SlideShare une entreprise Scribd logo
1  sur  9
Télécharger pour lire hors ligne
consumer research
INSIGHTS
           ON IDENTITY THEFT AND CYBERCRIME
30%
        Nearly
                 are victims of
                 CYBER THEFT!




            78%
        RESPONDENTS USE THE
                                   19%
                               AMERICANS SURF THE
                                                       10%
                                                    OF THE VICTIMS HAVE
        INTERNET FOR BANKING      NET WITHOUT        BEEN DECEIVED ON
            OR SHOPPING.          PROTECTION          ONLINE SCAMS, ID
                                                     THEFT AND CREDIT
                                                        CARD FRAUD.




15%
                 PEOPLE KNOW SOMEONE WHO HAS BEEN
                 SUBJECTED TO SOME KIND OF FRAUD OR
                 SCAM.




10%
                 DON’T CONSIDER THEIR
                 CREDIT CARD NUMBER AS
                 SENSITIVE INFORMATION



ONE OUT OF THREE
RESPONDENTS HAVE BEEN SUBJECT TO
ONLINE SCAMS, ID THEFT OR CREDIT
CARD FRAUD.
THE WORLD HAS MOVED ONLINE!

                                                   78.43%
                                                   RESPONDENTS USE THE
                                                   INTERNET FOR BANKING OR
                                                   SHOPPING. THIS REFLECTS
                                                   THE GENERAL TREND.



According to comScore, US retail ecommerce spending (Q1: 2012) pushed past
$44 billion, that is a 17% Year over Year increase. The hottest product categories
included Digital Content/Subscriptions, Computer Software and Electronics. In
2011, 53% of the population bought something online, according to a Forrester
study. In fact, the total amount spent on shopping online is projected to rise from
a $1207 in 2011 to an astounding $1738 by 2016. That’s the average number of
dollars the American consumer is expected to spend annually on online shopping.
NATURALLY, THE FRAUDSTERS
               ARE NOW ONLINE, TOO!

 ONLINE SCAMS
                                     CREDIT CARD
                                     FRAUD




                                              Nearly 30%
                                              RESPONDENTS HAVE BEEN SUBJECT
                                              TO ONLINE SCAMS, ID THEFT OR
                                              CREDIT CARD FRAUD.
ID THEFT




  Given the rising revenues being garnered by online retail, it is only logical that this
  field will attract sophisticated cyber thieves. The number of people being victims
  of frauds and scams is going up every day. Identity theft and data theft is on the
  rise. The scams are many, unique and ever changing in the way they are
  presented so that they can fool most online users. From fake online shopping
  portals that resemble the original almost down to every detail, malicious coding,
  phishing attacks, and infected email attachments – today, scammers use a variety
  of ways to grab personal information and financial data. The survey shows that
  there is cause for serious concern. Three out of ten respondents have been duped
  in some way or the other while transacting online.

  William LeGro of Silver Lake frequently shops online, but when he contacted Bank
  of America recently to inform the bank that he was making an online buying
  transaction, an anti-fraud precaution few of us normally take, he was told that his
  Visa card had been compromised as a business he'd bought things from had
  been penetrated by hackers and that numerous Visa accounts had been
  compromised. No other details were forthcoming. Even the IRS has not been
  spared – in fact it has acknowledged that identity theft tax fraud –- stealing
  someone’s Social Security number to file a fake tax return and collect a bogus
  refund –- is one of the most complex issues it deals with.
PEOPLE ARE BEING
             CHEATED AGAIN AND AGAIN!
                                            ONLINE SCAMS

                   ID THEFT

                                                             CREDIT CARD FRAUD




                                             Nearly 10%
                                             OF THE VICTIMS HAVE BEEN
                                             FRAUDED ON ALL THREE COUNTS:
                                             ONLINE SCAMS, ID THEFT
                                              AND CREDIT CARD FRAUD.




It sounds almost incredulous that someone could be made a victim three times
over. However, 10% of the victims have been duped on three occasions, if not
more. That speaks volumes about the ingenuity of the online con artists and
thieves. Cybercriminals go to great lengths to cheat consumers. They make their
operations look legitimate, they frequently manipulate search engine results and
run professional-looking websites in order to make fake brands seem authentic,
using country-specific scripts for cold calls. They also use the latest technology
and a deep understanding of the human pyche to fool victims, often more than
once. Meghan Bach discovered last year that her husband’s identity had been
stolen and a fake tax refund collected in his name; she spent nearly 200 hours to
sort out the issue with the IRS and other agencies involved. She thought it was
behind her until the family came back from vacation, only to realize that his identity
had been stolen once again.
EVERY SIXTH RESPONDENT
          HAS A FRIEND WHO IS A VICTIM


                                              At least 15%
                                              PEOPLE KNOW SOMEONE WHO
                                              HAS BEEN SUBJECTED TO SOME
                                              KIND OF FRAUD OR SCAM..

