{"id":1960,"date":"2009-02-27T00:00:00","date_gmt":"2009-02-27T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2009\/02\/27\/japan-cybercrime-grows-by-15-5-percent\/"},"modified":"2021-12-30T11:40:22","modified_gmt":"2021-12-30T11:40:22","slug":"japan-cybercrime-grows-by-15-5-percent","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2009\/02\/27\/japan-cybercrime-grows-by-15-5-percent\/","title":{"rendered":"Japan Cybercrime Grows by 15.5 Percent"},"content":{"rendered":"<p>Internet security software provider Finjan (www.finjan.com) announced on Friday that it has just published the 2008 cybercrime figures from Japan which reveals a 15.5 percent year-on-year annual growth.&#8221;  Anecdotal evidence suggests that the volume and value of cybercrime has soared again in 2008 and, with the current economic recession, we fully expect the number of Internet scams, hacks and malware-driven infections to increase even faster in 2009,&#8221; says Ben-Itzhak, Finjan Chief Technology Officer.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>And while cases of threats and illegal access increased by 90 percent and 20 percent, respectively, between 2007 and 2008, Ben-Itzhak says that fraud decreased by 0.3 percent.<\/p>\n<p>The most recent FBI Internet Crime Complaint Center statistics bares the closest equivalent to the Japanese figures.<\/p>\n<p>http:\/\/www.thewhir.com\/web-hosting-news\/022709_Japan_Cybercrime_Grows_by_15.5_Percent<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[32],"tags":[],"class_list":["post-1960","post","type-post","status-publish","format-standard","hentry","category-statistics"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1960","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=1960"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1960\/revisions"}],"predecessor-version":[{"id":4447,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1960\/revisions\/4447"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=1960"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=1960"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=1960"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}