SlideShare ist ein Scribd-Unternehmen logo
1 von 28
Downloaden Sie, um offline zu lesen
2013 NORTON REPORT
2013 NORTON REPORT
24 COUNTRIES
AUSTRALIA, BRAZIL, CANADA, CHINA, COLOMBIA, DENMARK, 

FRANCE, GERMANY, INDIA, ITALY, JAPAN, MEXICO, NETHERLANDS, 

NEW ZEALAND, POLAND, RUSSIA, SAUDI ARABIA, SINGAPORE, 

SOUTH AFRICA, SWEDEN, TURKEY, UNITED ARAB EMIRATES, 

UNITED KINGDOM, UNITED STATES OF AMERICA

!
13,022 ONLINE ADULTS AGED 18-64
WHO IS AFFECTED MOST BY CYBERCRIME?
!
!
CYBERCRIME VICTIMS MORE
LIKELY TO BE:

HIGHEST NUMBER OF CYBERCRIME
VICTIMS FOUND IN:
RUSSIA

MALE – 64%



85%

MILLENNIAL – 66%

CHINA

(COMPARED TO 58% OF FEMALES)

(COMPARED TO 54% OF BABY BOOMERS)

!

AND:
• MOBILE DEVICE OWNERS – 63%
• SOCIAL NETWORK USERS – 63%
• PUBLIC / UNSECURED WI-FI USERS –
68%
• EMERGING MARKET – 68%
• PARENT OF CHILDREN 8-17 – 65%

77%

USA 63%; CANADA 68%; UK 58%; FRANCE 45%; GERMANY 53%; ITALY 56%; SWEDEN 56%; POLAND 60%; NETHERLANDS 50%; AUSTRALIA 60%; INDIA 65%;
JAPAN 19%; SINGAPORE 61%; NEW ZEALAND 69%; TURKEY 63%; DENMARK 50%; SAUDI ARABIA 62%; UAE 71%, COLOMBIA 64%

SOUTH AFRICA

73%

ALL STATS REFER TO LIFETIME VICTIMS
KEY THEMES
!
TABLET AND SMARTPHONE CONSUMERS LEAVE SECURITY
BEHIND
ALMOST 1/2 DON’T USE BASIC PRECAUTIONS SUCH AS PASSWORDS, SECURITY
SOFTWARE OR BACK UP FILES FOR THEIR MOBILE DEVICE
MORE THAN ONE-THIRD HAVE EXPERIENCED MOBILE CYBERCRIME LAST YEAR

!
THE GLOBAL PRICE TAG OF CONSUMER CYBERCRIME

US$113 BILLION ANNUALLY, COST PER CYBERCRIME VICTIM UP 50 PERCENT

!
THE SCALE OF CONSUMER CYBERCRIME
1 MILLION+ VICTIMS DAILY

!
CREATING PERFECT STORM AS LINES BLUR BETWEEN WORK/
PLAY
49% USE THEIR PERSONAL DEVICE FOR WORK AND PLAY
AROUND ONE-IN-FIVE SHARE WORK RELATED INFORMATION WITH FRIENDS AND
FAMILY
SMARTPHONE/TABLET CONSUMERS LEAVING SECURITY
BEHIND

1/2
1/2

NEARLY
SMARTPHONE/TABLET USERS SLEEP WITH
THEIR PHONES WITHIN ARMS’ REACH
NEARLY

DON’T USE BASIC PRECAUTIONS SUCH AS

PASSWORDS, SECURITY SOFTWARE OR BACK UP FILES FOR
THEIR
MOBILE DEVICE *
ONLY

26%

OF SMARTPHONE USERS HAVE

MOBILE SECURITY SOFTWARE WITH ADVANCED
PROTECTION

57%

AREN’T AWARE 

THAT SECURITY SOLUTIONS FOR MOBILE DEVICES EXIST *
*AMONG MOBILE DEVICE USERS
CONSUMERS’ SECURITY IQ –
DELETE SUSPICIOUS
EMAILS FROM PEOPLE
THEY DON’T KNOW

HIGH ON PC, LOW ON MOBILE

HAVE AT LEAST A BASIC
FREE ANTIVIRUS SOLUTION

AVOID STORING
SENSITIVE FILES ONLINE

90%


72%

78%


VS.

VS.

VS.

60%


42%

53%

VS.

VS.

VS.

56%

33%

48%

GOOD JOB!

NEEDS
WORK!

NEEDS
WORK!
MOBILE CYBERCRIME AND LOSS

38%

HAVE EXPERIENCED MOBILE

CYBERCRIME IN PAST 12 MONTHS *

27%

OF ADULTS 


HAVE LOST THEIR MOBILE DEVICE OR HAD IT
STOLEN

*AMONG SMARTPHONE USERS
THE GLOBAL PRICE TAG OF CONSUMER
CYBERCRIME

$113

BN

ENOUGH TO HOST THE 2012
LONDON OLYMPICS NEARLY 10 TIMES
OVER
Other
0,17
Fraud
0,38

Repairs
0,24

!

83% OF DIRECT FINANCIAL
COSTS ARE A RESULT OF
FRAUD, REPAIRS, THEFT AND
LOSS

USD $298
!

Theft or loss
0,21

AVERAGE COST PER VICTIM
REPRESENTS A 50 PERCENT INCREASE OVER 2012

ALL AMOUNTS IN USD
SEE EXTRAPOLATION CALCULATIONS *
THE GLOBAL PRICE TAG OF CONSUMER
CYBERCRIME

1 BN

RUSSIA

13BN

38 BN
3 BN

37BN

EUROPE

USA

CHINA

4BN

MEXICO

INDIA

8 BN

BRAZIL

1 BN
JAPAN

1 BN

AUSTRALIA

SOUTH AFRICA

0.3BN

ALL AMOUNTS IN USD ROUNDED TO THE NEAREST BILLION
CANADA 3 BN; SINGAPORE 1 BN; NEW ZEALAND 0.1 BN; TURKEY 2 BN; SAUDI ARABIA 0.5 BN; UAE 0.3 BN; COLOMBIA 0.5 BN
THE SCALE OF CONSUMER CYBERCRIME

378 MILLION

Ổ
᝘
VICTIMS PER YEAR
bhĂŤ

NEARLY 2.8 TIMES AS MANY BABIES BORN EACH YEAR

1 MILLION +

VICTIMS PER DAY

ENOUGH TO FILL WEMBLEY STADIUM (ENGLAND) MORE THAN 10 TIMES

12 VICTIMS PER
SECOND

SEE EXTRAPOLATION CALCULATIONS *
THE SCALE OF CONSUMER CYBERCRIME

50% OF ONLINE
ADULTS

HAVE BEEN VICTIMS OF CYBERCRIME AND / OR
NEGATIVE ONLINE SITUATIONS IN THE PAST YEAR

(e.g., RECEIVED NUDE IMAGES FROM STRANGERS OR
WERE BULLIED OR STALKED ONLINE)

41% OF ONLINE ADULTS
HAVE FALLEN VICTIM TO ATTACKS SUCH AS MALWARE,
VIRUSES, HACKING, SCAMS, FRAUD AND THEFT
BLURRING BETWEEN WORK AND PLAY

49%
36%
30%

USE THEIR PERSONAL DEVICE FOR WORK AND
PLAY*

SAY THEIR COMPANY HAS NO POLICY ON USE
OF PERSONAL DEVICES FOR WORK*

OF PARENTS LET THEIR KIDS PLAY, DOWNLOAD AND
SHOP ON THEIR WORK DEVICE **

49%

34%

27%

OF RESPONDENTS ACCESS ACCESS THEIR SOCIAL STORE PERSONAL
OR SEND PERSONAL EMAILS NETWORK THROUGH INFORMATION ON THEIR
THROUGH THEIR WORK
THEIR WORK DEVICE* WORK DEVICE*
DEVICE*
*AMONG WORKING ADULTS
**AMONG PARENTS WHO USE DEVICES PROVIDED BY THEIR
ONLINE FILE STORAGE OPENS DOOR TO OVERSHARING

24%

OF USERS SAVE BOTH WORK AND PERSONAL
DOCUMENTS TO THE SAME ONLINE FILE STORAGE ACCOUNT
ON SHARING WORK-RELATED INFORMATION THROUGH ONLINE
FILE STORAGE SITES:

18%
FRIENDS

SHARE WITH

21%

SHARE WITH FAMILY

PUTTING BOTH WORK AND
PERSONAL DOCUMENTS AT
RISK
RISKY BEHAVIOR ON SOCIAL MEDIA

LOG OUT

39% 


OF SOCIAL MEDIA
USERS DON’T LOG OUT
AFTER EACH SESSION

****
1/4 


OF SOCIAL MEDIA USERS
SHARE THEIR SOCIAL
MEDIA PASSWORDS WITH
OTHERS

?
?