                                              At one time, it used to be that we
                                              were only separated by six
                                              degrees of introduction from
                                              anyone on earth. Well, today, it
                                              seems     that   we’re   also   all
                                              separated probably by just six
                                              degrees of fraud! The number of
                                              online frauds being perpetrated
                                              is so high that it is no more an
uncommon occurrence. Many respondents have victims in their circle of family
and friends. It is increasingly cause for serious concern. Also, cases of mass
data theft are on the rise - such as the Sony Play Station identity theft case or
the LinkedIn hacked accounts or the recent credit card heist where nearly ten
million Visa and Master card customers had their data stolen. Released by
Javelin Strategy & Research, a study reports that in 2011, identity fraud
increased by 13 percent. More than 11.6 million adults became a victim of
identity fraud in the United States
AMAZINGLY,
             ONE IN FIVE AMERICANS
            HAVE NO ONLINE SECURITY.


                                             19.32%
                                             AMERICANS SURF THE NET
                                             WITHOUT PROTECTION!


                                             A recent study by McAfee puts
                                             the US in the bottom 5 protected
                                             countries. 19.32% of Americans
                                             surf the net without protection
                                             compared to the global average
                                             of 17%. One in six PCs have
                                             zero     anti-virus     protection.
“Browsing the internet on an exposed computer not only increases the risk of
identity theft and data loss, but it can contribute to the spread of harmful
programs and nasty viruses,” the security firm states. Consumers naively
believe that by sticking to safe sites, they will escape virus threats and
cyber-theft and malicious content. The truth is that attacks are becoming
increasingly sophisticated and these are rising at an alarming rate. In addition,
mobile usage has led to the new upsurge of mobile malware, which is an
immediate threat, considering the amount of personal data like credit card and
financial information stored on mobile devices, and which can be easily
accessed.
MOST PEOPLE ARE IGNORANT ABOUT
          WHAT CONSTITUTES A SECURITY
                  RISK ONLINE.
                                                                        30%
30%                 FULL NAME
                                                        DATE OF BIRTH    DON’T GET WHY HACKERS
                                                                         WOULD FIND THIS VALUABLE
DON’T SEE WHY REVEALING
THEIR FULL NAME COULD CAUSE
THEM HARM




11%             BANK ACCOUNT NUMBER
                                                          CREDIT CARD NUMBER
                                                                                10%
                                                                                 DON’T THINK THIS
 DON’T REGARD THIS AS A NOT-                                                     IS CRITICAL INFO
 TO-BE-DISCLOSED FACT




 73%           EMPLOYER’S NAME
                                                                DESIGNATION    71%
 DON’T CONSIDER THIS                                                           DON’T AGREE THAT
 INFO AS PRIVATE                                                               THIS IS SENSITIVE INFO




 40%          ADDRESS

 DON’T SEE WHY THEIR
 ADDRESS SHOULD
 BE KEPT PRIVATE                                                  PERSONAL
                                                                  EMAIL ID     40%
 5%
                                                                               DON’T THINK THIS IS
              SCARIEST OF ALL                                                  CRITICAL INFO

 ACTUALLY THINK NONE
 OF THIS IS SENSITIVE
 INFORMATION!




    Amazingly, many of us seem to be completely unaware of the sensitive
    information that we reveal and which could be used to steal our hard-earned
    money. Social media such Facebook, LinkedIn and Twitter are huge leaks of
    critical, personal data. A study released by Javelin Strategy & Research, stated
    that specifically, 68 percent of people with public social media profiles shared their
    birthday information (with 45 percent sharing month, date and year); 63 percent
    shared their high school name; 18 percent shared their phone number; and 12
    percent shared their pet’s name The scary bit is that all these are prime examples
    of personal information that a company would use to verify your identity.

