SlideShare a Scribd company logo
1 of 28
2013 NORTON REPORT
24 COUNTRIES
AUSTRALIA, BRAZIL, CANADA, CHINA, COLOMBIA, DENMARK,
FRANCE, GERMANY, INDIA, ITALY, JAPAN, MEXICO, NETHERLANDS,
NEW ZEALAND, POLAND, RUSSIA, SAUDI ARABIA, SINGAPORE,
SOUTH AFRICA, SWEDEN, TURKEY, UNITED ARAB EMIRATES,
UNITED KINGDOM, UNITED STATES OF AMERICA
13,022 ONLINE ADULTS AGED 18-64
2013 NORTON REPORT
WHO IS AFFECTED MOST BY CYBERCRIME?
CYBERCRIME VICTIMS MORE
LIKELY TO BE:
MALE – 64%
(COMPARED TO 58% OF FEMALES)
MILLENNIAL – 66%
(COMPARED TO 54% OF BABY BOOMERS)
AND:
• MOBILE DEVICE OWNERS – 63%
• SOCIAL NETWORK USERS – 63%
• PUBLIC / UNSECURED WI-FI USERS – 68%
• EMERGING MARKET – 68%
• PARENT OF CHILDREN 8-17 – 65%
HIGHEST NUMBER OF CYBERCRIME
VICTIMS FOUND IN:
85%
CHINA
77%
RUSSIA
73%
SOUTH AFRICA
ALL STATS REFER TO LIFETIME VICTIMSUSA 63%; CANADA 68%; UK 58%; FRANCE 45%; GERMANY 53%; ITALY 56%; SWEDEN 56%; POLAND 60%; NETHERLANDS 50%; AUSTRALIA 60%; INDIA 65%;
JAPAN 19%; SINGAPORE 61%; NEW ZEALAND 69%; TURKEY 63%; DENMARK 50%; SAUDI ARABIA 62%; UAE 71%, COLOMBIA 64%
TABLET AND SMARTPHONE CONSUMERS LEAVE SECURITY BEHIND
ALMOST 1/2 DON’T USE BASIC PRECAUTIONS SUCH AS PASSWORDS, SECURITY SOFTWARE
OR BACK UP FILES FOR THEIR MOBILE DEVICE
MORE THAN ONE-THIRD HAVE EXPERIENCED MOBILE CYBERCRIME LAST YEAR
THE GLOBAL PRICE TAG OF CONSUMER CYBERCRIME
US$113 BILLION ANNUALLY, COST PER CYBERCRIME VICTIM UP 50 PERCENT
THE SCALE OF CONSUMER CYBERCRIME
1 MILLION+ VICTIMS DAILY
CREATING PERFECT STORM AS LINES BLUR BETWEEN WORK/PLAY
49% USE THEIR PERSONAL DEVICE FOR WORK AND PLAY
AROUND ONE-IN-FIVE SHARE WORK RELATED INFORMATION WITH FRIENDS AND FAMILY
KEY THEMES
SMARTPHONE/TABLET CONSUMERS LEAVING SECURITY BEHIND
NEARLY 1/2 SMARTPHONE/TABLET USERS SLEEP WITH THEIR
PHONES WITHIN ARMS’ REACH
ONLY 26% OF SMARTPHONE USERS HAVE MOBILE
SECURITY SOFTWARE WITH ADVANCED PROTECTION
57%AREN’T AWARE
THAT SECURITY SOLUTIONS FOR MOBILE DEVICES EXIST *
NEARLY 1/2 DON’T USE BASIC PRECAUTIONS SUCH AS
PASSWORDS, SECURITY SOFTWARE OR BACK UP FILES FOR THEIR
MOBILE DEVICE *
*AMONG MOBILE DEVICE USERS
CONSUMERS’ SECURITY IQ – HIGH ON PC, LOW ON MOBILE
72%90% 78%
GOOD JOB!
56% 48%33%
NEEDS
WORK!
VS. VS. VS.
VS. VS. VS.
60% 42% 53%
DELETE SUSPICIOUS
EMAILS FROM PEOPLE
THEY DON’T KNOW
HAVE AT LEAST A BASIC
FREE ANTIVIRUS SOLUTION
AVOID STORING SENSITIVE
FILES ONLINE
NEEDS
WORK!
27% OF ADULTS
HAVE LOST THEIR MOBILE DEVICE OR HAD IT STOLEN
MOBILE CYBERCRIME AND LOSS
38%HAVE EXPERIENCED MOBILE CYBERCRIME
IN PAST 12 MONTHS *
*AMONG SMARTPHONE USERS
$113 BN
FRAUD 38%
THEFT OR LOSS
21%
REPAIRS 24%
OTHER 17%
83% OF DIRECT FINANCIAL COSTS
ARE A RESULT OF FRAUD,
REPAIRS, THEFT AND LOSS
USD $298
AVERAGE COST PER VICTIM
THE GLOBAL PRICE TAG OF CONSUMER CYBERCRIME
ALL AMOUNTS IN USD
SEE EXTRAPOLATION CALCULATIONS *
REPRESENTS A 50 PERCENT INCREASE OVER 2012
ENOUGH TO HOST THE 2012 LONDON
OLYMPICS NEARLY 10 TIMES OVER
1
ALL AMOUNTS IN USD ROUNDED TO THE NEAREST BILLION
38
USA
BN
3 MEXICO
BN
8 BRAZIL
BN
13EUROPE
BN
1 RUSSIA
BN
37 CHINA
BN
4INDIA
BN 1 JAPAN
BN
AUSTRALIA
BN
THE GLOBAL PRICE TAG OF CONSUMER CYBERCRIME
0.3
SOUTH AFRICA
BN
CANADA 3 BN; SINGAPORE 1 BN; NEW ZEALAND 0.1 BN; TURKEY 2 BN; SAUDI ARABIA 0.5 BN; UAE 0.3 BN; COLOMBIA 0.5 BN
12VICTIMS PER SECOND
THE SCALE OF CONSUMER CYBERCRIME
378 MILLION VICTIMS PER YEAR
1 MILLION +
VICTIMS PER DAY
SEE EXTRAPOLATION CALCULATIONS *
NO
1
NEARLY 2.8 TIMES AS MANY BABIES BORN EACH YEAR
ENOUGH TO FILL WEMBLEY STADIUM (ENGLAND) MORE THAN 10 TIMES
THE SCALE OF CONSUMER CYBERCRIME
50% OF ONLINE ADULTS
HAVE BEEN VICTIMS OF CYBERCRIME AND / OR NEGATIVE
ONLINE SITUATIONS IN THE PAST YEAR
(e.g., RECEIVED NUDE IMAGES FROM STRANGERS OR WERE
BULLIED OR STALKED ONLINE)
41% OF ONLINE ADULTS
HAVE FALLEN VICTIM TO ATTACKS SUCH AS
MALWARE, VIRUSES, HACKING, SCAMS, FRAUD AND THEFT
BLURRING BETWEEN WORK AND PLAY
49% USE THEIR PERSONAL DEVICE FOR WORK AND PLAY*
30% OF PARENTS LET THEIR KIDS PLAY, DOWNLOAD AND SHOP ON
THEIR WORK DEVICE **
36% SAY THEIR COMPANY HAS NO POLICY ON USE OF
PERSONAL DEVICES FOR WORK*
*AMONG WORKING ADULTS
49%
OF RESPONDENTS ACCESS
OR SEND PERSONAL EMAILS
THROUGH THEIR WORK
DEVICE*
34%
ACCESS THEIR SOCIAL
NETWORK THROUGH
THEIR WORK DEVICE*
27%
STORE PERSONAL
INFORMATION ON THEIR
WORK DEVICE*
**AMONG PARENTS WHO USE DEVICES PROVIDED BY THEIR EMPLOYER
ONLINE FILE STORAGE OPENS DOOR TO OVERSHARING
18% SHARE WITH FRIENDS
24% OF USERS SAVE BOTH WORK AND PERSONAL
DOCUMENTS TO THE SAME ONLINE FILE STORAGE ACCOUNT
PUTTING BOTH WORK AND
PERSONAL DOCUMENTS AT
RISK
21% SHARE WITH FAMILY
ON SHARING WORK-RELATED INFORMATION THROUGH ONLINE FILE
STORAGE SITES:
1/4
OF SOCIAL MEDIA USERS
SHARE THEIR SOCIAL
MEDIA PASSWORDS WITH
OTHERS
RISKY BEHAVIOR ON SOCIAL MEDIA
39%
OF SOCIAL MEDIA USERS
DON’T LOG OUT AFTER
EACH SESSION
31%
OF SOCIAL MEDIA USERS
CONNECT WITH PEOPLE
THEY DO NOT KNOW
LOG OUT
****
12%OF SOCIAL MEDIA USERS SAY SOMEONE HAS HACKED INTO
THEIR SOCIAL NETWORK ACCOUNT AND PRETENDED TO BE THEM
?
? ?
MOBILE AND SOCIAL STRESSORS
1/4
OF MOBILE DEVICE USERS
CHECK THEIR MOBILES
WHILE SHARING A MEAL
WITH OTHERS
6/10OF MOBILE DEVICE USERS
GET ANNOYED BY OTHERS
CHECKING THEIR MOBILES
DURING A MEAL
49%
OF MOBILE DEVICE USERS WOULD
FEEL UPSET/CONCERNED IF THEY
LEFT HOME WITHOUT THEIR
MOBILE DEVICE
25%
OF SOCIAL NETWORK USERS CHECK
THEIR SOCIAL NETWORK WITHIN
15 MINUTES OF WAKING UP
CONSUMERS PICK CONVENIENCE OVER SAFETY
46%
WISH THEY COULD
PERMANENTLY DELETE SOME
OF THEIR PERSONAL ONLINE
CONTENT COMPLETELY
7/10
DON’T PUT ANYTHING ON
SOCIAL NETWORKS THAT THEY
WOULDN’T WANT THEIR
PARENTS / KIDS TO SEE
62%
AGREE THERE IS NO SUCH
THING AS ‘ONLINE PRI ACY’ IN
TODAY’S WORLD
1/3
ADMIT THE CONVENIENCE OF
CONSTANTLY CONNECTED
OUTWEIGHED ANY POTENTIAL
SECURITY RISKS
EVEN THOUGH…
CONCLUSION
$113 BILLION
TOTAL DIRECT GLOBAL COSTS
IN JUST 12 MONTHS
50% OF ONLINE ADULTS HAVE
BEEN VICTIMS OF CYBERCRIME AND
/ OR NEGATIVE ONLINE SITUATIONS
IN THE PAST YEAR
1M+ ADULTS BECOME CYBERCRIME VICTIMS EVERY DAY -
THAT’S 12 VICTIMS PER SECOND
CONSUMERS MOVE TO MOBILE DEVICES
BUT LEAVE PROTECTION BEHIND
CONSUMERS ARE INCREASINGLY USING MOBILE DEVICES AND
TABLET DEVICES BUT ARE NOT PROTECTING THEMSELVES.
WHILE DESKTOP PROTECTION IS HIGH AMONG
CONSUMERS, THE CYBERCRIMINAL IS MOVING TO MOBILE
AND TABLET DEVICES WHERE CONSUMERS ARE VULNERABLE.
MOBILE DEVICE ADOPTION CONTINUES TO
GROW, SUGGESTING A DEGREE OF MOBILE
DEPENDENCE, WHICH WILL INCREASE OPPORTUNITIES FOR
CYBERCRIMINALS TO STRIKE.
BLURRING BETWEEN WORK AND
PERSONAL MOBILE DEVICE USAGE
AS PERSONAL MOBILE DEVICES ARE BEING USED MORE AND
MORE FOR WORK-RELATED ACTIVITIES, CONSUMERS’
LIFESTYLES ARE PUTTING BUSINESS ENVIRONMENTS AT RISK.
AN ALARMING NUMBER OF BUSINESSES HAVE NO POLICIES IN
PLACE. FOR THOSE WHO DO, OUR RESEARCH SUGGESTS THE
POLICIES ARE OFTEN NOT RESPECTED BY THEIR EMPLOYEES.
CONSUMERS PICK CONVENIENCE OVER
SAFETY
MANY CONSUMERS ARE MAKING A CONSCIOUS DECISION TO
TRADE THEIR SAFETY FOR CONVENIENCE; MANY MORE ARE
UNAWARE THAT THEY’RE MAKING THE SAME TRADE.
BUT, “CONSTANTLY CONNECTED” DOESN’T HAVE TO EQUAL
“CONSTANTLY AT RISK” ALL AMOUNTS IN USD
DEFEND YOUR DATA
A COMPREHENSIVE SECURITY SUITE PROVIDES A STRONG DEFENSE AGAINST ONLINE THREATS.
NORTON 360 MULTI-DEVICE OFFERS PROTECTION FOR PCS, SMARTPHONES AND TABLETS, IN A SINGLE
SOLUTION
THINK OF MOBILE DEVICES AS MINI-COMPUTERS