?

31% 


OF SOCIAL MEDIA USERS
CONNECT WITH PEOPLE
THEY DO NOT KNOW

12% OF SOCIAL MEDIA USERS SAY SOMEONE HAS HACKED
INTO THEIR SOCIAL NETWORK ACCOUNT AND PRETENDED TO BE
THEM
MOBILE AND SOCIAL STRESSORS

49%
OF MOBILE DEVICE USERS WOULD
FEEL UPSET/CONCERNED IF THEY
LEFT HOME WITHOUT THEIR
MOBILE DEVICE

6/10 


OF MOBILE DEVICE USERS
GET ANNOYED BY OTHERS
CHECKING THEIR MOBILES
DURING A MEAL

1/4 

OF MOBILE DEVICE
USERS CHECK THEIR
MOBILES WHILE SHARING
A MEAL WITH OTHERS

25% 

OF SOCIAL NETWORK USERS
CHECK THEIR SOCIAL NETWORK
WITHIN 15 MINUTES OF WAKING
UP
CONSUMERS PICK CONVENIENCE OVER SAFETY

1/3
ADMIT THE CONVENIENCE OF
CONSTANTLY CONNECTED
OUTWEIGHED ANY
POTENTIAL SECURITY RISKS

62%

AGREE THERE IS NO SUCH
THING AS ‘ONLINE PRIVACY’
IN TODAY’S WORLD

EVEN THOUGH…

46%
WISH THEY COULD
PERMANENTLY DELETE SOME
OF THEIR PERSONAL ONLINE
CONTENT COMPLETELY

7/10 


DON’T PUT ANYTHING ON
SOCIAL NETWORKS THAT
THEY WOULDN’T WANT
THEIR PARENTS / KIDS TO SEE
CONCLUSION

50%

OF ONLINE ADULTS HAVE
BEEN VICTIMS OF CYBERCRIME
AND / OR NEGATIVE ONLINE
SITUATIONS IN THE PAST YEAR
1M+ ADULTS BECOME CYBERCRIME VICTIMS EVERY DAY THAT’S 12 VICTIMS PER SECOND

$113

BILLION

TOTAL DIRECT GLOBAL
COSTS IN JUST 12 MONTHS

CONSUMERS MOVE TO MOBILE
DEVICES BUT LEAVE PROTECTION
BEHIND
CONSUMERS ARE INCREASINGLY USING MOBILE DEVICES AND
TABLET DEVICES BUT ARE NOT PROTECTING THEMSELVES.
WHILE DESKTOP PROTECTION IS HIGH AMONG CONSUMERS,
THE CYBERCRIMINAL IS MOVING TO MOBILE AND TABLET
DEVICES WHERE CONSUMERS ARE VULNERABLE.
MOBILE DEVICE ADOPTION CONTINUES TO GROW,
SUGGESTING A DEGREE OF MOBILE DEPENDENCE, WHICH
WILL INCREASE OPPORTUNITIES FOR CYBERCRIMINALS TO
STRIKE.

!

BLURRING BETWEEN WORK AND
PERSONAL MOBILE DEVICE USAGE
AS PERSONAL MOBILE DEVICES ARE BEING USED MORE AND
MORE FOR WORK-RELATED ACTIVITIES, CONSUMERS’
LIFESTYLES ARE PUTTING BUSINESS ENVIRONMENTS AT
RISK. AN ALARMING NUMBER OF BUSINESSES HAVE NO
POLICIES IN PLACE. FOR THOSE WHO DO, OUR RESEARCH
SUGGESTS THE POLICIES ARE OFTEN NOT RESPECTED BY
THEIR EMPLOYEES.

!

CONSUMERS PICK CONVENIENCE OVER
SAFETY

MANY CONSUMERS ARE MAKING A CONSCIOUS DECISION TO
TRADE THEIR SAFETY FOR CONVENIENCE; MANY MORE ARE
UNAWARE THAT THEY’RE MAKING THE SAME TRADE. BUT, IN USD
ALL AMOUNTS
“CONSTANTLY CONNECTED” DOESN’T HAVE TO EQUAL
TOP TIPS
DEFEND YOUR DATA
A COMPREHENSIVE SECURITY SUITE PROVIDES A STRONG DEFENSE AGAINST ONLINE
THREATS. NORTON 360 MULTI-DEVICE OFFERS PROTECTION FOR PCS, SMARTPHONES AND
TABLETS, IN A SINGLE SOLUTION

THINK OF MOBILE DEVICES AS MINI-COMPUTERS
MOBILE IS THE FASTEST-GROWING TARGET FOR CYBERCRIMINALS. MAKE SURE YOUR MOBILE
DEVICE REQUIRES A PASSWORD, AND TAKE PRECAUTIONS TO ENSURE YOUR DEVICE IS
PROTECTED AGAINST THEFT, LOSS AND CYBERCRIME

BE CAUTIOUS IN THE CLOUD
WHILE CLOUD STORAGE SOLUTIONS MAKE IT EASY TO SAVE AND SHARE FILES, THEY ALSO
OPEN OTHER AVENUES FOR ATTACK. BE CAREFUL ABOUT WHO HAS ACCESS TO YOUR FILES,
AND USE A SOLUTION WITH BUILT-IN SECURITY IF POSSIBLE

SAVE SENSITIVE TRANSACTIONS FOR SECURE CONNECTIONS
FREE OR UNSECURED WI-FI NETWORKS CAN MAKE IT EASY FOR THIEVES TO EAVESDROP ON
YOUR ACTIVITY. AVOID DOING ANY SENSITIVE TRANSACTIONS LIKE BANKING OR SHOPPING
WHILE CONNECTED TO THESE NETWORKS, OR USE A PERSONAL VPN CLIENT

AFTER YOU CONNECT, DOUBLE CHECK
CHECK CREDIT CARD AND BANK STATEMENTS REGULARLY FOR FRAUDULENT TRANSACTIONS,
AND REPORT ANY SUSPICIOUS ACTIVITY TO YOUR PROVIDER AND/OR LAW ENFORCEMENT

 
!
!

go.symantec.com/nortonreport-2013
THANK YOU
ADDITIONAL FINDINGS
POTENTIALLY RISKY BEHAVIOR ON UNSECURED WI-FI

56% ACCESS
THEIR SOCIAL
NETWORK
ACCOUNT

29%

ACCESS
THEIR BANK
ACCOUNT

3/10

NEEDS
WORK!

DO NOT
ALWAYS LOG OFF
AFTER HAVING USED A
PUBLIC WI-FI
CONNECTION

54% ACCESS
PERSONAL E-MAIL

29%

SHOP

ONLINE

39%

DO NOT TAKE
ANY SPECIAL STEPS TO
PROTECT THEMSELVES
WHEN USING PUBLIC WI-FI
*AMONG FREE/UNSECURED WI-FI USERS
BLURRING LINES BETWEEN FRIENDS AND ENEMIES

1/10
41%

HAVE ACCESSED THEIR PARTNER/FRIEND’S ACCOUNTS
WITHOUT PERMISSION

DID IT BECAUSE THEY
WERE CURIOUS*

26%

WERE GOOFING AROUND
/ PLAYING A JOKE*

18%

DIDN’T TRUST THEIR
PARTNER / FRIEND TO BE
HONEST ON THEIR OWN*

*AMONG THOSE WHO HAVE ACCESSED PARTNER/FRIEND'S EMAIL/ SOCIAL MEDIA
METHODOLOGY
THE METHODOLOGY DETAIL
EDELMAN BERLAND CONDUCTED AN
ONLINE SURVEY AMONG CONSUMERS:

!
13,022 ADULTS AGED 18-64 YEARS
!
!