    Clearly, there are some of us who are willing to reveal personal data without
    realizing how dangerous it could be to our own online security; making them a
    delight for hackers, scamsters and fraudsters. They are a soft and easy target for
    alert cyber thieves, always on the lookout for such victims.
METHODOLOGY

This iYogi Insights research on Consumer Experience with Identity Theft and
Cybercrime seeks to understand average consumer behaviour on cybercrime and
identity theft. In this age of new-age technologies, social media and information
sharing, does the average Joe or Jane understand what constitutes sensitive
information and how he or she often may unknowingly increase their own
vulnerability to hackers and cyber theft.
The survey was conducted on iYogi subscribers through an online form following
their support sessions. A total of 1970 respondents filled the online survey form
consisting of 10 detailed questions on their understanding of online security,
cybercrime, information sharing and related issues. The data collected was then
collated, analyzed and compared to identify, assess and quantify trends and
patterns.




DISCLAIMER
"Affiliation of any third party organization is not implied, unless expressly stated."

Contenu connexe

En vedette

20120613 e-banking fraud situation - BE law enforcement reaction
20120613 e-banking fraud situation - BE law enforcement reaction20120613 e-banking fraud situation - BE law enforcement reaction
20120613 e-banking fraud situation - BE law enforcement reactionLuc Beirens
 
The DNA of Online Payments Fraud
The DNA of Online Payments FraudThe DNA of Online Payments Fraud
The DNA of Online Payments FraudChristopher Uriarte
 
The Top Issues in Mobile Payments Fraud
The Top Issues in Mobile Payments FraudThe Top Issues in Mobile Payments Fraud
The Top Issues in Mobile Payments FraudVivastream
 
Balancing Fraud & Customer Experience in a Mobile World
Balancing Fraud & Customer Experience in a Mobile WorldBalancing Fraud & Customer Experience in a Mobile World
Balancing Fraud & Customer Experience in a Mobile WorldComrade
 
Prevent banking frauds through identity management
Prevent banking frauds through identity managementPrevent banking frauds through identity management
Prevent banking frauds through identity managementGARL
 
Detecting Opportunities and Threats with Complex Event Processing: Case St...
Detecting Opportunities and Threats with Complex Event Processing: Case St...Detecting Opportunities and Threats with Complex Event Processing: Case St...
Detecting Opportunities and Threats with Complex Event Processing: Case St...Tim Bass
 
Payments Card Fraud Challenges in Digital and Online Sales
Payments Card Fraud Challenges in Digital and Online SalesPayments Card Fraud Challenges in Digital and Online Sales
Payments Card Fraud Challenges in Digital and Online SalesChristopher Uriarte
 
Managing The Business Risk Of Fraud
Managing The Business Risk Of FraudManaging The Business Risk Of Fraud
Managing The Business Risk Of FraudEZ-R Stats, LLC
 
Preventing Tax Evasion & Benefits Fraud Through Predictive Analytics
Preventing Tax Evasion & Benefits Fraud Through Predictive AnalyticsPreventing Tax Evasion & Benefits Fraud Through Predictive Analytics
Preventing Tax Evasion & Benefits Fraud Through Predictive AnalyticsCapgemini
 
Understanding the Card Fraud Lifecycle : A Guide For Private Label Issuers
Understanding the Card Fraud Lifecycle :  A Guide For Private Label IssuersUnderstanding the Card Fraud Lifecycle :  A Guide For Private Label Issuers
Understanding the Card Fraud Lifecycle : A Guide For Private Label IssuersChristopher Uriarte
 
10 Ways To Prevent Internet Fraud
10 Ways To Prevent Internet Fraud10 Ways To Prevent Internet Fraud
10 Ways To Prevent Internet FraudGoose & Gander
 
Banking Frauds - An analysis of Banking Frauds, causes and possible preventiv...
Banking Frauds - An analysis of Banking Frauds, causes and possible preventiv...Banking Frauds - An analysis of Banking Frauds, causes and possible preventiv...
Banking Frauds - An analysis of Banking Frauds, causes and possible preventiv...Dinidu Weeraratne
 
FRAUD, MONEY LAUNDERING AND FORENSIC AUDIT
FRAUD, MONEY LAUNDERING AND FORENSIC AUDITFRAUD, MONEY LAUNDERING AND FORENSIC AUDIT
FRAUD, MONEY LAUNDERING AND FORENSIC AUDITEMAC Consulting Group
 

En vedette (15)

