Cyber Crime Black Market Exploding Worldwide
August 13, 2012 8:08 PM
comment(s) - last by
Infographic explaining cyber crime and security
(Source: Rasmussen College)
Governments and police authorities are scrambling to try and catch up to global demand of stolen information from cyber criminals
Growing up in the United States, children are continually warned about potential “real-world” crime that plagues only a small number of the population each year. However, more people are now becoming victims of cyber crimes, and there is very little being done to help protect Internet users – and companies routinely targeted.
Increasingly, the looming threat of cyber crime is hitting us at a rapid pace –researchers estimate organized crime groups collected more than $388 billion from identity theft and other crimes in 2011. Amazingly, cyber crimes are quickly approaching the $411 billion industry involving the trafficking and selling of illegal narcotics, according to Rasmussen College researchers.
Criminals are developing their cyber crime skills that include phishing, internet scams, identity theft, and other sophisticated attempts to steal personal information.
For internet users looking to protect themselves, researchers have a few basic tips: not using a single password for all online accounts, avoid clicking unsafe links, connecting to secure Wi-Fi accounts, keep security software updated, and be careful about what you’re posting on the Internet.
That’s all fine and dandy for casual Internet users, but what if the problem is a structural issue from corporations and the government?
The U.S. government is now making its own cyber security a more pressing matter, though very few people seem to know what to do.
Senators Jay Rockefeller (D-W. Va) and Joseph Lieberman (I-Conn.), the Senate Homeland Security Committee Chairman, believe the Pres. Obama administration should utilize an executive order for cyber security. Lieberman and Rockefeller haven’t had success with efforts in Washington because certain industries aren’t happy they’d be forced to adhere to stricter digital standards.
Obama is interested in
seeking longer prison sentences
for digital criminals, and Defense Secretary Leon Panetta has
a cyber operation plan
to standardize military cyber operations.
Even with all of this talk regarding U.S. vulnerabilities, the U.S. government has found success launching coordinated attacks. In addition to temporarily
crippling Al Qaeda
, the U.S. has used Stuxnet and Flame to
target Iranian computer networks
In the long term, government legislation will not help protect the US government – and its citizens – from cyber attacks, but elected officials trying to ignore the problem won’t do any good.
This article is over a month old, voting and posting comments is disabled
8/16/2012 9:48:44 AM
it should be evident by now to most everyone that our most commonly used software is built to be exploited for market research, "data mining", and surveillance. cybercrime is just opportunistic misuse of that design.
consider alternatives. I'm now building my 2d Linux box.
think about "cloud computing". just another means of keeping track of what you're up to
tracking can range from innocuous to nuisance to malicious . theoretically tracking results in, at most, a little "targeted advertising". but this might not be all that could be the result. there are trolls out there looking to instigate various extortion schemes. and worse
it's time to put serious thought into the question: who -- besides me -- is using my computer, -- and for what ??
"It seems as though my state-funded math degree has failed me. Let the lashings commence." -- DailyTech Editor-in-Chief Kristopher Kubicki
Latest By Michael Hatamoto
Report: Increase in Pope Spam Hits Internet Users
March 19, 2013, 3:38 PM
Microsoft Takes a Closer Look at Cyber Security and Malware
February 11, 2013, 1:02 PM
Tech Sector Recovering, IT Needs Expanding
February 7, 2013, 8:48 AM
'BYOD' Issues Creating Headaches in the Enterprise
January 23, 2013, 8:12 AM
City of Fremont is Silicon Valley's Hidden Gem
December 2, 2012, 8:38 PM
Mobile Apps Used as In-Car Convenience, Necessity
August 30, 2012, 2:19 AM
The Evolution of Connected TVs Leading to Second Screen Applications
August 15, 2012, 9:31 AM
Cyber Crime Black Market Exploding Worldwide
August 13, 2012, 8:08 PM
ITC Judge Recommends U.S. Xbox 360 Ban
May 25, 2012, 11:06 AM
Dish Network In Trouble Over Ad-Skipping DVR
May 25, 2012, 4:06 AM
Quick Note: Verizon May Become Canada's Fourth Major Carrier
June 18, 2013, 2:15 PM
BMI Files Lawsuit Against Pandora Over Royalty Fees, Radio Station "Stunt"
June 14, 2013, 1:28 PM
Ukranian-Led Cybertheft Ring Busted, Six East Coast Residents Arrested
June 13, 2013, 10:38 AM
Rep. Peter King (R) on NSA Leaks: Prosecute the Journalists
June 12, 2013, 4:00 PM
Comcast to Turn Customers Modems Into Quasi-Public Wi-Fi, Raises Legal Risks
June 10, 2013, 8:02 PM
Report: Google to Drop $1.3B for Waze Navigation Software
June 10, 2013, 7:43 AM
Most Popular Articles
Source: Don't Worry, NSA Spies on "99 Percent" of Americans' Locations, Call Records
June 14, 2013, 3:57 PM
Xbox Chief: If You Can't Get Online, Don't Buy an Xbox One
June 12, 2013, 9:57 AM
GigaHertz Wars 2.0? AMD Releases World's First 5.0 GHz FX Processor
June 11, 2013, 3:16 PM
Former Palm CEO: Selling Palm to HP was a Waste
June 12, 2013, 10:19 AM
Report: Apple to Release Larger iPhone Screens, Cheaper iPhone for $99
June 13, 2013, 9:41 AM
Latest Blog Posts
Lumosity: Does it Work?
May 22, 2013, 8:20 PM
Quick Note: Sony "Teases" PS4 Ahead of Xbox Reveal in New Video
May 20, 2013, 12:33 PM
Nokia Introduces Instagram-Like App of Its Own to Help Lumia Sales
May 20, 2013, 7:10 AM
Parents of Pre-Teen Drivers Commonly Practice Distracted Driving Says Study
May 9, 2013, 7:16 AM
Apple's iOS 7 Running Into Internal Delays Due to Massive Overhaul
May 1, 2013, 4:26 PM
More Blog Posts
Copyright 2013 DailyTech LLC. -
Terms, Conditions & Privacy Information