The survey was conducted in 24 countries (Australia,
Brazil, Canada, China, Colombia, France, Denmark,
Germany, India, Italy, Japan, Mexico, Netherlands, New
Zealand, Poland, Russia, Saudi Arabia, Singapore, South
Africa, Sweden, Turkey, United Arab Emirates, United
Kingdom and United States).

!

The survey was conducted in the primary language of
each country, and questions asked were identical across
all countries.

!

Interviews were conducted between 4th July 2013
– 1st August 2013.

!

The margin of error for the total sample of adults
(n=13,022) is + 0.9% at the 95% level of confidence.

!
!
!

Important notes:

!

The Norton Cybercrime Report is an annual report
commissioned by Norton by Symantec aimed at
understanding how cybercrime affects consumers and
how the adoption and evolution of new technologies
impacts consumers’ security. The research was
conducted by Edelman Berland, an international
research agency. Findings are based on self-reported
experiences of over 13,000 adults across 24 countries.

!

1000 adult respondents were interviewed in each of USA
and India. The global data has been weighted to ensure
all countries have equal representation of n=500 adults.

!
Additional notes:
!

Developed Markets: USA, Canada, UK, France, Germany,
Italy, Sweden, Netherlands, Australia, Japan, Singapore,
New Zealand, Denmark
Emerging Markets: Brazil, Mexico, Poland, India, China,
Russia, Turkey, Saudi Arabia, UAE, Colombia, South Africa

!

Millennials: aged 18-34
Boomers: aged 45-64
DEFINITION OF CYBERCRIME

Cybercrime is defined as any of the following activities:
!
• Computer viruses or malicious software appeared on my computer
• I responded to a forged, ‘spoofed’ or fake email or website which captured my personal details such as passwords, credit
card numbers, or bank account information thinking it was a legitimate request in order to access information or provide
information to a legitimate organization, such as my bank, etc.
• Someone has hacked into my email account and pretended to be me
• Someone has hacked into my social networking profile and pretended to be me
• I responded to an online scam
• I experienced online credit card fraud
• I experienced identity theft
•  My phone was infected and a text message was sent from my mobile phone without my permission or knowledge that I
later had to pay for
• My screen was locked and an alert was shown, which told me to pay a fine to get it unlocked
• My smartphone was lost or stolen and someone found it and used it without my permission
• An app appeared on my smartphone that I didn’t download
• I’ve had someone purporting to be from a computer company call me to inform that I have an infected computer
• I experienced another type of cybercrime on my cell / mobile phone / tablet device
• I experienced another type of cybercrime on my desktop or laptop computer
DEFINITION OF CYBERCRIME

Cybercrime and /or negative online experience is defined
as any of the following activities:
!
• Computer viruses or malicious software appeared on my computer
• I responded to a forged, ‘spoofed’ or fake email or website which captured my personal details such as passwords, credit
card numbers, or bank account information thinking it was a legitimate request in order to access information or provide
information to a legitimate organization, such as my bank, etc.
• Someone has hacked into my email account and pretended to be me
• Someone has hacked into my social networking profile and pretended to be me
• I responded to an online scam
• I experienced online credit card fraud
• I experienced identity theft
•  My phone was infected and a text message was sent from my mobile phone without my permission or knowledge that I
later had to pay for
• My screen was locked and an alert was shown, which told me to pay a fine to get it unlocked
• My smartphone was lost or stolen and someone found it and used it without my permission
• An app appeared on my smartphone that I didn’t download
• I’ve had someone purporting to be from a computer company call me to inform that I have an infected computer
• I experienced another type of cybercrime on my cell / mobile phone / tablet device
• I experienced another type of cybercrime on my desktop or laptop computer
• I experienced someone posting private/intimate photos or videos of me without my permission
• I was approached online by someone in an unwanted sexual way
• I have experienced online bullying, online stalking, online hate crime or other forms of online harassment
• I have received SMS text messages from people I do not know, requesting me to click on an embedded link or stating that
I have received a voicemail and need to dial a number which is not my voicemail to retrieve it
• I have received unwanted nude images of someone I don’t know
• I have received unwanted nude images of someone I do know
EXTRAPOLATIONS CALCULATIONS
1) Nearly 380 million victims in 24 countries
over past 12 months
Online adults per country x % cybercrime
victims past 12 months per country =
377,943,431 (sum of 24 countries).

!

2) 12 cybercrime victims every second / 719
cybercrime victims every minute / 43,144 per
hour / more than 1 million per day impacting
almost 378 million adults in the past year in
24 countries*
Victims over past 12 months (as above)
377,943,431 / 365 days per year / 24 hours / 60
minutes / 60 seconds

!

3) Cybercrime is big business costing $113
billion in the last year in 24 countries
Victims over past 12 months (per country) x
average financial cost of cybercrime (per
country in US currency). Figure shown in the
sum of all countries total cost.

Weitere ähnliche Inhalte

Was ist angesagt?

Indonesia market overview 2015
Indonesia market overview 2015Indonesia market overview 2015
Indonesia market overview 2015Ho Ngoc Hieu
 
We Are Social’s Guide to Social, Digital and Mobile in Vietnam (2nd Edition, ...
We Are Social’s Guide to Social, Digital and Mobile in Vietnam (2nd Edition, ...We Are Social’s Guide to Social, Digital and Mobile in Vietnam (2nd Edition, ...
We Are Social’s Guide to Social, Digital and Mobile in Vietnam (2nd Edition, ...We Are Social Singapore
 
Better Security Through Big Data Analytics
Better Security Through Big Data AnalyticsBetter Security Through Big Data Analytics
Better Security Through Big Data AnalyticsSymantec
 
Digital trends 2017
Digital trends 2017Digital trends 2017
Digital trends 2017Alisha Gupta
 
Avast Q1 Security Report 2015
Avast Q1 Security Report 2015Avast Q1 Security Report 2015
Avast Q1 Security Report 2015Avast
 
Mobile Users in Indonesia
Mobile Users in IndonesiaMobile Users in Indonesia
Mobile Users in Indonesiarekomendasiana.com
 
Internet Safety: Social, Mobile, Messy
Internet Safety: Social, Mobile, MessyInternet Safety: Social, Mobile, Messy
Internet Safety: Social, Mobile, MessyMarian Merritt
 
Indonesia - the social media capital of the world
Indonesia - the social media capital of the worldIndonesia - the social media capital of the world
Indonesia - the social media capital of the worldOn Device Research
 
Peter Farago
Peter FaragoPeter Farago
Peter FaragoMediabistro
 
Games on Smartphones & Tablets: Demand, Revenue, Cost, Business Model, Usage,...
Games on Smartphones & Tablets: Demand, Revenue, Cost, Business Model, Usage,...Games on Smartphones & Tablets: Demand, Revenue, Cost, Business Model, Usage,...
Games on Smartphones & Tablets: Demand, Revenue, Cost, Business Model, Usage,...Flurry, Inc.
 
Mobile usage trends 2015
Mobile usage trends 2015Mobile usage trends 2015
Mobile usage trends 2015Alina Slichuk
 

Was ist angesagt? (11)

Indonesia market overview 2015
Indonesia market overview 2015Indonesia market overview 2015
Indonesia market overview 2015
 
We Are Social’s Guide to Social, Digital and Mobile in Vietnam (2nd Edition, ...
We Are Social’s Guide to Social, Digital and Mobile in Vietnam (2nd Edition, ...We Are Social’s Guide to Social, Digital and Mobile in Vietnam (2nd Edition, ...
We Are Social’s Guide to Social, Digital and Mobile in Vietnam (2nd Edition, ...
 