20120613 e-banking fraud situation - BE law enforcement reaction
20120613 e-banking fraud situation - BE law enforcement reaction20120613 e-banking fraud situation - BE law enforcement reaction
20120613 e-banking fraud situation - BE law enforcement reaction
 
The DNA of Online Payments Fraud
The DNA of Online Payments FraudThe DNA of Online Payments Fraud
The DNA of Online Payments Fraud
 
The Top Issues in Mobile Payments Fraud
The Top Issues in Mobile Payments FraudThe Top Issues in Mobile Payments Fraud
The Top Issues in Mobile Payments Fraud
 
Balancing Fraud & Customer Experience in a Mobile World
Balancing Fraud & Customer Experience in a Mobile WorldBalancing Fraud & Customer Experience in a Mobile World
Balancing Fraud & Customer Experience in a Mobile World
 
Prevent banking frauds through identity management
Prevent banking frauds through identity managementPrevent banking frauds through identity management
Prevent banking frauds through identity management
 
Detecting Opportunities and Threats with Complex Event Processing: Case St...
Detecting Opportunities and Threats with Complex Event Processing: Case St...Detecting Opportunities and Threats with Complex Event Processing: Case St...
Detecting Opportunities and Threats with Complex Event Processing: Case St...
 
Payments Card Fraud Challenges in Digital and Online Sales
Payments Card Fraud Challenges in Digital and Online SalesPayments Card Fraud Challenges in Digital and Online Sales
Payments Card Fraud Challenges in Digital and Online Sales
 
Managing The Business Risk Of Fraud
Managing The Business Risk Of FraudManaging The Business Risk Of Fraud
Managing The Business Risk Of Fraud
 
Preventing Tax Evasion & Benefits Fraud Through Predictive Analytics
Preventing Tax Evasion & Benefits Fraud Through Predictive AnalyticsPreventing Tax Evasion & Benefits Fraud Through Predictive Analytics
Preventing Tax Evasion & Benefits Fraud Through Predictive Analytics
 
Understanding the Card Fraud Lifecycle : A Guide For Private Label Issuers
Understanding the Card Fraud Lifecycle :  A Guide For Private Label IssuersUnderstanding the Card Fraud Lifecycle :  A Guide For Private Label Issuers
Understanding the Card Fraud Lifecycle : A Guide For Private Label Issuers
 
10 Ways To Prevent Internet Fraud
10 Ways To Prevent Internet Fraud10 Ways To Prevent Internet Fraud
10 Ways To Prevent Internet Fraud
 
Banking Frauds - An analysis of Banking Frauds, causes and possible preventiv...
Banking Frauds - An analysis of Banking Frauds, causes and possible preventiv...Banking Frauds - An analysis of Banking Frauds, causes and possible preventiv...
Banking Frauds - An analysis of Banking Frauds, causes and possible preventiv...
 
FRAUD, MONEY LAUNDERING AND FORENSIC AUDIT
FRAUD, MONEY LAUNDERING AND FORENSIC AUDITFRAUD, MONEY LAUNDERING AND FORENSIC AUDIT
FRAUD, MONEY LAUNDERING AND FORENSIC AUDIT
 
E-channels in banking
E-channels in bankingE-channels in banking
E-channels in banking
 
E Banking
E BankingE Banking
E Banking
 

Plus de iYogi

Commoditization of technology
Commoditization of technologyCommoditization of technology
Commoditization of technologyiYogi
 
Benjamin Franklin Effect – The Ultimate Way to Get Customers to Like You
Benjamin Franklin Effect – The Ultimate Way to Get Customers to Like YouBenjamin Franklin Effect – The Ultimate Way to Get Customers to Like You
Benjamin Franklin Effect – The Ultimate Way to Get Customers to Like YouiYogi
 
Jimmy wales ppt
Jimmy wales pptJimmy wales ppt
Jimmy wales pptiYogi
 
8 threats that even antivirus cannot catch
8 threats that even antivirus cannot catch8 threats that even antivirus cannot catch
8 threats that even antivirus cannot catchiYogi
 
8 steps to smartphone security for android
8 steps to smartphone security for android8 steps to smartphone security for android
8 steps to smartphone security for androidiYogi
 
6 steps to being a top influencer on linked in
6 steps to being a top influencer on linked in6 steps to being a top influencer on linked in
6 steps to being a top influencer on linked iniYogi
 
iYogi reviews via art elaine
iYogi reviews via art  elaineiYogi reviews via art  elaine
iYogi reviews via art elaineiYogi
 