MOBILE IS THE FASTEST-GROWING TARGET FOR CYBERCRIMINALS. MAKE SURE YOUR MOBILE DEVICE
REQUIRES A PASSWORD, AND TAKE PRECAUTIONS TO ENSURE YOUR DEVICE IS PROTECTED AGAINST
THEFT, LOSS AND CYBERCRIME
BE CAUTIOUS IN THE CLOUD
WHILE CLOUD STORAGE SOLUTIONS MAKE IT EASY TO SAVE AND SHARE FILES, THEY ALSO OPEN
OTHER AVENUES FOR ATTACK. BE CAREFUL ABOUT WHO HAS ACCESS TO YOUR FILES, AND USE A
SOLUTION WITH BUILT-IN SECURITY IF POSSIBLE
SAVE SENSITIVE TRANSACTIONS FOR SECURE CONNECTIONS
FREE OR UNSECURED WI-FI NETWORKS CAN MAKE IT EASY FOR THIEVES TO EAVESDROP ON YOUR
ACTIVITY. AVOID DOING ANY SENSITIVE TRANSACTIONS LIKE BANKING OR SHOPPING WHILE
CONNECTED TO THESE NETWORKS, OR USE A PERSONAL VPN CLIENT
AFTER YOU CONNECT, DOUBLE CHECK
CHECK CREDIT CARD AND BANK STATEMENTS REGULARLY FOR FRAUDULENT TRANSACTIONS, AND
REPORT ANY SUSPICIOUS ACTIVITY TO YOUR PROVIDER AND/OR LAW ENFORCEMENT
TOP TIPS
go.symantec.com/norton-report-2013
THANK YOU
ADDITIONAL FINDINGS
54% ACCESS
PERSONAL E-MAIL
56%ACCESS
THEIR SOCIAL
NETWORK ACCOUNT
29% SHOP ONLINE29% ACCESS
THEIR BANK ACCOUNT
POTENTIALLY RISKY BEHAVIOR ON UNSECURED WI-FI
*AMONG FREE/UNSECUREDWI-FI USERS
39% DO NOT TAKE
ANY SPECIAL STEPS TO
PROTECT THEMSELVES
WHEN USING PUBLIC WI-FI
3/10 DO NOT
ALWAYS LOG OFF AFTER
HAVING USED A PUBLIC
WI-FI CONNECTION
NEEDS
WORK!
BLURRING LINES BETWEEN FRIENDS AND ENEMIES
*AMONG THOSE WHO HAVE ACCESSED PARTNER/FRIEND'S EMAIL/ SOCIAL MEDIA
1/10 HA E ACCESSED THEIR PARTNER/FRIEND’S ACCOUNTS WITHOUT
PERMISSION
41%
DID IT BECAUSE THEY
WERE CURIOUS*
26%
WERE GOOFING AROUND
/ PLAYING A JOKE*
18%
DIDN’T TRUST THEIR
PARTNER / FRIEND TO BE
HONEST ON THEIR OWN*
METHODOLOGY
THE METHODOLOGY DETAIL
EDELMAN BERLAND CONDUCTED AN
ONLINE SURVEY AMONG CONSUMERS:
13,022 ADULTS AGED 18-64 YEARS
The survey was conducted in 24 countries (Australia, Brazil,
Canada, China, Colombia, France, Denmark, Germany, India,
Italy, Japan, Mexico, Netherlands, New Zealand, Poland,
Russia, Saudi Arabia, Singapore, South Africa, Sweden, Turkey,
United Arab Emirates, United Kingdom and United States).
The survey was conducted in the primary language of each
country, and questions asked were identical across all
countries.
Interviews were conducted between 4th July 2013
– 1st August 2013.
The margin of error for the total sample of adults (n=13,022)
is + 0.9% at the 95% level of confidence.
Important notes:
The Norton Cybercrime Report is an annual report
commissioned by Norton by Symantec aimed at
understanding how cybercrime affects consumers and how
the adoption and evolution of new technologies impacts
consumers’ security. The research was conducted by
Edelman Berland, an international research agency. Findings
are based on self-reported experiences of over 13,000 adults
across 24 countries.
1000 adult respondents were interviewed in each of USA and
India. The global data has been weighted to ensure all
countries have equal representation of n=500 adults.
Additional notes:
Developed Markets: USA, Canada, UK, France, Germany,
Italy, Sweden, Netherlands, Australia, Japan, Singapore, New
Zealand, Denmark
Emerging Markets: Brazil, Mexico, Poland, India, China,
Russia, Turkey, Saudi Arabia, UAE, Colombia, South Africa
Millennials: aged 18-34
Boomers: aged 45-64
DEFINITION OF CYBERCRIME
Cybercrime is defined as any of the following activities:
• Computer viruses or malicious software appeared on my computer
• I responded to a forged, ‘spoofed’ or fake email or website which captured my personal details such as passwords, credit card
numbers, or bank account information thinking it was a legitimate request in order to access information or provide information to a
legitimate organization, such as my bank, etc.
• Someone has hacked into my email account and pretended to be me
• Someone has hacked into my social networking profile and pretended to be me
• I responded to an online scam
• I experienced online credit card fraud
• I experienced identity theft
• My phone was infected and a text message was sent from my mobile phone without my permission or knowledge that I later had to
pay for
• My screen was locked and an alert was shown, which told me to pay a fine to get it unlocked
• My smartphone was lost or stolen and someone found it and used it without my permission
• An app appeared on my smartphone that I didn’t download
• I’ve had someone purporting to be from a computer company call me to inform that I have an infected computer
• I experienced another type of cybercrime on my cell / mobile phone / tablet device
• I experienced another type of cybercrime on my desktop or laptop computer
DEFINITION OF CYBERCRIME
Cybercrime and /or negative online experience is defined as any
of the following activities:
• Computer viruses or malicious software appeared on my computer
• I responded to a forged, ‘spoofed’ or fake email or website which captured my personal details such as passwords, credit card
numbers, or bank account information thinking it was a legitimate request in order to access information or provide information to a
legitimate organization, such as my bank, etc.
• Someone has hacked into my email account and pretended to be me
• Someone has hacked into my social networking profile and pretended to be me
• I responded to an online scam
• I experienced online credit card fraud
• I experienced identity theft
• My phone was infected and a text message was sent from my mobile phone without my permission or knowledge that I later had to
pay for
• My screen was locked and an alert was shown, which told me to pay a fine to get it unlocked
• My smartphone was lost or stolen and someone found it and used it without my permission
• An app appeared on my smartphone that I didn’t download
• I’ve had someone purporting to be from a computer company call me to inform that I have an infected computer
• I experienced another type of cybercrime on my cell / mobile phone / tablet device
• I experienced another type of cybercrime on my desktop or laptop computer
• I experienced someone posting private/intimate photos or videos of me without my permission
• I was approached online by someone in an unwanted sexual way
• I have experienced online bullying, online stalking, online hate crime or other forms of online harassment
• I have received SMS text messages from people I do not know, requesting me to click on an embedded link or stating that I have
received a voicemail and need to dial a number which is not my voicemail to retrieve it
• I have received unwanted nude images of someone I don’t know
• I have received unwanted nude images of someone I do know
EXTRAPOLATIONS CALCULATIONS
1) Nearly 380 million victims in 24 countries over
past 12 months
Online adults per country x % cybercrime victims
past 12 months per country = 377,943,431 (sum of
24 countries).
2) 12 cybercrime victims every second / 719
cybercrime victims every minute / 43,144 per hour
/ more than 1 million per day impacting almost 378
million adults in the past year in 24 countries*
Victims over past 12 months (as above) 377,943,431
/ 365 days per year / 24 hours / 60 minutes / 60
seconds
3) Cybercrime is big business costing $113 billion in
the last year in 24 countries
Victims over past 12 months (per country) x average
financial cost of cybercrime (per country in US
currency). Figure shown in the sum of all countries
total cost.