Better Security Through Big Data Analytics
Better Security Through Big Data AnalyticsBetter Security Through Big Data Analytics
Better Security Through Big Data Analytics
 
Digital trends 2017
Digital trends 2017Digital trends 2017
Digital trends 2017
 
Avast Q1 Security Report 2015
Avast Q1 Security Report 2015Avast Q1 Security Report 2015
Avast Q1 Security Report 2015
 
Mobile Users in Indonesia
Mobile Users in IndonesiaMobile Users in Indonesia
Mobile Users in Indonesia
 
Internet Safety: Social, Mobile, Messy
Internet Safety: Social, Mobile, MessyInternet Safety: Social, Mobile, Messy
Internet Safety: Social, Mobile, Messy
 
Indonesia - the social media capital of the world
Indonesia - the social media capital of the worldIndonesia - the social media capital of the world
Indonesia - the social media capital of the world
 
Peter Farago
Peter FaragoPeter Farago
Peter Farago
 
Games on Smartphones & Tablets: Demand, Revenue, Cost, Business Model, Usage,...
Games on Smartphones & Tablets: Demand, Revenue, Cost, Business Model, Usage,...Games on Smartphones & Tablets: Demand, Revenue, Cost, Business Model, Usage,...
Games on Smartphones & Tablets: Demand, Revenue, Cost, Business Model, Usage,...
 
Mobile usage trends 2015
Mobile usage trends 2015Mobile usage trends 2015
Mobile usage trends 2015
 

Ähnlich wie Estudio cibercimen-2013-ciberinvestigacion

2012 norton cybercrime_report_master_final_050912
2012 norton cybercrime_report_master_final_0509122012 norton cybercrime_report_master_final_050912
2012 norton cybercrime_report_master_final_050912TimelineCR
 
Awareness about cybercrime among youth
Awareness about cybercrime among youthAwareness about cybercrime among youth
Awareness about cybercrime among youthnirmal00776
 
Norton Cyber Security Insights Report 2017
Norton Cyber Security Insights Report 2017Norton Cyber Security Insights Report 2017
Norton Cyber Security Insights Report 2017CheapSSLsecurity
 
Why Your Mobile Device Isn’t As Secure As You Think
Why Your Mobile Device Isn’t As Secure As You ThinkWhy Your Mobile Device Isn’t As Secure As You Think
Why Your Mobile Device Isn’t As Secure As You ThinkBlue Coat
 
Ericsson ConsumerLab: Privacy, security and safety online
Ericsson ConsumerLab: Privacy, security and safety onlineEricsson ConsumerLab: Privacy, security and safety online
Ericsson ConsumerLab: Privacy, security and safety onlineEricsson
 
Consumer Mobile Policy & Security - Lightspeed & Kantar
Consumer Mobile Policy & Security - Lightspeed & KantarConsumer Mobile Policy & Security - Lightspeed & Kantar
Consumer Mobile Policy & Security - Lightspeed & KantarMerlien Institute
 
Security Risks of Uneducated Employees
Security Risks of Uneducated EmployeesSecurity Risks of Uneducated Employees
Security Risks of Uneducated EmployeesOriginIT
 
Mobile infographic 2015_english
Mobile infographic 2015_englishMobile infographic 2015_english
Mobile infographic 2015_englisheasysolmaria
 
How consumers use technology and its impact on their lives.
How consumers use technology and its impact on their lives.How consumers use technology and its impact on their lives.
How consumers use technology and its impact on their lives.robertpresz7
 
Liberation from Location: El Salvador
Liberation from Location: El SalvadorLiberation from Location: El Salvador
Liberation from Location: El SalvadorEricsson Latin America
 
La TecnologĂ­a Digital en MĂŠxico en 2018
La TecnologĂ­a Digital en MĂŠxico en 2018La TecnologĂ­a Digital en MĂŠxico en 2018
La TecnologĂ­a Digital en MĂŠxico en 2018We Are Social
 
Bilal Al Mourad - Ipsos - ICT Kuwait 2015 - MASHUP MENA Conference
Bilal Al Mourad  - Ipsos -  ICT Kuwait 2015 - MASHUP MENA Conference Bilal Al Mourad  - Ipsos -  ICT Kuwait 2015 - MASHUP MENA Conference
Bilal Al Mourad - Ipsos - ICT Kuwait 2015 - MASHUP MENA Conference Center of Digital Excellence, CODE Inc
 
Tips and Tricks on Securing your Android Devices
Tips and Tricks on Securing your Android DevicesTips and Tricks on Securing your Android Devices
Tips and Tricks on Securing your Android DevicesQuick Heal Technologies Ltd.
 
Internet of Things: From Everyday Devices to Conduits of Commerce
Internet of Things: From Everyday Devices to Conduits of CommerceInternet of Things: From Everyday Devices to Conduits of Commerce
Internet of Things: From Everyday Devices to Conduits of CommerceEuromonitor International
 
Experian Cybersecurity Survey
Experian Cybersecurity Survey Experian Cybersecurity Survey
Experian Cybersecurity Survey Experian_US
 
Juniper Trusted Mobility Index 2012
Juniper Trusted Mobility Index 2012Juniper Trusted Mobility Index 2012
Juniper Trusted Mobility Index 2012Juniper Networks
 
TeleSign Consumer Account Security Report 2015 FINAL
TeleSign Consumer Account Security Report 2015 FINALTeleSign Consumer Account Security Report 2015 FINAL
TeleSign Consumer Account Security Report 2015 FINALPeggy Lawless
 

Ähnlich wie Estudio cibercimen-2013-ciberinvestigacion (20)

Norton Cyber Crime Report 2013
Norton Cyber Crime Report 2013Norton Cyber Crime Report 2013
Norton Cyber Crime Report 2013
 
2012 norton cybercrime_report_master_final_050912
2012 norton cybercrime_report_master_final_0509122012 norton cybercrime_report_master_final_050912
2012 norton cybercrime_report_master_final_050912
 
Awareness about cybercrime among youth
Awareness about cybercrime among youthAwareness about cybercrime among youth
Awareness about cybercrime among youth
 
Norton Cyber Security Insights Report 2017
Norton Cyber Security Insights Report 2017Norton Cyber Security Insights Report 2017
Norton Cyber Security Insights Report 2017
 
Why Your Mobile Device Isn’t As Secure As You Think
Why Your Mobile Device Isn’t As Secure As You ThinkWhy Your Mobile Device Isn’t As Secure As You Think
Why Your Mobile Device Isn’t As Secure As You Think
 
Ericsson ConsumerLab: Privacy, security and safety online
Ericsson ConsumerLab: Privacy, security and safety onlineEricsson ConsumerLab: Privacy, security and safety online
Ericsson ConsumerLab: Privacy, security and safety online
 
Consumer Mobile Policy & Security - Lightspeed & Kantar
Consumer Mobile Policy & Security - Lightspeed & KantarConsumer Mobile Policy & Security - Lightspeed & Kantar
Consumer Mobile Policy & Security - Lightspeed & Kantar
 
Security Risks of Uneducated Employees
Security Risks of Uneducated EmployeesSecurity Risks of Uneducated Employees
Security Risks of Uneducated Employees
 
Mobile infographic 2015_english
Mobile infographic 2015_englishMobile infographic 2015_english
Mobile infographic 2015_english
 
How consumers use technology and its impact on their lives.
How consumers use technology and its impact on their lives.How consumers use technology and its impact on their lives.
How consumers use technology and its impact on their lives.
 
Liberation from Location: El Salvador
Liberation from Location: El SalvadorLiberation from Location: El Salvador
Liberation from Location: El Salvador
 
Not logging on, but living on
Not logging on, but living onNot logging on, but living on
Not logging on, but living on
 
La TecnologĂ­a Digital en MĂŠxico en 2018
La TecnologĂ­a Digital en MĂŠxico en 2018La TecnologĂ­a Digital en MĂŠxico en 2018
La TecnologĂ­a Digital en MĂŠxico en 2018
 
Bilal Al Mourad - Ipsos - ICT Kuwait 2015 - MASHUP MENA Conference
Bilal Al Mourad  - Ipsos -  ICT Kuwait 2015 - MASHUP MENA Conference Bilal Al Mourad  - Ipsos -  ICT Kuwait 2015 - MASHUP MENA Conference
Bilal Al Mourad - Ipsos - ICT Kuwait 2015 - MASHUP MENA Conference
 
Tips and Tricks on Securing your Android Devices
Tips and Tricks on Securing your Android DevicesTips and Tricks on Securing your Android Devices
Tips and Tricks on Securing your Android Devices
 
Internet of Things: From Everyday Devices to Conduits of Commerce
Internet of Things: From Everyday Devices to Conduits of CommerceInternet of Things: From Everyday Devices to Conduits of Commerce
Internet of Things: From Everyday Devices to Conduits of Commerce
 