Worldwideweb
WorldwidewebWorldwideweb
WorldwidewebiYogi
 
iYogi Wow Tech Facts: TYPEWRITER
iYogi Wow Tech Facts: TYPEWRITERiYogi Wow Tech Facts: TYPEWRITER
iYogi Wow Tech Facts: TYPEWRITERiYogi
 
Worm
WormWorm
WormiYogi
 
iYogi review by lynn c
iYogi review by lynn ciYogi review by lynn c
iYogi review by lynn ciYogi
 
iYogi reviews via art by marilyn b
iYogi reviews via art by marilyn biYogi reviews via art by marilyn b
iYogi reviews via art by marilyn biYogi
 
Electronic brains
Electronic brainsElectronic brains
Electronic brainsiYogi
 
iYogi reviews via art: Leslie c
iYogi reviews via art: Leslie ciYogi reviews via art: Leslie c
iYogi reviews via art: Leslie ciYogi
 
iYogi review by peggy l
iYogi review by peggy liYogi review by peggy l
iYogi review by peggy liYogi
 
iYogi review by Sandy w
iYogi review by Sandy wiYogi review by Sandy w
iYogi review by Sandy wiYogi
 
Dianna l
Dianna lDianna l
Dianna liYogi
 
iYogi customer review
iYogi customer reviewiYogi customer review
iYogi customer reviewiYogi
 
Customer feedback 1
Customer feedback 1Customer feedback 1
Customer feedback 1iYogi
 
Fathers of Technology
Fathers of TechnologyFathers of Technology
Fathers of TechnologyiYogi
 

Plus de iYogi (20)

Commoditization of technology
Commoditization of technologyCommoditization of technology
Commoditization of technology
 
Benjamin Franklin Effect – The Ultimate Way to Get Customers to Like You
Benjamin Franklin Effect – The Ultimate Way to Get Customers to Like YouBenjamin Franklin Effect – The Ultimate Way to Get Customers to Like You
Benjamin Franklin Effect – The Ultimate Way to Get Customers to Like You
 
Jimmy wales ppt
Jimmy wales pptJimmy wales ppt
Jimmy wales ppt
 
8 threats that even antivirus cannot catch
8 threats that even antivirus cannot catch8 threats that even antivirus cannot catch
8 threats that even antivirus cannot catch
 
8 steps to smartphone security for android
8 steps to smartphone security for android8 steps to smartphone security for android
8 steps to smartphone security for android
 
6 steps to being a top influencer on linked in
6 steps to being a top influencer on linked in6 steps to being a top influencer on linked in
6 steps to being a top influencer on linked in
 
iYogi reviews via art elaine
iYogi reviews via art  elaineiYogi reviews via art  elaine
iYogi reviews via art elaine
 
Worldwideweb
WorldwidewebWorldwideweb
Worldwideweb
 
iYogi Wow Tech Facts: TYPEWRITER
iYogi Wow Tech Facts: TYPEWRITERiYogi Wow Tech Facts: TYPEWRITER
iYogi Wow Tech Facts: TYPEWRITER
 
Worm
WormWorm
Worm
 
iYogi review by lynn c
iYogi review by lynn ciYogi review by lynn c
iYogi review by lynn c
 
iYogi reviews via art by marilyn b
iYogi reviews via art by marilyn biYogi reviews via art by marilyn b
iYogi reviews via art by marilyn b
 
Electronic brains
Electronic brainsElectronic brains
Electronic brains
 
iYogi reviews via art: Leslie c
iYogi reviews via art: Leslie ciYogi reviews via art: Leslie c
iYogi reviews via art: Leslie c
 
iYogi review by peggy l
iYogi review by peggy liYogi review by peggy l
iYogi review by peggy l
 
iYogi review by Sandy w
iYogi review by Sandy wiYogi review by Sandy w
iYogi review by Sandy w
 
Dianna l
Dianna lDianna l
Dianna l
 
iYogi customer review
iYogi customer reviewiYogi customer review
iYogi customer review
 
Customer feedback 1
Customer feedback 1Customer feedback 1
Customer feedback 1
 
Fathers of Technology
Fathers of TechnologyFathers of Technology
Fathers of Technology
 

Dernier

"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
What is Artificial Intelligence?????????
What is Artificial Intelligence?????????What is Artificial Intelligence?????????
What is Artificial Intelligence?????????blackmambaettijean
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rick Flair
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 

