{"id":1933,"date":"2008-04-16T00:00:00","date_gmt":"2008-04-16T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2008\/04\/16\/online-crimes-impact-spreads\/"},"modified":"2021-12-30T11:40:19","modified_gmt":"2021-12-30T11:40:19","slug":"online-crimes-impact-spreads","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2008\/04\/16\/online-crimes-impact-spreads\/","title":{"rendered":"Online crime&#8217;s impact spreads"},"content":{"rendered":"<p>The latest estimate: $200 billion a year, rivaling the illicit markets for drug trafficking and money laundering, according to several security experts and law-enforcement officials.  The hazards of surfing and shopping online have shaken consumer confidence in e-commerce.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Nearly 60% of Americans are fearful someone will steal their account passwords when they bank online, and 38% do not trust making payments online, according to a survey of 1,000 U.S. adults conducted by TNS Sofres on behalf of digital-security company Gemalto.<\/p>\n<p>Bank accounts were the most commonly advertised item for sale on underground computer servers, accounting for 22% of all items in the last six months of 2007, according to a Symantec report this week.<\/p>\n<p>Several analysts, including John Pescatore of Gartner, point to the escalating threat of bots, sprawling networks of compromised PCs controlled by criminal groups.  The top bot nets send a staggering 100 billion spam e-mail messages each day, SecureWorks says.<\/p>\n<p>Speaking of spam and other forms of malicious software code, hackers are using YouTube videos to advertise their goods.<\/p>\n<p>In one post, a group from Albania offers to illegally break into corporate networks to steal data and implant malware, says Don Jackson, director of threat intelligence at SecureWorks.<\/p>\n<p>http:\/\/www.usatoday.com\/tech\/news\/computersecurity\/2008-04-10-cybercrime-computer-security_N.htm<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[32],"tags":[],"class_list":["post-1933","post","type-post","status-publish","format-standard","hentry","category-statistics"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1933","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=1933"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1933\/revisions"}],"predecessor-version":[{"id":4420,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1933\/revisions\/4420"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=1933"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=1933"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=1933"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}