Experian Cybersecurity Survey
Experian Cybersecurity Survey Experian Cybersecurity Survey
Experian Cybersecurity Survey
 
Juniper Trusted Mobility Index 2012
Juniper Trusted Mobility Index 2012Juniper Trusted Mobility Index 2012
Juniper Trusted Mobility Index 2012
 
Read, like & shares
Read, like & sharesRead, like & shares
Read, like & shares
 
TeleSign Consumer Account Security Report 2015 FINAL
TeleSign Consumer Account Security Report 2015 FINALTeleSign Consumer Account Security Report 2015 FINAL
TeleSign Consumer Account Security Report 2015 FINAL
 

Mehr von Selva OrejĂłn

Guia de ciberseguridad para menores de Europol:
Guia de ciberseguridad para menores de Europol: Guia de ciberseguridad para menores de Europol:
Guia de ciberseguridad para menores de Europol: Selva OrejĂłn
 
Instagram protocolo-onbranding
Instagram protocolo-onbrandingInstagram protocolo-onbranding
Instagram protocolo-onbrandingSelva OrejĂłn
 
Doble factor verificaciĂłn google protocolo onBRANDING
Doble factor verificaciĂłn google protocolo onBRANDINGDoble factor verificaciĂłn google protocolo onBRANDING
Doble factor verificaciĂłn google protocolo onBRANDINGSelva OrejĂłn
 
Doble factor-verificacion-apple-protocolo-onbranding
Doble factor-verificacion-apple-protocolo-onbrandingDoble factor-verificacion-apple-protocolo-onbranding
Doble factor-verificacion-apple-protocolo-onbrandingSelva OrejĂłn
 
smmday-2020-hackeo-cuentas-Selva-Orejon-onBRANDING
smmday-2020-hackeo-cuentas-Selva-Orejon-onBRANDINGsmmday-2020-hackeo-cuentas-Selva-Orejon-onBRANDING
smmday-2020-hackeo-cuentas-Selva-Orejon-onBRANDINGSelva OrejĂłn
 
Protocolo onbranding-filtracion-exfiltracion
Protocolo onbranding-filtracion-exfiltracionProtocolo onbranding-filtracion-exfiltracion
Protocolo onbranding-filtracion-exfiltracionSelva OrejĂłn
 
Protocolo onbranding-recuperacion-cuenta-google
Protocolo onbranding-recuperacion-cuenta-googleProtocolo onbranding-recuperacion-cuenta-google
Protocolo onbranding-recuperacion-cuenta-googleSelva OrejĂłn
 
Protocolo onbranding-twitter-hackeado-hackeo
Protocolo onbranding-twitter-hackeado-hackeoProtocolo onbranding-twitter-hackeado-hackeo
Protocolo onbranding-twitter-hackeado-hackeoSelva OrejĂłn
 
Protocolo onbranding sextorsion revenge porn el porno de la venganza
Protocolo onbranding sextorsion revenge porn el porno de la venganzaProtocolo onbranding sextorsion revenge porn el porno de la venganza
Protocolo onbranding sextorsion revenge porn el porno de la venganzaSelva OrejĂłn
 
Protocolo onbranding-iphone-fallecido-muerto
Protocolo onbranding-iphone-fallecido-muertoProtocolo onbranding-iphone-fallecido-muerto
Protocolo onbranding-iphone-fallecido-muertoSelva OrejĂłn
 
Protocolo onbranding ransomware cryptolocker
Protocolo onbranding ransomware cryptolockerProtocolo onbranding ransomware cryptolocker
Protocolo onbranding ransomware cryptolockerSelva OrejĂłn
 
Protocolo onbranding-perdida-robo-android
Protocolo onbranding-perdida-robo-androidProtocolo onbranding-perdida-robo-android
Protocolo onbranding-perdida-robo-androidSelva OrejĂłn
 
Protocolo onbranding hackeo facebook hackeado
Protocolo onbranding hackeo facebook hackeadoProtocolo onbranding hackeo facebook hackeado
Protocolo onbranding hackeo facebook hackeadoSelva OrejĂłn
 
Filtración de contraseñas y correos: PROTOCOLO EXFILTRACION
Filtración de contraseñas y correos: PROTOCOLO EXFILTRACIONFiltración de contraseñas y correos: PROTOCOLO EXFILTRACION
Filtración de contraseñas y correos: PROTOCOLO EXFILTRACIONSelva Orejón
 
onBRANDING ciberseguro axa
onBRANDING ciberseguro axaonBRANDING ciberseguro axa
onBRANDING ciberseguro axaSelva OrejĂłn
 
Plan identidad digital 2 eae
Plan identidad digital 2 eaePlan identidad digital 2 eae
Plan identidad digital 2 eaeSelva OrejĂłn
 
Plan identidad digital 1
Plan identidad digital 1Plan identidad digital 1
Plan identidad digital 1Selva OrejĂłn
 
Gestion crisis eae selva orejon
Gestion crisis eae selva orejonGestion crisis eae selva orejon
Gestion crisis eae selva orejonSelva OrejĂłn
 

Mehr von Selva OrejĂłn (20)

Guia de ciberseguridad para menores de Europol:
Guia de ciberseguridad para menores de Europol: Guia de ciberseguridad para menores de Europol:
Guia de ciberseguridad para menores de Europol:
 
onBRANDING logo
onBRANDING logoonBRANDING logo
onBRANDING logo
 
Instagram protocolo-onbranding
Instagram protocolo-onbrandingInstagram protocolo-onbranding
Instagram protocolo-onbranding
 
Doble factor verificaciĂłn google protocolo onBRANDING
Doble factor verificaciĂłn google protocolo onBRANDINGDoble factor verificaciĂłn google protocolo onBRANDING
Doble factor verificaciĂłn google protocolo onBRANDING
 
Doble factor-verificacion-apple-protocolo-onbranding
Doble factor-verificacion-apple-protocolo-onbrandingDoble factor-verificacion-apple-protocolo-onbranding
Doble factor-verificacion-apple-protocolo-onbranding
 
smmday-2020-hackeo-cuentas-Selva-Orejon-onBRANDING
smmday-2020-hackeo-cuentas-Selva-Orejon-onBRANDINGsmmday-2020-hackeo-cuentas-Selva-Orejon-onBRANDING
smmday-2020-hackeo-cuentas-Selva-Orejon-onBRANDING
 
Protocolo onbranding-filtracion-exfiltracion
Protocolo onbranding-filtracion-exfiltracionProtocolo onbranding-filtracion-exfiltracion
Protocolo onbranding-filtracion-exfiltracion
 
Protocolo onbranding-recuperacion-cuenta-google
Protocolo onbranding-recuperacion-cuenta-googleProtocolo onbranding-recuperacion-cuenta-google
Protocolo onbranding-recuperacion-cuenta-google
 
Protocolo onbranding-twitter-hackeado-hackeo
Protocolo onbranding-twitter-hackeado-hackeoProtocolo onbranding-twitter-hackeado-hackeo
Protocolo onbranding-twitter-hackeado-hackeo
 
Protocolo onbranding sextorsion revenge porn el porno de la venganza
Protocolo onbranding sextorsion revenge porn el porno de la venganzaProtocolo onbranding sextorsion revenge porn el porno de la venganza
Protocolo onbranding sextorsion revenge porn el porno de la venganza
 
Protocolo onbranding-iphone-fallecido-muerto
Protocolo onbranding-iphone-fallecido-muertoProtocolo onbranding-iphone-fallecido-muerto
Protocolo onbranding-iphone-fallecido-muerto
 
Protocolo onbranding ransomware cryptolocker
Protocolo onbranding ransomware cryptolockerProtocolo onbranding ransomware cryptolocker
Protocolo onbranding ransomware cryptolocker
 
Protocolo onbranding-perdida-robo-android
Protocolo onbranding-perdida-robo-androidProtocolo onbranding-perdida-robo-android
Protocolo onbranding-perdida-robo-android
 
Protocolo onbranding hackeo facebook hackeado
Protocolo onbranding hackeo facebook hackeadoProtocolo onbranding hackeo facebook hackeado
Protocolo onbranding hackeo facebook hackeado
 