Dernier (20)

"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
What is Artificial Intelligence?????????
What is Artificial Intelligence?????????What is Artificial Intelligence?????????
What is Artificial Intelligence?????????
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 

New Study from iYogi Insights Reveals Nearly 30 Percent People have been Victims of Cybercrime

  • 1. consumer research INSIGHTS ON IDENTITY THEFT AND CYBERCRIME
  • 2. 30% Nearly are victims of CYBER THEFT! 78% RESPONDENTS USE THE 19% AMERICANS SURF THE 10% OF THE VICTIMS HAVE INTERNET FOR BANKING NET WITHOUT BEEN DECEIVED ON OR SHOPPING. PROTECTION ONLINE SCAMS, ID THEFT AND CREDIT CARD FRAUD. 15% PEOPLE KNOW SOMEONE WHO HAS BEEN SUBJECTED TO SOME KIND OF FRAUD OR SCAM. 10% DON’T CONSIDER THEIR CREDIT CARD NUMBER AS SENSITIVE INFORMATION ONE OUT OF THREE RESPONDENTS HAVE BEEN SUBJECT TO ONLINE SCAMS, ID THEFT OR CREDIT CARD FRAUD.
  • 3. THE WORLD HAS MOVED ONLINE! 78.43% RESPONDENTS USE THE INTERNET FOR BANKING OR SHOPPING. THIS REFLECTS THE GENERAL TREND. According to comScore, US retail ecommerce spending (Q1: 2012) pushed past $44 billion, that is a 17% Year over Year increase. The hottest product categories included Digital Content/Subscriptions, Computer Software and Electronics. In 2011, 53% of the population bought something online, according to a Forrester study. In fact, the total amount spent on shopping online is projected to rise from a $1207 in 2011 to an astounding $1738 by 2016. That’s the average number of dollars the American consumer is expected to spend annually on online shopping.
  • 4. NATURALLY, THE FRAUDSTERS ARE NOW ONLINE, TOO! ONLINE SCAMS CREDIT CARD FRAUD Nearly 30% RESPONDENTS HAVE BEEN SUBJECT TO ONLINE SCAMS, ID THEFT OR CREDIT CARD FRAUD. ID THEFT Given the rising revenues being garnered by online retail, it is only logical that this field will attract sophisticated cyber thieves. The number of people being victims of frauds and scams is going up every day. Identity theft and data theft is on the rise. The scams are many, unique and ever changing in the way they are presented so that they can fool most online users. From fake online shopping portals that resemble the original almost down to every detail, malicious coding, phishing attacks, and infected email attachments – today, scammers use a variety of ways to grab personal information and financial data. The survey shows that there is cause for serious concern. Three out of ten respondents have been duped in some way or the other while transacting online. William LeGro of Silver Lake frequently shops online, but when he contacted Bank of America recently to inform the bank that he was making an online buying transaction, an anti-fraud precaution few of us normally take, he was told that his Visa card had been compromised as a business he'd bought things from had been penetrated by hackers and that numerous Visa accounts had been compromised. No other details were forthcoming. Even the IRS has not been spared – in fact it has acknowledged that identity theft tax fraud –- stealing someone’s Social Security number to file a fake tax return and collect a bogus refund –- is one of the most complex issues it deals with.
  • 5. PEOPLE ARE BEING CHEATED AGAIN AND AGAIN! ONLINE SCAMS ID THEFT CREDIT CARD FRAUD Nearly 10% OF THE VICTIMS HAVE BEEN FRAUDED ON ALL THREE COUNTS: ONLINE SCAMS, ID THEFT AND CREDIT CARD FRAUD. It sounds almost incredulous that someone could be made a victim three times over. However, 10% of the victims have been duped on three occasions, if not more. That speaks volumes about the ingenuity of the online con artists and thieves. Cybercriminals go to great lengths to cheat consumers. They make their operations look legitimate, they frequently manipulate search engine results and run professional-looking websites in order to make fake brands seem authentic, using country-specific scripts for cold calls. They also use the latest technology and a deep understanding of the human pyche to fool victims, often more than once. Meghan Bach discovered last year that her husband’s identity had been stolen and a fake tax refund collected in his name; she spent nearly 200 hours to sort out the issue with the IRS and other agencies involved. She thought it was behind her until the family came back from vacation, only to realize that his identity had been stolen once again.
