{"id":1986,"date":"2013-02-20T00:00:00","date_gmt":"2013-02-20T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2013\/02\/20\/rsa-estimates-2012-global-losses-from-phishing-at-1-5-bn\/"},"modified":"2021-12-30T11:40:25","modified_gmt":"2021-12-30T11:40:25","slug":"rsa-estimates-2012-global-losses-from-phishing-at-1-5-bn","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2013\/02\/20\/rsa-estimates-2012-global-losses-from-phishing-at-1-5-bn\/","title":{"rendered":"RSA estimates 2012 global losses from phishing at $1.5 bn"},"content":{"rendered":"<p>RSA, the Security Division of EMC announced the findings of its January 2013 Fraud Report, estimating the global losses from phishing at $1.5 bn in 2012. &#8230;  The total number of phishing attacks in 2012 was 445,004 while in 2011 was 258,461.  The overall trend in attack numbers showed a steady rise in volume throughout the year, reaching an all-time high in July with 59,406 attacks detected in a single month. The most prominent market trends relevant to the mobile channel have to do with the growth in mobile device usage in personal and work life and pivotal role of mobile apps.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Applications will become the center resource for smartphone users and the overall popularity of apps will become just as trendy with cybercriminals. &#8230;  RSA anticipates cybercriminals will increasingly exploit mobile apps to target mobile users with phishing and other malicious content.<\/p>\n<p>With the world turning to a smaller and more \u2018social&#8217; village than ever, cyber criminals are by no means staying behind.   RSA expects to see more phishing attacks targeted on social networking sites rather than through traditional spam mail.<\/p>\n<p>Link: http:\/\/www.dqweek.com\/dq-week\/news\/174923\/rsa-estimates-2012-global-losses-phishing-usd15-bn?WT.rss_f=Home&#038;WT.rss_a=RSA+estimates+2012+global+losses+from+phishing+at+%241.5+bn<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[32],"tags":[],"class_list":["post-1986","post","type-post","status-publish","format-standard","hentry","category-statistics"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1986","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=1986"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1986\/revisions"}],"predecessor-version":[{"id":4473,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1986\/revisions\/4473"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=1986"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=1986"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=1986"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}