Filtración de contraseñas y correos: PROTOCOLO EXFILTRACION
Filtración de contraseñas y correos: PROTOCOLO EXFILTRACIONFiltración de contraseñas y correos: PROTOCOLO EXFILTRACION
Filtración de contraseñas y correos: PROTOCOLO EXFILTRACION
 
onBRANDING ciberseguro axa
onBRANDING ciberseguro axaonBRANDING ciberseguro axa
onBRANDING ciberseguro axa
 
mapa de publicos
mapa de publicosmapa de publicos
mapa de publicos
 
Plan identidad digital 2 eae
Plan identidad digital 2 eaePlan identidad digital 2 eae
Plan identidad digital 2 eae
 
Plan identidad digital 1
Plan identidad digital 1Plan identidad digital 1
Plan identidad digital 1
 
Gestion crisis eae selva orejon
Gestion crisis eae selva orejonGestion crisis eae selva orejon
Gestion crisis eae selva orejon
 

KĂźrzlich hochgeladen

Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...amitlee9823
 
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service AvailableCall Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service AvailableSeo
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756dollysharma2066
 
BAGALUR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
BAGALUR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRLBAGALUR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
BAGALUR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRLkapoorjyoti4444
 
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service BangaloreCall Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangaloreamitlee9823
 
Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...amitlee9823
 
PHX May 2024 Corporate Presentation Final
PHX May 2024 Corporate Presentation FinalPHX May 2024 Corporate Presentation Final
PHX May 2024 Corporate Presentation FinalPanhandleOilandGas
 
Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...
Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...
Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...lizamodels9
 
Value Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and painsValue Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and painsP&CO
 
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai KuwaitThe Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwaitdaisycvs
 
Falcon Invoice Discounting: The best investment platform in india for investors
Falcon Invoice Discounting: The best investment platform in india for investorsFalcon Invoice Discounting: The best investment platform in india for investors
Falcon Invoice Discounting: The best investment platform in india for investorsFalcon Invoice Discounting
 
Uneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration PresentationUneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration Presentationuneakwhite
 
Falcon's Invoice Discounting: Your Path to Prosperity
Falcon's Invoice Discounting: Your Path to ProsperityFalcon's Invoice Discounting: Your Path to Prosperity
Falcon's Invoice Discounting: Your Path to Prosperityhemanthkumar470700
 
RSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors DataRSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors DataExhibitors Data
 
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...Sheetaleventcompany
 
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...Aggregage
 
JAYNAGAR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
JAYNAGAR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRLJAYNAGAR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
JAYNAGAR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRLkapoorjyoti4444
 
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876dlhescort
 
Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...
Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...
Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...allensay1
 

KĂźrzlich hochgeladen (20)

Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
 
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service AvailableCall Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
 
BAGALUR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
BAGALUR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRLBAGALUR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
BAGALUR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
 
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service BangaloreCall Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
 
Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
 
PHX May 2024 Corporate Presentation Final
PHX May 2024 Corporate Presentation FinalPHX May 2024 Corporate Presentation Final
PHX May 2024 Corporate Presentation Final
 
Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...
Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...
Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...
 
Value Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and painsValue Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and pains
 
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai KuwaitThe Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
 
Falcon Invoice Discounting: The best investment platform in india for investors
Falcon Invoice Discounting: The best investment platform in india for investorsFalcon Invoice Discounting: The best investment platform in india for investors
Falcon Invoice Discounting: The best investment platform in india for investors
 
Uneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration PresentationUneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration Presentation
 
Falcon's Invoice Discounting: Your Path to Prosperity
Falcon's Invoice Discounting: Your Path to ProsperityFalcon's Invoice Discounting: Your Path to Prosperity
Falcon's Invoice Discounting: Your Path to Prosperity
 
RSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors DataRSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors Data
 
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...
 
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
 
JAYNAGAR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
JAYNAGAR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRLJAYNAGAR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
JAYNAGAR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
 
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
 
Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...
Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...
Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...
 
(Anamika) VIP Call Girls Napur Call Now 8617697112 Napur Escorts 24x7
(Anamika) VIP Call Girls Napur Call Now 8617697112 Napur Escorts 24x7(Anamika) VIP Call Girls Napur Call Now 8617697112 Napur Escorts 24x7
(Anamika) VIP Call Girls Napur Call Now 8617697112 Napur Escorts 24x7
 

