12 AM
iSpy: Leak Reveals CIA Has Been Busy Attacking Apple iPhones, iPads
March 10, 2015, 5:03 PM
Study Predicts Self-Driving Vehicles Could Rake in Billions
March 6, 2015, 8:34 AM
Australian Engineers Successfully Developed 3D-Printed Jet Engines
March 2, 2015, 11:08 AM
Smartphone STD Scanner Dongle Can Detect HIV in Just 15 Minutes
February 26, 2015, 11:04 AM
Quick Note: Apple Opens Up iOS 8.3 Beta 2 to Developers
February 25, 2015, 6:00 PM
Bill Gates Plugs GMOs to Reduce Starvation in Africa
February 24, 2015, 10:12 PM
DARPA Awards Boeing Contract to Test Jet Based Satellite Launches
February 19, 2015, 11:30 AM
BlackBerry Wages Legal War Against Ryan Seacrest's Typo 2 iPhone Keyboard
February 18, 2015, 5:24 PM
Netflix Announces 7-to-1 Stock Split, Eyes Explosive Overseas Growth
June 23, 2015, 8:18 PM
Sources: Hack on Fed. Database Lost 4.1M Social Security Numbers, Personal Info
June 11, 2015, 9:11 PM
The Big One: Chinese Hackers Steal Records of 4 Million U.S. Gov. Employees
June 4, 2015, 8:13 PM
Tutorial: Here's How to Force YouTube or Vimeo VIdeos to Embed as HTML5
June 3, 2015, 10:14 PM
Google Finally Fixes Maps Bug That Was Giving Racist, Profane Results
May 21, 2015, 1:43 PM
The Pirate Bay Loses Its Iconic Swedish Dot SE Domains
May 20, 2015, 6:31 PM
Most Popular Articles
F-16 Schools Trillion-Dollar F-35 in Mock Combat, Fleeing is Best Option Pilot Admits
July 1, 2015, 5:53 PM
SpaceX Falcon 9's Seventh Supply Mission to ISS Ends w/ Fiery Stage 1 Explosion
June 28, 2015, 1:10 PM
SanDisk's 200GB microSDXC Card Turns Smartphones Into Enviable PMPs
June 26, 2015, 2:02 PM
Windows XP, Vista Users Can Get Free Windows 10 Upgrade Thanks to Loophole
June 23, 2015, 2:23 PM
Apple Music: The Money, The Launch Hiccups, and the Nitty Gritty Details
June 30, 2015, 5:09 PM
Latest Blog Posts
Sceptre Airs 27", 120 Hz. 1080p Monitor/HDTV w/ 5 ms Response Time for $220
Dec 3, 2014, 10:32 PM
Costco Gives Employees Thanksgiving Off; Wal-Mart Leads "Black Thursday" Charge
Oct 29, 2014, 9:57 PM
"Bear Selfies" Fad Could Turn Deadly, Warn Nevada Wildlife Officials
Oct 28, 2014, 12:00 PM
The Surface Mini That Was Never Released Gets "Hands On" Treatment
Sep 26, 2014, 8:22 AM
ISIS Imposes Ban on Teaching Evolution in Iraq
Sep 17, 2014, 5:22 PM
More Blog Posts
Copyright 2015 DailyTech LLC. -
Terms, Conditions & Privacy Information