More Related Content

What's hot

Vietnam internet user’s behaviour 2016
Vietnam internet user’s behaviour 2016Vietnam internet user’s behaviour 2016
Vietnam internet user’s behaviour 2016Xuân Lan Nguyễn
 
Vietnam Mobile Apps Report Q3 2015
Vietnam Mobile Apps Report Q3 2015Vietnam Mobile Apps Report Q3 2015
Vietnam Mobile Apps Report Q3 2015Appota Group
 
Vietnam Digital Landscape Q3/2015 by Moore Corporation
Vietnam Digital Landscape Q3/2015 by Moore CorporationVietnam Digital Landscape Q3/2015 by Moore Corporation
Vietnam Digital Landscape Q3/2015 by Moore CorporationMoore Corporation
 
2017 Nigerian Mobile Trend Report
2017 Nigerian Mobile Trend Report2017 Nigerian Mobile Trend Report
2017 Nigerian Mobile Trend ReportTerragon Group
 
Internet Safety: Social, Mobile, Messy
Internet Safety: Social, Mobile, MessyInternet Safety: Social, Mobile, Messy
Internet Safety: Social, Mobile, MessyMarian Merritt
 
Tns VN mobi life and digital life 2012
Tns VN mobi life and digital life 2012Tns VN mobi life and digital life 2012
Tns VN mobi life and digital life 2012Tuan Le
 
GroupM - Vietnam digital landscape 09/2013
GroupM - Vietnam digital landscape  09/2013GroupM - Vietnam digital landscape  09/2013
GroupM - Vietnam digital landscape 09/2013★ Duong Vo ★
 
Vietnam Digital Landscape 2015
Vietnam Digital Landscape 2015Vietnam Digital Landscape 2015
Vietnam Digital Landscape 2015Dung Tri
 
Just-in-time Information through Mobile Connections
Just-in-time Information through Mobile Connections Just-in-time Information through Mobile Connections
Just-in-time Information through Mobile Connections Path of the Blue Eye Project
 
Dominican Republic ICT stats - October 2015
Dominican Republic ICT stats -  October 2015Dominican Republic ICT stats -  October 2015
Dominican Republic ICT stats - October 2015Mite Nishio
 
Internet, sociální sítě, mobilní platformy - nové trendy
Internet, sociální sítě, mobilní platformy - nové trendyInternet, sociální sítě, mobilní platformy - nové trendy
Internet, sociální sítě, mobilní platformy - nové trendyPetr Krkavec
 