Estudio cibercimen-2013-ciberinvestigacion

  • 2. 2013 NORTON REPORT 24 COUNTRIES AUSTRALIA, BRAZIL, CANADA, CHINA, COLOMBIA, DENMARK, 
 FRANCE, GERMANY, INDIA, ITALY, JAPAN, MEXICO, NETHERLANDS, 
 NEW ZEALAND, POLAND, RUSSIA, SAUDI ARABIA, SINGAPORE, 
 SOUTH AFRICA, SWEDEN, TURKEY, UNITED ARAB EMIRATES, 
 UNITED KINGDOM, UNITED STATES OF AMERICA ! 13,022 ONLINE ADULTS AGED 18-64
  • 3. WHO IS AFFECTED MOST BY CYBERCRIME? ! ! CYBERCRIME VICTIMS MORE LIKELY TO BE: HIGHEST NUMBER OF CYBERCRIME VICTIMS FOUND IN: RUSSIA MALE – 64% 
 85% MILLENNIAL – 66% CHINA (COMPARED TO 58% OF FEMALES) (COMPARED TO 54% OF BABY BOOMERS) ! AND: • MOBILE DEVICE OWNERS – 63% • SOCIAL NETWORK USERS – 63% • PUBLIC / UNSECURED WI-FI USERS – 68% • EMERGING MARKET – 68% • PARENT OF CHILDREN 8-17 – 65% 77% USA 63%; CANADA 68%; UK 58%; FRANCE 45%; GERMANY 53%; ITALY 56%; SWEDEN 56%; POLAND 60%; NETHERLANDS 50%; AUSTRALIA 60%; INDIA 65%; JAPAN 19%; SINGAPORE 61%; NEW ZEALAND 69%; TURKEY 63%; DENMARK 50%; SAUDI ARABIA 62%; UAE 71%, COLOMBIA 64% SOUTH AFRICA 73% ALL STATS REFER TO LIFETIME VICTIMS
  • 4. KEY THEMES ! TABLET AND SMARTPHONE CONSUMERS LEAVE SECURITY BEHIND ALMOST 1/2 DON’T USE BASIC PRECAUTIONS SUCH AS PASSWORDS, SECURITY SOFTWARE OR BACK UP FILES FOR THEIR MOBILE DEVICE MORE THAN ONE-THIRD HAVE EXPERIENCED MOBILE CYBERCRIME LAST YEAR ! THE GLOBAL PRICE TAG OF CONSUMER CYBERCRIME US$113 BILLION ANNUALLY, COST PER CYBERCRIME VICTIM UP 50 PERCENT ! THE SCALE OF CONSUMER CYBERCRIME 1 MILLION+ VICTIMS DAILY ! CREATING PERFECT STORM AS LINES BLUR BETWEEN WORK/ PLAY 49% USE THEIR PERSONAL DEVICE FOR WORK AND PLAY AROUND ONE-IN-FIVE SHARE WORK RELATED INFORMATION WITH FRIENDS AND FAMILY
  • 5. SMARTPHONE/TABLET CONSUMERS LEAVING SECURITY BEHIND 1/2 1/2 NEARLY SMARTPHONE/TABLET USERS SLEEP WITH THEIR PHONES WITHIN ARMS’ REACH NEARLY DON’T USE BASIC PRECAUTIONS SUCH AS PASSWORDS, SECURITY SOFTWARE OR BACK UP FILES FOR THEIR MOBILE DEVICE * ONLY 26% OF SMARTPHONE USERS HAVE MOBILE SECURITY SOFTWARE WITH ADVANCED PROTECTION 57% AREN’T AWARE 
 THAT SECURITY SOLUTIONS FOR MOBILE DEVICES EXIST * *AMONG MOBILE DEVICE USERS
  • 6. CONSUMERS’ SECURITY IQ – DELETE SUSPICIOUS EMAILS FROM PEOPLE THEY DON’T KNOW HIGH ON PC, LOW ON MOBILE HAVE AT LEAST A BASIC FREE ANTIVIRUS SOLUTION AVOID STORING SENSITIVE FILES ONLINE 90%
 72% 78%
 VS. VS. VS. 60%
 42% 53% VS. VS. VS. 56% 33% 48% GOOD JOB! NEEDS WORK! NEEDS WORK!
  • 7. MOBILE CYBERCRIME AND LOSS 38% HAVE EXPERIENCED MOBILE CYBERCRIME IN PAST 12 MONTHS * 27% OF ADULTS 
 HAVE LOST THEIR MOBILE DEVICE OR HAD IT STOLEN *AMONG SMARTPHONE USERS
  • 8. THE GLOBAL PRICE TAG OF CONSUMER CYBERCRIME $113 BN ENOUGH TO HOST THE 2012 LONDON OLYMPICS NEARLY 10 TIMES OVER Other 0,17 Fraud 0,38 Repairs 0,24 ! 83% OF DIRECT FINANCIAL COSTS ARE A RESULT OF FRAUD, REPAIRS, THEFT AND LOSS USD $298 ! Theft or loss 0,21 AVERAGE COST PER VICTIM REPRESENTS A 50 PERCENT INCREASE OVER 2012 ALL AMOUNTS IN USD SEE EXTRAPOLATION CALCULATIONS *
  • 9. THE GLOBAL PRICE TAG OF CONSUMER CYBERCRIME 1 BN RUSSIA 13BN 38 BN 3 BN 37BN EUROPE USA CHINA 4BN MEXICO INDIA 8 BN BRAZIL 1 BN JAPAN 1 BN AUSTRALIA SOUTH AFRICA 0.3BN ALL AMOUNTS IN USD ROUNDED TO THE NEAREST BILLION CANADA 3 BN; SINGAPORE 1 BN; NEW ZEALAND 0.1 BN; TURKEY 2 BN; SAUDI ARABIA 0.5 BN; UAE 0.3 BN; COLOMBIA 0.5 BN
  • 10. THE SCALE OF CONSUMER CYBERCRIME 378 MILLION Ổ ᝘ VICTIMS PER YEAR bhĂŤ NEARLY 2.8 TIMES AS MANY BABIES BORN EACH YEAR 1 MILLION + VICTIMS PER DAY ENOUGH TO FILL WEMBLEY STADIUM (ENGLAND) MORE THAN 10 TIMES 12 VICTIMS PER SECOND SEE EXTRAPOLATION CALCULATIONS *
  • 11. THE SCALE OF CONSUMER CYBERCRIME 50% OF ONLINE ADULTS
 HAVE BEEN VICTIMS OF CYBERCRIME AND / OR NEGATIVE ONLINE SITUATIONS IN THE PAST YEAR
 (e.g., RECEIVED NUDE IMAGES FROM STRANGERS OR WERE BULLIED OR STALKED ONLINE) 41% OF ONLINE ADULTS HAVE FALLEN VICTIM TO ATTACKS SUCH AS MALWARE, VIRUSES, HACKING, SCAMS, FRAUD AND THEFT
  • 12. BLURRING BETWEEN WORK AND PLAY 49% 36% 30% USE THEIR PERSONAL DEVICE FOR WORK AND PLAY* SAY THEIR COMPANY HAS NO POLICY ON USE OF PERSONAL DEVICES FOR WORK* OF PARENTS LET THEIR KIDS PLAY, DOWNLOAD AND SHOP ON THEIR WORK DEVICE ** 49% 34% 27% OF RESPONDENTS ACCESS ACCESS THEIR SOCIAL STORE PERSONAL OR SEND PERSONAL EMAILS NETWORK THROUGH INFORMATION ON THEIR THROUGH THEIR WORK THEIR WORK DEVICE* WORK DEVICE* DEVICE* *AMONG WORKING ADULTS **AMONG PARENTS WHO USE DEVICES PROVIDED BY THEIR
  • 13. ONLINE FILE STORAGE OPENS DOOR TO OVERSHARING 24% OF USERS SAVE BOTH WORK AND PERSONAL DOCUMENTS TO THE SAME ONLINE FILE STORAGE ACCOUNT ON SHARING WORK-RELATED INFORMATION THROUGH ONLINE FILE STORAGE SITES: 18% FRIENDS SHARE WITH 21% SHARE WITH FAMILY PUTTING BOTH WORK AND PERSONAL DOCUMENTS AT RISK
  • 14. RISKY BEHAVIOR ON SOCIAL MEDIA LOG OUT 39% 
 OF SOCIAL MEDIA USERS DON’T LOG OUT AFTER EACH SESSION **** 1/4 
 OF SOCIAL MEDIA USERS SHARE THEIR SOCIAL MEDIA PASSWORDS WITH OTHERS ? ? ? 31% 
 OF SOCIAL MEDIA USERS CONNECT WITH PEOPLE THEY DO NOT KNOW 12% OF SOCIAL MEDIA USERS SAY SOMEONE HAS HACKED INTO THEIR SOCIAL NETWORK ACCOUNT AND PRETENDED TO BE THEM
  • 15. MOBILE AND SOCIAL STRESSORS 49% OF MOBILE DEVICE USERS WOULD FEEL UPSET/CONCERNED IF THEY LEFT HOME WITHOUT THEIR MOBILE DEVICE 6/10 
 OF MOBILE DEVICE USERS GET ANNOYED BY OTHERS CHECKING THEIR MOBILES DURING A MEAL 1/4 
 OF MOBILE DEVICE USERS CHECK THEIR MOBILES WHILE SHARING A MEAL WITH OTHERS 25% 
 OF SOCIAL NETWORK USERS CHECK THEIR SOCIAL NETWORK WITHIN 15 MINUTES OF WAKING UP
  • 16. CONSUMERS PICK CONVENIENCE OVER SAFETY 1/3 ADMIT THE CONVENIENCE OF CONSTANTLY CONNECTED OUTWEIGHED ANY POTENTIAL SECURITY RISKS 62% AGREE THERE IS NO SUCH THING AS ‘ONLINE PRIVACY’ IN TODAY’S WORLD EVEN THOUGH… 46% WISH THEY COULD PERMANENTLY DELETE SOME OF THEIR PERSONAL ONLINE CONTENT COMPLETELY 7/10 
 DON’T PUT ANYTHING ON SOCIAL NETWORKS THAT THEY WOULDN’T WANT THEIR PARENTS / KIDS TO SEE
  • 17. CONCLUSION 50% OF ONLINE ADULTS HAVE BEEN VICTIMS OF CYBERCRIME AND / OR NEGATIVE ONLINE SITUATIONS IN THE PAST YEAR 1M+ ADULTS BECOME CYBERCRIME VICTIMS EVERY DAY THAT’S 12 VICTIMS PER SECOND $113 BILLION TOTAL DIRECT GLOBAL COSTS IN JUST 12 MONTHS CONSUMERS MOVE TO MOBILE DEVICES BUT LEAVE PROTECTION BEHIND CONSUMERS ARE INCREASINGLY USING MOBILE DEVICES AND TABLET DEVICES BUT ARE NOT PROTECTING THEMSELVES. WHILE DESKTOP PROTECTION IS HIGH AMONG CONSUMERS, THE CYBERCRIMINAL IS MOVING TO MOBILE AND TABLET DEVICES WHERE CONSUMERS ARE VULNERABLE. MOBILE DEVICE ADOPTION CONTINUES TO GROW, SUGGESTING A DEGREE OF MOBILE DEPENDENCE, WHICH WILL INCREASE OPPORTUNITIES FOR CYBERCRIMINALS TO STRIKE. ! BLURRING BETWEEN WORK AND PERSONAL MOBILE DEVICE USAGE AS PERSONAL MOBILE DEVICES ARE BEING USED MORE AND MORE FOR WORK-RELATED ACTIVITIES, CONSUMERS’ LIFESTYLES ARE PUTTING BUSINESS ENVIRONMENTS AT RISK. AN ALARMING NUMBER OF BUSINESSES HAVE NO POLICIES IN PLACE. FOR THOSE WHO DO, OUR RESEARCH SUGGESTS THE POLICIES ARE OFTEN NOT RESPECTED BY THEIR EMPLOYEES. ! CONSUMERS PICK CONVENIENCE OVER SAFETY MANY CONSUMERS ARE MAKING A CONSCIOUS DECISION TO TRADE THEIR SAFETY FOR CONVENIENCE; MANY MORE ARE UNAWARE THAT THEY’RE MAKING THE SAME TRADE. BUT, IN USD ALL AMOUNTS “CONSTANTLY CONNECTED” DOESN’T HAVE TO EQUAL
