{"id":724,"date":"2006-01-24T00:00:00","date_gmt":"2006-01-24T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2006\/01\/24\/online-crime-matures-beyond-adolescence\/"},"modified":"2021-12-30T11:38:02","modified_gmt":"2021-12-30T11:38:02","slug":"online-crime-matures-beyond-adolescence","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2006\/01\/24\/online-crime-matures-beyond-adolescence\/","title":{"rendered":"Online crime matures beyond adolescence"},"content":{"rendered":"<p>Cybercrime is moving from broad ego-driven outbreaks to much smaller targeted attacks aimed at stealing sensitive data or extorting money from companies, IBM stated in its 2005 Global Business Security Index Report released on Monday.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>&#8220;With increased security protection on most systems and stiffer penalties, we are seeing organized, committed, and tenacious profiteers enter this space.  This means that attacks will be more targeted and potentially damaging.&#8221;<\/p>\n<p>The recent guilty plea by a 20-year-old California man for compromising hundreds of thousands of computers to create a botnet and then selling access to those computers underscores the shift in cybercrime towards more profitable activity.<\/p>\n<p>http:\/\/www.securityfocus.com\/brief\/116<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[29],"tags":[],"class_list":["post-724","post","type-post","status-publish","format-standard","hentry","category-news"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/724","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=724"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/724\/revisions"}],"predecessor-version":[{"id":3211,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/724\/revisions\/3211"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=724"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=724"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=724"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}