{"id":2024,"date":"2003-11-30T00:00:00","date_gmt":"2003-11-30T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2003\/11\/30\/hackers-haunting-europe-now\/"},"modified":"2021-12-30T11:40:30","modified_gmt":"2021-12-30T11:40:30","slug":"hackers-haunting-europe-now","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2003\/11\/30\/hackers-haunting-europe-now\/","title":{"rendered":"Hackers haunting Europe now"},"content":{"rendered":"<p>Hackers, it appears, are now forsaking North America in favour of European targets.  In November, said a report from British Internet security specialists at mi2g, Europe overtook North America as the most attacked continent in cyberspace.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Moreover, the successful hacking and distributed denial of service attacks now originate from Brazil, Russia, China and India, the mi2g Intelligence Unit reported in new research.  The combined number of attacks &#8212; 5,682 &#8212; against the European countries far exceeds the overt digital attacks recorded against the United States (3,696) and Canada (209).   Brazil, with 962 attacks, Turkey (549) and China (317) are the only non-Western countries in the top 10.<\/p>\n<p>The mi2g report found that 55 per cent of all digital attacks in November were launched against small entities with a turnover below $7-million (U.S.).  Only 1 per cent of all successful digital attacks in November were against larger entities with a turnover in excess of $40-million.<\/p>\n<p>In terms of operating systems, Linux remained the most popular among hackers, according to mi2G, reflecting how popular Linux has become as a platform for Internet-connected computers and servers.  Systems running the open-source system accounted for 61.7 per cent of all attacks.  Microsoft Windows followed with 23.7 per cent.<\/p>\n<p>But since most government computers run Microsoft systems, Windows servers in governmental operations registered a record high of 84.1 per cent of all successful digital attacks.<\/p>\n<p>The mi2g report also estimated worldwide economic damage from hacker attacks, DDoS attacks, as well as virus, worm and spam proliferation at $166.7-billion to $203.75-billion, with the greatest damage coming from malware and spam.<\/p>\n<p>More info: [url=http:\/\/www.globetechnology.com\/servlet\/story\/RTGAM.20031128.gthacknov28\/BNStory\/Technology\/]http:\/\/www.globetechnology.com\/servlet\/story\/RTGAM.20031128.gthacknov28\/BNStory\/Technology\/[\/url]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[11],"tags":[],"class_list":["post-2024","post","type-post","status-publish","format-standard","hentry","category-trends"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/2024","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=2024"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/2024\/revisions"}],"predecessor-version":[{"id":4511,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/2024\/revisions\/4511"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=2024"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=2024"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=2024"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}