  • 18. TOP TIPS DEFEND YOUR DATA A COMPREHENSIVE SECURITY SUITE PROVIDES A STRONG DEFENSE AGAINST ONLINE THREATS. NORTON 360 MULTI-DEVICE OFFERS PROTECTION FOR PCS, SMARTPHONES AND TABLETS, IN A SINGLE SOLUTION THINK OF MOBILE DEVICES AS MINI-COMPUTERS MOBILE IS THE FASTEST-GROWING TARGET FOR CYBERCRIMINALS. MAKE SURE YOUR MOBILE DEVICE REQUIRES A PASSWORD, AND TAKE PRECAUTIONS TO ENSURE YOUR DEVICE IS PROTECTED AGAINST THEFT, LOSS AND CYBERCRIME BE CAUTIOUS IN THE CLOUD WHILE CLOUD STORAGE SOLUTIONS MAKE IT EASY TO SAVE AND SHARE FILES, THEY ALSO OPEN OTHER AVENUES FOR ATTACK. BE CAREFUL ABOUT WHO HAS ACCESS TO YOUR FILES, AND USE A SOLUTION WITH BUILT-IN SECURITY IF POSSIBLE SAVE SENSITIVE TRANSACTIONS FOR SECURE CONNECTIONS FREE OR UNSECURED WI-FI NETWORKS CAN MAKE IT EASY FOR THIEVES TO EAVESDROP ON YOUR ACTIVITY. AVOID DOING ANY SENSITIVE TRANSACTIONS LIKE BANKING OR SHOPPING WHILE CONNECTED TO THESE NETWORKS, OR USE A PERSONAL VPN CLIENT AFTER YOU CONNECT, DOUBLE CHECK CHECK CREDIT CARD AND BANK STATEMENTS REGULARLY FOR FRAUDULENT TRANSACTIONS, AND REPORT ANY SUSPICIOUS ACTIVITY TO YOUR PROVIDER AND/OR LAW ENFORCEMENT  
  • 22. POTENTIALLY RISKY BEHAVIOR ON UNSECURED WI-FI 56% ACCESS THEIR SOCIAL NETWORK ACCOUNT 29% ACCESS THEIR BANK ACCOUNT 3/10 NEEDS WORK! DO NOT ALWAYS LOG OFF AFTER HAVING USED A PUBLIC WI-FI CONNECTION 54% ACCESS PERSONAL E-MAIL 29% SHOP ONLINE 39% DO NOT TAKE ANY SPECIAL STEPS TO PROTECT THEMSELVES WHEN USING PUBLIC WI-FI *AMONG FREE/UNSECURED WI-FI USERS
  • 23. BLURRING LINES BETWEEN FRIENDS AND ENEMIES 1/10 41% HAVE ACCESSED THEIR PARTNER/FRIEND’S ACCOUNTS WITHOUT PERMISSION DID IT BECAUSE THEY WERE CURIOUS* 26% WERE GOOFING AROUND / PLAYING A JOKE* 18% DIDN’T TRUST THEIR PARTNER / FRIEND TO BE HONEST ON THEIR OWN* *AMONG THOSE WHO HAVE ACCESSED PARTNER/FRIEND'S EMAIL/ SOCIAL MEDIA
  • 25. THE METHODOLOGY DETAIL EDELMAN BERLAND CONDUCTED AN ONLINE SURVEY AMONG CONSUMERS: ! 13,022 ADULTS AGED 18-64 YEARS ! ! The survey was conducted in 24 countries (Australia, Brazil, Canada, China, Colombia, France, Denmark, Germany, India, Italy, Japan, Mexico, Netherlands, New Zealand, Poland, Russia, Saudi Arabia, Singapore, South Africa, Sweden, Turkey, United Arab Emirates, United Kingdom and United States). ! The survey was conducted in the primary language of each country, and questions asked were identical across all countries. ! Interviews were conducted between 4th July 2013 – 1st August 2013. ! The margin of error for the total sample of adults (n=13,022) is + 0.9% at the 95% level of confidence. ! ! ! Important notes: ! The Norton Cybercrime Report is an annual report commissioned by Norton by Symantec aimed at understanding how cybercrime affects consumers and how the adoption and evolution of new technologies impacts consumers’ security. The research was conducted by Edelman Berland, an international research agency. Findings are based on self-reported experiences of over 13,000 adults across 24 countries. ! 1000 adult respondents were interviewed in each of USA and India. The global data has been weighted to ensure all countries have equal representation of n=500 adults. ! Additional notes: ! Developed Markets: USA, Canada, UK, France, Germany, Italy, Sweden, Netherlands, Australia, Japan, Singapore, New Zealand, Denmark Emerging Markets: Brazil, Mexico, Poland, India, China, Russia, Turkey, Saudi Arabia, UAE, Colombia, South Africa ! Millennials: aged 18-34 Boomers: aged 45-64
  • 26. DEFINITION OF CYBERCRIME Cybercrime is defined as any of the following activities: ! • Computer viruses or malicious software appeared on my computer • I responded to a forged, ‘spoofed’ or fake email or website which captured my personal details such as passwords, credit card numbers, or bank account information thinking it was a legitimate request in order to access information or provide information to a legitimate organization, such as my bank, etc. • Someone has hacked into my email account and pretended to be me • Someone has hacked into my social networking profile and pretended to be me • I responded to an online scam • I experienced online credit card fraud • I experienced identity theft •  My phone was infected and a text message was sent from my mobile phone without my permission or knowledge that I later had to pay for • My screen was locked and an alert was shown, which told me to pay a fine to get it unlocked • My smartphone was lost or stolen and someone found it and used it without my permission • An app appeared on my smartphone that I didn’t download • I’ve had someone purporting to be from a computer company call me to inform that I have an infected computer • I experienced another type of cybercrime on my cell / mobile phone / tablet device • I experienced another type of cybercrime on my desktop or laptop computer
  • 27. DEFINITION OF CYBERCRIME Cybercrime and /or negative online experience is defined as any of the following activities: ! • Computer viruses or malicious software appeared on my computer • I responded to a forged, ‘spoofed’ or fake email or website which captured my personal details such as passwords, credit card numbers, or bank account information thinking it was a legitimate request in order to access information or provide information to a legitimate organization, such as my bank, etc. • Someone has hacked into my email account and pretended to be me • Someone has hacked into my social networking profile and pretended to be me • I responded to an online scam • I experienced online credit card fraud • I experienced identity theft •  My phone was infected and a text message was sent from my mobile phone without my permission or knowledge that I later had to pay for • My screen was locked and an alert was shown, which told me to pay a fine to get it unlocked • My smartphone was lost or stolen and someone found it and used it without my permission • An app appeared on my smartphone that I didn’t download • I’ve had someone purporting to be from a computer company call me to inform that I have an infected computer • I experienced another type of cybercrime on my cell / mobile phone / tablet device • I experienced another type of cybercrime on my desktop or laptop computer • I experienced someone posting private/intimate photos or videos of me without my permission • I was approached online by someone in an unwanted sexual way • I have experienced online bullying, online stalking, online hate crime or other forms of online harassment • I have received SMS text messages from people I do not know, requesting me to click on an embedded link or stating that I have received a voicemail and need to dial a number which is not my voicemail to retrieve it • I have received unwanted nude images of someone I don’t know • I have received unwanted nude images of someone I do know
  • 28. EXTRAPOLATIONS CALCULATIONS 1) Nearly 380 million victims in 24 countries over past 12 months Online adults per country x % cybercrime victims past 12 months per country = 377,943,431 (sum of 24 countries). ! 2) 12 cybercrime victims every second / 719 cybercrime victims every minute / 43,144 per hour / more than 1 million per day impacting almost 378 million adults in the past year in 24 countries* Victims over past 12 months (as above) 377,943,431 / 365 days per year / 24 hours / 60 minutes / 60 seconds ! 3) Cybercrime is big business costing $113 billion in the last year in 24 countries Victims over past 12 months (per country) x average financial cost of cybercrime (per country in US currency). Figure shown in the sum of all countries total cost.