  • 6. EVERY SIXTH RESPONDENT HAS A FRIEND WHO IS A VICTIM At least 15% PEOPLE KNOW SOMEONE WHO HAS BEEN SUBJECTED TO SOME KIND OF FRAUD OR SCAM.. At one time, it used to be that we were only separated by six degrees of introduction from anyone on earth. Well, today, it seems that we’re also all separated probably by just six degrees of fraud! The number of online frauds being perpetrated is so high that it is no more an uncommon occurrence. Many respondents have victims in their circle of family and friends. It is increasingly cause for serious concern. Also, cases of mass data theft are on the rise - such as the Sony Play Station identity theft case or the LinkedIn hacked accounts or the recent credit card heist where nearly ten million Visa and Master card customers had their data stolen. Released by Javelin Strategy & Research, a study reports that in 2011, identity fraud increased by 13 percent. More than 11.6 million adults became a victim of identity fraud in the United States
  • 7. AMAZINGLY, ONE IN FIVE AMERICANS HAVE NO ONLINE SECURITY. 19.32% AMERICANS SURF THE NET WITHOUT PROTECTION! A recent study by McAfee puts the US in the bottom 5 protected countries. 19.32% of Americans surf the net without protection compared to the global average of 17%. One in six PCs have zero anti-virus protection. “Browsing the internet on an exposed computer not only increases the risk of identity theft and data loss, but it can contribute to the spread of harmful programs and nasty viruses,” the security firm states. Consumers naively believe that by sticking to safe sites, they will escape virus threats and cyber-theft and malicious content. The truth is that attacks are becoming increasingly sophisticated and these are rising at an alarming rate. In addition, mobile usage has led to the new upsurge of mobile malware, which is an immediate threat, considering the amount of personal data like credit card and financial information stored on mobile devices, and which can be easily accessed.
  • 8. MOST PEOPLE ARE IGNORANT ABOUT WHAT CONSTITUTES A SECURITY RISK ONLINE. 30% 30% FULL NAME DATE OF BIRTH DON’T GET WHY HACKERS WOULD FIND THIS VALUABLE DON’T SEE WHY REVEALING THEIR FULL NAME COULD CAUSE THEM HARM 11% BANK ACCOUNT NUMBER CREDIT CARD NUMBER 10% DON’T THINK THIS DON’T REGARD THIS AS A NOT- IS CRITICAL INFO TO-BE-DISCLOSED FACT 73% EMPLOYER’S NAME DESIGNATION 71% DON’T CONSIDER THIS DON’T AGREE THAT INFO AS PRIVATE THIS IS SENSITIVE INFO 40% ADDRESS DON’T SEE WHY THEIR ADDRESS SHOULD BE KEPT PRIVATE PERSONAL EMAIL ID 40% 5% DON’T THINK THIS IS SCARIEST OF ALL CRITICAL INFO ACTUALLY THINK NONE OF THIS IS SENSITIVE INFORMATION! Amazingly, many of us seem to be completely unaware of the sensitive information that we reveal and which could be used to steal our hard-earned money. Social media such Facebook, LinkedIn and Twitter are huge leaks of critical, personal data. A study released by Javelin Strategy & Research, stated that specifically, 68 percent of people with public social media profiles shared their birthday information (with 45 percent sharing month, date and year); 63 percent shared their high school name; 18 percent shared their phone number; and 12 percent shared their pet’s name The scary bit is that all these are prime examples of personal information that a company would use to verify your identity. Clearly, there are some of us who are willing to reveal personal data without realizing how dangerous it could be to our own online security; making them a delight for hackers, scamsters and fraudsters. They are a soft and easy target for alert cyber thieves, always on the lookout for such victims.
  • 9. METHODOLOGY This iYogi Insights research on Consumer Experience with Identity Theft and Cybercrime seeks to understand average consumer behaviour on cybercrime and identity theft. In this age of new-age technologies, social media and information sharing, does the average Joe or Jane understand what constitutes sensitive information and how he or she often may unknowingly increase their own vulnerability to hackers and cyber theft. The survey was conducted on iYogi subscribers through an online form following their support sessions. A total of 1970 respondents filled the online survey form consisting of 10 detailed questions on their understanding of online security, cybercrime, information sharing and related issues. The data collected was then collated, analyzed and compared to identify, assess and quantify trends and patterns. DISCLAIMER "Affiliation of any third party organization is not implied, unless expressly stated."