Dominican ICT Stats - August 2013
Dominican ICT Stats - August 2013Dominican ICT Stats - August 2013
Dominican ICT Stats - August 2013Mite Nishio
 
Dominican Republic ICT stats - January 2014
Dominican Republic ICT stats - January 2014Dominican Republic ICT stats - January 2014
Dominican Republic ICT stats - January 2014Mite Nishio
 
Dominican ICT stats oct 2012
Dominican ICT stats   oct 2012Dominican ICT stats   oct 2012
Dominican ICT stats oct 2012Mite Nishio
 
Indonesia market overview 2015
Indonesia market overview 2015Indonesia market overview 2015
Indonesia market overview 2015Ho Ngoc Hieu
 

What's hot (19)

Vietnam internet user’s behaviour 2016
Vietnam internet user’s behaviour 2016Vietnam internet user’s behaviour 2016
Vietnam internet user’s behaviour 2016
 
Vietnam Mobile Apps Report Q3 2015
Vietnam Mobile Apps Report Q3 2015Vietnam Mobile Apps Report Q3 2015
Vietnam Mobile Apps Report Q3 2015
 
Vietnam Digital Landscape Q3/2015 by Moore Corporation
Vietnam Digital Landscape Q3/2015 by Moore CorporationVietnam Digital Landscape Q3/2015 by Moore Corporation
Vietnam Digital Landscape Q3/2015 by Moore Corporation
 
2017 Nigerian Mobile Trend Report
2017 Nigerian Mobile Trend Report2017 Nigerian Mobile Trend Report
2017 Nigerian Mobile Trend Report
 
Internet Safety: Social, Mobile, Messy
Internet Safety: Social, Mobile, MessyInternet Safety: Social, Mobile, Messy
Internet Safety: Social, Mobile, Messy
 
Pew Research Center: Cell Internet Use 2012
Pew Research Center: Cell Internet Use 2012Pew Research Center: Cell Internet Use 2012
Pew Research Center: Cell Internet Use 2012
 
Tns VN mobi life and digital life 2012
Tns VN mobi life and digital life 2012Tns VN mobi life and digital life 2012
Tns VN mobi life and digital life 2012
 
GroupM - Vietnam digital landscape 09/2013
GroupM - Vietnam digital landscape  09/2013GroupM - Vietnam digital landscape  09/2013
GroupM - Vietnam digital landscape 09/2013
 
Vietnam Digital Landscape 2015
Vietnam Digital Landscape 2015Vietnam Digital Landscape 2015
Vietnam Digital Landscape 2015
 
Just-in-time Information through Mobile Connections
Just-in-time Information through Mobile Connections Just-in-time Information through Mobile Connections
Just-in-time Information through Mobile Connections
 
Dominican Republic ICT stats - October 2015
Dominican Republic ICT stats -  October 2015Dominican Republic ICT stats -  October 2015
Dominican Republic ICT stats - October 2015
 
Internet, sociální sítě, mobilní platformy - nové trendy
Internet, sociální sítě, mobilní platformy - nové trendyInternet, sociální sítě, mobilní platformy - nové trendy
Internet, sociální sítě, mobilní platformy - nové trendy
 
Dominican ICT Stats - August 2013
Dominican ICT Stats - August 2013Dominican ICT Stats - August 2013
Dominican ICT Stats - August 2013
 
Dominican Republic ICT stats - January 2014
Dominican Republic ICT stats - January 2014Dominican Republic ICT stats - January 2014
Dominican Republic ICT stats - January 2014
 
Dominican ICT stats oct 2012
Dominican ICT stats   oct 2012Dominican ICT stats   oct 2012
Dominican ICT stats oct 2012
 
Mobile instant messaging survey 2017
Mobile instant messaging survey 2017Mobile instant messaging survey 2017
Mobile instant messaging survey 2017
 
Indonesia market overview 2015
Indonesia market overview 2015Indonesia market overview 2015
Indonesia market overview 2015
 
10 Incredible BYOD Facts
10 Incredible BYOD Facts10 Incredible BYOD Facts
10 Incredible BYOD Facts
 
test
testtest
test
 

Viewers also liked

Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime pptMOE515253
 
The evolution of computer viruses
The evolution of computer virusesThe evolution of computer viruses
The evolution of computer virusesbrya2rexmc
 
Innovate Finance Post-Brexit Member Survey
Innovate Finance Post-Brexit Member SurveyInnovate Finance Post-Brexit Member Survey
Innovate Finance Post-Brexit Member SurveyInnovate Finance
 
Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)Anshuman Tripathi
 
Cybercrime Threat Landscape: Cyber Criminals Never Sleep
Cybercrime Threat Landscape: Cyber Criminals Never SleepCybercrime Threat Landscape: Cyber Criminals Never Sleep
Cybercrime Threat Landscape: Cyber Criminals Never SleepIBM Security
 
The 2015 U.S. Mobile App Report by ComScore
The 2015 U.S. Mobile App Report by ComScoreThe 2015 U.S. Mobile App Report by ComScore
The 2015 U.S. Mobile App Report by ComScoreVictor Kong
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime pptBushra22
 
Activate Tech and Media Outlook 2017
Activate Tech and Media Outlook 2017Activate Tech and Media Outlook 2017
Activate Tech and Media Outlook 2017Activate
 
Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentationBijay Bhandari
 

Viewers also liked (20)

CYBER CRIME AND SECURITY
CYBER CRIME AND SECURITYCYBER CRIME AND SECURITY
CYBER CRIME AND SECURITY
 
Cyber-crime PPT
Cyber-crime PPTCyber-crime PPT
Cyber-crime PPT
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
The evolution of computer viruses
The evolution of computer virusesThe evolution of computer viruses
The evolution of computer viruses
 
Como funcionam as ameaças da internet e o cybercrime
Como funcionam as ameaças da internet e o cybercrimeComo funcionam as ameaças da internet e o cybercrime
Como funcionam as ameaças da internet e o cybercrime
 
Innovate Finance Post-Brexit Member Survey
Innovate Finance Post-Brexit Member SurveyInnovate Finance Post-Brexit Member Survey
Innovate Finance Post-Brexit Member Survey
 
Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)
 
Cybercrime Threat Landscape: Cyber Criminals Never Sleep
Cybercrime Threat Landscape: Cyber Criminals Never SleepCybercrime Threat Landscape: Cyber Criminals Never Sleep
Cybercrime Threat Landscape: Cyber Criminals Never Sleep
 
Cybercrime - Attack of the Cyber Spies
Cybercrime - Attack of the Cyber SpiesCybercrime - Attack of the Cyber Spies
Cybercrime - Attack of the Cyber Spies
 
The 2015 U.S. Mobile App Report by ComScore
The 2015 U.S. Mobile App Report by ComScoreThe 2015 U.S. Mobile App Report by ComScore
The 2015 U.S. Mobile App Report by ComScore
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Infinite Dial 2016
Infinite Dial 2016Infinite Dial 2016
Infinite Dial 2016
 
Digital in 2017: Central America
Digital in 2017: Central AmericaDigital in 2017: Central America
Digital in 2017: Central America
 
Digital in 2017: Western Europe
Digital in 2017: Western EuropeDigital in 2017: Western Europe
Digital in 2017: Western Europe
 
Digital in 2017: South America
Digital in 2017: South AmericaDigital in 2017: South America
Digital in 2017: South America
 
Activate Tech and Media Outlook 2017
Activate Tech and Media Outlook 2017Activate Tech and Media Outlook 2017
Activate Tech and Media Outlook 2017
 
Digital in 2017: Northern America
Digital in 2017: Northern AmericaDigital in 2017: Northern America
Digital in 2017: Northern America
 
Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentation
 
Digital in 2017: The Caribbean
Digital in 2017: The CaribbeanDigital in 2017: The Caribbean
Digital in 2017: The Caribbean
 

Similar to 2013 Norton Report Reveals Global Scale of Cybercrime

Awareness about cybercrime among youth
Awareness about cybercrime among youthAwareness about cybercrime among youth
Awareness about cybercrime among youthnirmal00776
 
Ericsson ConsumerLab: Privacy, security and safety online
Ericsson ConsumerLab: Privacy, security and safety onlineEricsson ConsumerLab: Privacy, security and safety online
Ericsson ConsumerLab: Privacy, security and safety onlineEricsson
 
Norton Cyber Security Insights Report 2017
Norton Cyber Security Insights Report 2017Norton Cyber Security Insights Report 2017
Norton Cyber Security Insights Report 2017CheapSSLsecurity
 
Security Risks of Uneducated Employees
Security Risks of Uneducated EmployeesSecurity Risks of Uneducated Employees
Security Risks of Uneducated EmployeesOriginIT
 
Why Your Mobile Device Isn’t As Secure As You Think
Why Your Mobile Device Isn’t As Secure As You ThinkWhy Your Mobile Device Isn’t As Secure As You Think
Why Your Mobile Device Isn’t As Secure As You ThinkBlue Coat
 
10 Hot Consumer Trends 2014 by Ericcson
10 Hot Consumer Trends 2014 by Ericcson10 Hot Consumer Trends 2014 by Ericcson
10 Hot Consumer Trends 2014 by Ericcsonelcontact.com
 
Consumer Mobile Policy & Security - Lightspeed & Kantar
Consumer Mobile Policy & Security - Lightspeed & KantarConsumer Mobile Policy & Security - Lightspeed & Kantar
Consumer Mobile Policy & Security - Lightspeed & KantarMerlien Institute
 
Mobile Cybercrime - Don’t Leave Your Customers Vulnerable
Mobile Cybercrime - Don’t Leave Your Customers VulnerableMobile Cybercrime - Don’t Leave Your Customers Vulnerable
Mobile Cybercrime - Don’t Leave Your Customers VulnerableXura
 
TeleSign Consumer Account Security Report 2015 FINAL
TeleSign Consumer Account Security Report 2015 FINALTeleSign Consumer Account Security Report 2015 FINAL
TeleSign Consumer Account Security Report 2015 FINALPeggy Lawless
 
How consumers use technology and its impact on their lives.
How consumers use technology and its impact on their lives.How consumers use technology and its impact on their lives.
How consumers use technology and its impact on their lives.robertpresz7
 
Juniper Trusted Mobility Index 2012
Juniper Trusted Mobility Index 2012Juniper Trusted Mobility Index 2012
Juniper Trusted Mobility Index 2012Juniper Networks
 
Mobile infographic 2015_english
Mobile infographic 2015_englishMobile infographic 2015_english
Mobile infographic 2015_englisheasysolmaria
 
Norton Mobile Apps Survey Report
Norton Mobile Apps Survey ReportNorton Mobile Apps Survey Report
Norton Mobile Apps Survey ReportSymantec
 
La Tecnología Digital en México en 2018
La Tecnología Digital en México en 2018La Tecnología Digital en México en 2018
La Tecnología Digital en México en 2018We Are Social
 
Experian Cybersecurity Survey
Experian Cybersecurity Survey Experian Cybersecurity Survey
Experian Cybersecurity Survey Experian_US
 

Similar to 2013 Norton Report Reveals Global Scale of Cybercrime (20)

Norton Cyber Crime Report 2013
Norton Cyber Crime Report 2013Norton Cyber Crime Report 2013
Norton Cyber Crime Report 2013
 
Awareness about cybercrime among youth
Awareness about cybercrime among youthAwareness about cybercrime among youth
Awareness about cybercrime among youth
 
Ericsson ConsumerLab: Privacy, security and safety online
Ericsson ConsumerLab: Privacy, security and safety onlineEricsson ConsumerLab: Privacy, security and safety online
Ericsson ConsumerLab: Privacy, security and safety online
 
Norton Cyber Security Insights Report 2017
Norton Cyber Security Insights Report 2017Norton Cyber Security Insights Report 2017
Norton Cyber Security Insights Report 2017
 
Security Risks of Uneducated Employees
Security Risks of Uneducated EmployeesSecurity Risks of Uneducated Employees
Security Risks of Uneducated Employees
 
Why Your Mobile Device Isn’t As Secure As You Think
Why Your Mobile Device Isn’t As Secure As You ThinkWhy Your Mobile Device Isn’t As Secure As You Think
Why Your Mobile Device Isn’t As Secure As You Think
 
10 Hot Consumer Trends 2014 by Ericcson
10 Hot Consumer Trends 2014 by Ericcson10 Hot Consumer Trends 2014 by Ericcson
10 Hot Consumer Trends 2014 by Ericcson
 
Consumer Mobile Policy & Security - Lightspeed & Kantar
Consumer Mobile Policy & Security - Lightspeed & KantarConsumer Mobile Policy & Security - Lightspeed & Kantar
Consumer Mobile Policy & Security - Lightspeed & Kantar
 
Mobile Cybercrime - Don’t Leave Your Customers Vulnerable
Mobile Cybercrime - Don’t Leave Your Customers VulnerableMobile Cybercrime - Don’t Leave Your Customers Vulnerable
Mobile Cybercrime - Don’t Leave Your Customers Vulnerable
 
Liberation from Location: El Salvador
Liberation from Location: El SalvadorLiberation from Location: El Salvador
Liberation from Location: El Salvador
 
TeleSign Consumer Account Security Report 2015 FINAL
TeleSign Consumer Account Security Report 2015 FINALTeleSign Consumer Account Security Report 2015 FINAL
TeleSign Consumer Account Security Report 2015 FINAL
 
How consumers use technology and its impact on their lives.
How consumers use technology and its impact on their lives.How consumers use technology and its impact on their lives.
How consumers use technology and its impact on their lives.
 
Juniper Trusted Mobility Index 2012
Juniper Trusted Mobility Index 2012Juniper Trusted Mobility Index 2012
Juniper Trusted Mobility Index 2012
 
Bilal Al Mourad - Ipsos - ICT Kuwait 2015 - MASHUP MENA Conference
Bilal Al Mourad  - Ipsos -  ICT Kuwait 2015 - MASHUP MENA Conference Bilal Al Mourad  - Ipsos -  ICT Kuwait 2015 - MASHUP MENA Conference
Bilal Al Mourad - Ipsos - ICT Kuwait 2015 - MASHUP MENA Conference
 
Not logging on, but living on
Not logging on, but living onNot logging on, but living on
Not logging on, but living on
 
Read, like & shares
Read, like & sharesRead, like & shares
Read, like & shares
 
Mobile infographic 2015_english
Mobile infographic 2015_englishMobile infographic 2015_english
Mobile infographic 2015_english
 
Norton Mobile Apps Survey Report
Norton Mobile Apps Survey ReportNorton Mobile Apps Survey Report
Norton Mobile Apps Survey Report
 
La Tecnología Digital en México en 2018
La Tecnología Digital en México en 2018La Tecnología Digital en México en 2018
La Tecnología Digital en México en 2018
 
Experian Cybersecurity Survey
Experian Cybersecurity Survey Experian Cybersecurity Survey
Experian Cybersecurity Survey
 

More from Marian Merritt

Building Trust in the Digital Age
Building Trust in the Digital AgeBuilding Trust in the Digital Age
Building Trust in the Digital AgeMarian Merritt
 
Cyberbullying by Marian Merritt, Norton Internet Safety Advocate
Cyberbullying by Marian Merritt, Norton Internet Safety AdvocateCyberbullying by Marian Merritt, Norton Internet Safety Advocate
Cyberbullying by Marian Merritt, Norton Internet Safety AdvocateMarian Merritt
 
Family Online Safety: Truth and Consequences
Family Online Safety: Truth and ConsequencesFamily Online Safety: Truth and Consequences
Family Online Safety: Truth and ConsequencesMarian Merritt
 
Internet Security: Protect the Personal; Defend the Workplace
Internet Security: Protect the Personal; Defend the WorkplaceInternet Security: Protect the Personal; Defend the Workplace
Internet Security: Protect the Personal; Defend the WorkplaceMarian Merritt
 
Let me in! 10 tips to better passwords
Let me in! 10 tips to better passwordsLet me in! 10 tips to better passwords
Let me in! 10 tips to better passwordsMarian Merritt
 
12 tips for cell phone safety for kids
12 tips for cell phone safety for kids12 tips for cell phone safety for kids
12 tips for cell phone safety for kidsMarian Merritt
 
8th grade presentation for slideshare
8th grade presentation for slideshare8th grade presentation for slideshare
8th grade presentation for slideshareMarian Merritt
 
Internet Safety Presentation for Parents
Internet Safety Presentation for ParentsInternet Safety Presentation for Parents
Internet Safety Presentation for ParentsMarian Merritt
 

More from Marian Merritt (9)

Building Trust in the Digital Age
Building Trust in the Digital AgeBuilding Trust in the Digital Age
Building Trust in the Digital Age
 
Cyberbullying by Marian Merritt, Norton Internet Safety Advocate
Cyberbullying by Marian Merritt, Norton Internet Safety AdvocateCyberbullying by Marian Merritt, Norton Internet Safety Advocate
Cyberbullying by Marian Merritt, Norton Internet Safety Advocate
 
Family Online Safety: Truth and Consequences
Family Online Safety: Truth and ConsequencesFamily Online Safety: Truth and Consequences
Family Online Safety: Truth and Consequences
 
Internet Security: Protect the Personal; Defend the Workplace
Internet Security: Protect the Personal; Defend the WorkplaceInternet Security: Protect the Personal; Defend the Workplace
Internet Security: Protect the Personal; Defend the Workplace
 
Let me in! 10 tips to better passwords
Let me in! 10 tips to better passwordsLet me in! 10 tips to better passwords
Let me in! 10 tips to better passwords
 
12 tips for cell phone safety for kids
12 tips for cell phone safety for kids12 tips for cell phone safety for kids
12 tips for cell phone safety for kids
 
8th grade presentation for slideshare
8th grade presentation for slideshare8th grade presentation for slideshare
8th grade presentation for slideshare
 
Internet Safety Presentation for Parents
Internet Safety Presentation for ParentsInternet Safety Presentation for Parents
Internet Safety Presentation for Parents
 
School presentation
School presentationSchool presentation
School presentation
 

Recently uploaded

Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rick Flair
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 

Recently uploaded (20)

Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 

2013 Norton Report Reveals Global Scale of Cybercrime

  • 2. 24 COUNTRIES AUSTRALIA, BRAZIL, CANADA, CHINA, COLOMBIA, DENMARK, FRANCE, GERMANY, INDIA, ITALY, JAPAN, MEXICO, NETHERLANDS, NEW ZEALAND, POLAND, RUSSIA, SAUDI ARABIA, SINGAPORE, SOUTH AFRICA, SWEDEN, TURKEY, UNITED ARAB EMIRATES, UNITED KINGDOM, UNITED STATES OF AMERICA 13,022 ONLINE ADULTS AGED 18-64 2013 NORTON REPORT
  • 3. WHO IS AFFECTED MOST BY CYBERCRIME? CYBERCRIME VICTIMS MORE LIKELY TO BE: MALE – 64% (COMPARED TO 58% OF FEMALES) MILLENNIAL – 66% (COMPARED TO 54% OF BABY BOOMERS) AND: • MOBILE DEVICE OWNERS – 63% • SOCIAL NETWORK USERS – 63% • PUBLIC / UNSECURED WI-FI USERS – 68% • EMERGING MARKET – 68% • PARENT OF CHILDREN 8-17 – 65% HIGHEST NUMBER OF CYBERCRIME VICTIMS FOUND IN: 85% CHINA 77% RUSSIA 73% SOUTH AFRICA ALL STATS REFER TO LIFETIME VICTIMSUSA 63%; CANADA 68%; UK 58%; FRANCE 45%; GERMANY 53%; ITALY 56%; SWEDEN 56%; POLAND 60%; NETHERLANDS 50%; AUSTRALIA 60%; INDIA 65%; JAPAN 19%; SINGAPORE 61%; NEW ZEALAND 69%; TURKEY 63%; DENMARK 50%; SAUDI ARABIA 62%; UAE 71%, COLOMBIA 64%
  • 4. TABLET AND SMARTPHONE CONSUMERS LEAVE SECURITY BEHIND ALMOST 1/2 DON’T USE BASIC PRECAUTIONS SUCH AS PASSWORDS, SECURITY SOFTWARE OR BACK UP FILES FOR THEIR MOBILE DEVICE MORE THAN ONE-THIRD HAVE EXPERIENCED MOBILE CYBERCRIME LAST YEAR THE GLOBAL PRICE TAG OF CONSUMER CYBERCRIME US$113 BILLION ANNUALLY, COST PER CYBERCRIME VICTIM UP 50 PERCENT THE SCALE OF CONSUMER CYBERCRIME 1 MILLION+ VICTIMS DAILY CREATING PERFECT STORM AS LINES BLUR BETWEEN WORK/PLAY 49% USE THEIR PERSONAL DEVICE FOR WORK AND PLAY AROUND ONE-IN-FIVE SHARE WORK RELATED INFORMATION WITH FRIENDS AND FAMILY KEY THEMES
  • 5. SMARTPHONE/TABLET CONSUMERS LEAVING SECURITY BEHIND NEARLY 1/2 SMARTPHONE/TABLET USERS SLEEP WITH THEIR PHONES WITHIN ARMS’ REACH ONLY 26% OF SMARTPHONE USERS HAVE MOBILE SECURITY SOFTWARE WITH ADVANCED PROTECTION 57%AREN’T AWARE THAT SECURITY SOLUTIONS FOR MOBILE DEVICES EXIST * NEARLY 1/2 DON’T USE BASIC PRECAUTIONS SUCH AS PASSWORDS, SECURITY SOFTWARE OR BACK UP FILES FOR THEIR MOBILE DEVICE * *AMONG MOBILE DEVICE USERS
  • 6. CONSUMERS’ SECURITY IQ – HIGH ON PC, LOW ON MOBILE 72%90% 78% GOOD JOB! 56% 48%33% NEEDS WORK! VS. VS. VS. VS. VS. VS. 60% 42% 53% DELETE SUSPICIOUS EMAILS FROM PEOPLE THEY DON’T KNOW HAVE AT LEAST A BASIC FREE ANTIVIRUS SOLUTION AVOID STORING SENSITIVE FILES ONLINE NEEDS WORK!
  • 7. 27% OF ADULTS HAVE LOST THEIR MOBILE DEVICE OR HAD IT STOLEN MOBILE CYBERCRIME AND LOSS 38%HAVE EXPERIENCED MOBILE CYBERCRIME IN PAST 12 MONTHS * *AMONG SMARTPHONE USERS
  • 8. $113 BN FRAUD 38% THEFT OR LOSS 21% REPAIRS 24% OTHER 17% 83% OF DIRECT FINANCIAL COSTS ARE A RESULT OF FRAUD, REPAIRS, THEFT AND LOSS USD $298 AVERAGE COST PER VICTIM THE GLOBAL PRICE TAG OF CONSUMER CYBERCRIME ALL AMOUNTS IN USD SEE EXTRAPOLATION CALCULATIONS * REPRESENTS A 50 PERCENT INCREASE OVER 2012 ENOUGH TO HOST THE 2012 LONDON OLYMPICS NEARLY 10 TIMES OVER
  • 9. 1 ALL AMOUNTS IN USD ROUNDED TO THE NEAREST BILLION 38 USA BN 3 MEXICO BN 8 BRAZIL BN 13EUROPE BN 1 RUSSIA BN 37 CHINA BN 4INDIA BN 1 JAPAN BN AUSTRALIA BN THE GLOBAL PRICE TAG OF CONSUMER CYBERCRIME 0.3 SOUTH AFRICA BN CANADA 3 BN; SINGAPORE 1 BN; NEW ZEALAND 0.1 BN; TURKEY 2 BN; SAUDI ARABIA 0.5 BN; UAE 0.3 BN; COLOMBIA 0.5 BN
  • 10. 12VICTIMS PER SECOND THE SCALE OF CONSUMER CYBERCRIME 378 MILLION VICTIMS PER YEAR 1 MILLION + VICTIMS PER DAY SEE EXTRAPOLATION CALCULATIONS * NO 1 NEARLY 2.8 TIMES AS MANY BABIES BORN EACH YEAR ENOUGH TO FILL WEMBLEY STADIUM (ENGLAND) MORE THAN 10 TIMES
  • 11. THE SCALE OF CONSUMER CYBERCRIME 50% OF ONLINE ADULTS HAVE BEEN VICTIMS OF CYBERCRIME AND / OR NEGATIVE ONLINE SITUATIONS IN THE PAST YEAR (e.g., RECEIVED NUDE IMAGES FROM STRANGERS OR WERE BULLIED OR STALKED ONLINE) 41% OF ONLINE ADULTS HAVE FALLEN VICTIM TO ATTACKS SUCH AS MALWARE, VIRUSES, HACKING, SCAMS, FRAUD AND THEFT
  • 12. BLURRING BETWEEN WORK AND PLAY 49% USE THEIR PERSONAL DEVICE FOR WORK AND PLAY* 30% OF PARENTS LET THEIR KIDS PLAY, DOWNLOAD AND SHOP ON THEIR WORK DEVICE ** 36% SAY THEIR COMPANY HAS NO POLICY ON USE OF PERSONAL DEVICES FOR WORK* *AMONG WORKING ADULTS 49% OF RESPONDENTS ACCESS OR SEND PERSONAL EMAILS THROUGH THEIR WORK DEVICE* 34% ACCESS THEIR SOCIAL NETWORK THROUGH THEIR WORK DEVICE* 27% STORE PERSONAL INFORMATION ON THEIR WORK DEVICE* **AMONG PARENTS WHO USE DEVICES PROVIDED BY THEIR EMPLOYER
  • 13. ONLINE FILE STORAGE OPENS DOOR TO OVERSHARING 18% SHARE WITH FRIENDS 24% OF USERS SAVE BOTH WORK AND PERSONAL DOCUMENTS TO THE SAME ONLINE FILE STORAGE ACCOUNT PUTTING BOTH WORK AND PERSONAL DOCUMENTS AT RISK 21% SHARE WITH FAMILY ON SHARING WORK-RELATED INFORMATION THROUGH ONLINE FILE STORAGE SITES:
  • 14. 1/4 OF SOCIAL MEDIA USERS SHARE THEIR SOCIAL MEDIA PASSWORDS WITH OTHERS RISKY BEHAVIOR ON SOCIAL MEDIA 39% OF SOCIAL MEDIA USERS DON’T LOG OUT AFTER EACH SESSION 31% OF SOCIAL MEDIA USERS CONNECT WITH PEOPLE THEY DO NOT KNOW LOG OUT **** 12%OF SOCIAL MEDIA USERS SAY SOMEONE HAS HACKED INTO THEIR SOCIAL NETWORK ACCOUNT AND PRETENDED TO BE THEM ? ? ?
  • 15. MOBILE AND SOCIAL STRESSORS 1/4 OF MOBILE DEVICE USERS CHECK THEIR MOBILES WHILE SHARING A MEAL WITH OTHERS 6/10OF MOBILE DEVICE USERS GET ANNOYED BY OTHERS CHECKING THEIR MOBILES DURING A MEAL 49% OF MOBILE DEVICE USERS WOULD FEEL UPSET/CONCERNED IF THEY LEFT HOME WITHOUT THEIR MOBILE DEVICE 25% OF SOCIAL NETWORK USERS CHECK THEIR SOCIAL NETWORK WITHIN 15 MINUTES OF WAKING UP
  • 16. CONSUMERS PICK CONVENIENCE OVER SAFETY 46% WISH THEY COULD PERMANENTLY DELETE SOME OF THEIR PERSONAL ONLINE CONTENT COMPLETELY 7/10 DON’T PUT ANYTHING ON SOCIAL NETWORKS THAT THEY WOULDN’T WANT THEIR PARENTS / KIDS TO SEE 62% AGREE THERE IS NO SUCH THING AS ‘ONLINE PRI ACY’ IN TODAY’S WORLD 1/3 ADMIT THE CONVENIENCE OF CONSTANTLY CONNECTED OUTWEIGHED ANY POTENTIAL SECURITY RISKS EVEN THOUGH…
  • 17. CONCLUSION $113 BILLION TOTAL DIRECT GLOBAL COSTS IN JUST 12 MONTHS 50% OF ONLINE ADULTS HAVE BEEN VICTIMS OF CYBERCRIME AND / OR NEGATIVE ONLINE SITUATIONS IN THE PAST YEAR 1M+ ADULTS BECOME CYBERCRIME VICTIMS EVERY DAY - THAT’S 12 VICTIMS PER SECOND CONSUMERS MOVE TO MOBILE DEVICES BUT LEAVE PROTECTION BEHIND CONSUMERS ARE INCREASINGLY USING MOBILE DEVICES AND TABLET DEVICES BUT ARE NOT PROTECTING THEMSELVES. WHILE DESKTOP PROTECTION IS HIGH AMONG CONSUMERS, THE CYBERCRIMINAL IS MOVING TO MOBILE AND TABLET DEVICES WHERE CONSUMERS ARE VULNERABLE. MOBILE DEVICE ADOPTION CONTINUES TO GROW, SUGGESTING A DEGREE OF MOBILE DEPENDENCE, WHICH WILL INCREASE OPPORTUNITIES FOR CYBERCRIMINALS TO STRIKE. BLURRING BETWEEN WORK AND PERSONAL MOBILE DEVICE USAGE AS PERSONAL MOBILE DEVICES ARE BEING USED MORE AND MORE FOR WORK-RELATED ACTIVITIES, CONSUMERS’ LIFESTYLES ARE PUTTING BUSINESS ENVIRONMENTS AT RISK. AN ALARMING NUMBER OF BUSINESSES HAVE NO POLICIES IN PLACE. FOR THOSE WHO DO, OUR RESEARCH SUGGESTS THE POLICIES ARE OFTEN NOT RESPECTED BY THEIR EMPLOYEES. CONSUMERS PICK CONVENIENCE OVER SAFETY MANY CONSUMERS ARE MAKING A CONSCIOUS DECISION TO TRADE THEIR SAFETY FOR CONVENIENCE; MANY MORE ARE UNAWARE THAT THEY’RE MAKING THE SAME TRADE. BUT, “CONSTANTLY CONNECTED” DOESN’T HAVE TO EQUAL “CONSTANTLY AT RISK” ALL AMOUNTS IN USD
  • 18. DEFEND YOUR DATA A COMPREHENSIVE SECURITY SUITE PROVIDES A STRONG DEFENSE AGAINST ONLINE THREATS. NORTON 360 MULTI-DEVICE OFFERS PROTECTION FOR PCS, SMARTPHONES AND TABLETS, IN A SINGLE SOLUTION THINK OF MOBILE DEVICES AS MINI-COMPUTERS MOBILE IS THE FASTEST-GROWING TARGET FOR CYBERCRIMINALS. MAKE SURE YOUR MOBILE DEVICE REQUIRES A PASSWORD, AND TAKE PRECAUTIONS TO ENSURE YOUR DEVICE IS PROTECTED AGAINST THEFT, LOSS AND CYBERCRIME BE CAUTIOUS IN THE CLOUD WHILE CLOUD STORAGE SOLUTIONS MAKE IT EASY TO SAVE AND SHARE FILES, THEY ALSO OPEN OTHER AVENUES FOR ATTACK. BE CAREFUL ABOUT WHO HAS ACCESS TO YOUR FILES, AND USE A SOLUTION WITH BUILT-IN SECURITY IF POSSIBLE SAVE SENSITIVE TRANSACTIONS FOR SECURE CONNECTIONS FREE OR UNSECURED WI-FI NETWORKS CAN MAKE IT EASY FOR THIEVES TO EAVESDROP ON YOUR ACTIVITY. AVOID DOING ANY SENSITIVE TRANSACTIONS LIKE BANKING OR SHOPPING WHILE CONNECTED TO THESE NETWORKS, OR USE A PERSONAL VPN CLIENT AFTER YOU CONNECT, DOUBLE CHECK CHECK CREDIT CARD AND BANK STATEMENTS REGULARLY FOR FRAUDULENT TRANSACTIONS, AND REPORT ANY SUSPICIOUS ACTIVITY TO YOUR PROVIDER AND/OR LAW ENFORCEMENT TOP TIPS
  • 22. 54% ACCESS PERSONAL E-MAIL 56%ACCESS THEIR SOCIAL NETWORK ACCOUNT 29% SHOP ONLINE29% ACCESS THEIR BANK ACCOUNT POTENTIALLY RISKY BEHAVIOR ON UNSECURED WI-FI *AMONG FREE/UNSECUREDWI-FI USERS 39% DO NOT TAKE ANY SPECIAL STEPS TO PROTECT THEMSELVES WHEN USING PUBLIC WI-FI 3/10 DO NOT ALWAYS LOG OFF AFTER HAVING USED A PUBLIC WI-FI CONNECTION NEEDS WORK!
  • 23. BLURRING LINES BETWEEN FRIENDS AND ENEMIES *AMONG THOSE WHO HAVE ACCESSED PARTNER/FRIEND'S EMAIL/ SOCIAL MEDIA 1/10 HA E ACCESSED THEIR PARTNER/FRIEND’S ACCOUNTS WITHOUT PERMISSION 41% DID IT BECAUSE THEY WERE CURIOUS* 26% WERE GOOFING AROUND / PLAYING A JOKE* 18% DIDN’T TRUST THEIR PARTNER / FRIEND TO BE HONEST ON THEIR OWN*
  • 25. THE METHODOLOGY DETAIL EDELMAN BERLAND CONDUCTED AN ONLINE SURVEY AMONG CONSUMERS: 13,022 ADULTS AGED 18-64 YEARS The survey was conducted in 24 countries (Australia, Brazil, Canada, China, Colombia, France, Denmark, Germany, India, Italy, Japan, Mexico, Netherlands, New Zealand, Poland, Russia, Saudi Arabia, Singapore, South Africa, Sweden, Turkey, United Arab Emirates, United Kingdom and United States). The survey was conducted in the primary language of each country, and questions asked were identical across all countries. Interviews were conducted between 4th July 2013 – 1st August 2013. The margin of error for the total sample of adults (n=13,022) is + 0.9% at the 95% level of confidence. Important notes: The Norton Cybercrime Report is an annual report commissioned by Norton by Symantec aimed at understanding how cybercrime affects consumers and how the adoption and evolution of new technologies impacts consumers’ security. The research was conducted by Edelman Berland, an international research agency. Findings are based on self-reported experiences of over 13,000 adults across 24 countries. 1000 adult respondents were interviewed in each of USA and India. The global data has been weighted to ensure all countries have equal representation of n=500 adults. Additional notes: Developed Markets: USA, Canada, UK, France, Germany, Italy, Sweden, Netherlands, Australia, Japan, Singapore, New Zealand, Denmark Emerging Markets: Brazil, Mexico, Poland, India, China, Russia, Turkey, Saudi Arabia, UAE, Colombia, South Africa Millennials: aged 18-34 Boomers: aged 45-64
  • 26. DEFINITION OF CYBERCRIME Cybercrime is defined as any of the following activities: • Computer viruses or malicious software appeared on my computer • I responded to a forged, ‘spoofed’ or fake email or website which captured my personal details such as passwords, credit card numbers, or bank account information thinking it was a legitimate request in order to access information or provide information to a legitimate organization, such as my bank, etc. • Someone has hacked into my email account and pretended to be me • Someone has hacked into my social networking profile and pretended to be me • I responded to an online scam • I experienced online credit card fraud • I experienced identity theft • My phone was infected and a text message was sent from my mobile phone without my permission or knowledge that I later had to pay for • My screen was locked and an alert was shown, which told me to pay a fine to get it unlocked • My smartphone was lost or stolen and someone found it and used it without my permission • An app appeared on my smartphone that I didn’t download • I’ve had someone purporting to be from a computer company call me to inform that I have an infected computer • I experienced another type of cybercrime on my cell / mobile phone / tablet device • I experienced another type of cybercrime on my desktop or laptop computer
  • 27. DEFINITION OF CYBERCRIME Cybercrime and /or negative online experience is defined as any of the following activities: • Computer viruses or malicious software appeared on my computer • I responded to a forged, ‘spoofed’ or fake email or website which captured my personal details such as passwords, credit card numbers, or bank account information thinking it was a legitimate request in order to access information or provide information to a legitimate organization, such as my bank, etc. • Someone has hacked into my email account and pretended to be me • Someone has hacked into my social networking profile and pretended to be me • I responded to an online scam • I experienced online credit card fraud • I experienced identity theft • My phone was infected and a text message was sent from my mobile phone without my permission or knowledge that I later had to pay for • My screen was locked and an alert was shown, which told me to pay a fine to get it unlocked • My smartphone was lost or stolen and someone found it and used it without my permission • An app appeared on my smartphone that I didn’t download • I’ve had someone purporting to be from a computer company call me to inform that I have an infected computer • I experienced another type of cybercrime on my cell / mobile phone / tablet device • I experienced another type of cybercrime on my desktop or laptop computer • I experienced someone posting private/intimate photos or videos of me without my permission • I was approached online by someone in an unwanted sexual way • I have experienced online bullying, online stalking, online hate crime or other forms of online harassment • I have received SMS text messages from people I do not know, requesting me to click on an embedded link or stating that I have received a voicemail and need to dial a number which is not my voicemail to retrieve it • I have received unwanted nude images of someone I don’t know • I have received unwanted nude images of someone I do know
  • 28. EXTRAPOLATIONS CALCULATIONS 1) Nearly 380 million victims in 24 countries over past 12 months Online adults per country x % cybercrime victims past 12 months per country = 377,943,431 (sum of 24 countries). 2) 12 cybercrime victims every second / 719 cybercrime victims every minute / 43,144 per hour / more than 1 million per day impacting almost 378 million adults in the past year in 24 countries* Victims over past 12 months (as above) 377,943,431 / 365 days per year / 24 hours / 60 minutes / 60 seconds 3) Cybercrime is big business costing $113 billion in the last year in 24 countries Victims over past 12 months (per country) x average financial cost of cybercrime (per country in US currency). Figure shown in the sum of all countries total cost.