SlideShare a Scribd company logo
1 of 15
Website Security Threats: September 2013 Update
WEBSITE SECURITY THREATS:
SEPTEMBER 2013 UPDATE
Thursday 26th September 2013
Andrew Shepherd
andrew_shepherd@symantec.com
Andrew Horbury
andrew_horbury@symantec.com
Agenda
• The month in numbers
• Hackers for hire
• Data breaches
• ATM Trojans
• Celebrity infections
Website Security Threats: September 2013 Update
The month in numbers….
• Over 48% of people who quit Facebook did it because of privacy concerns
• Hackers set up a 10,000 USD bounty for the first person who can crack the
iPhone 5S fingerprint scanner
• The average cost associated with a cyberattack for small businesses was
almost 8,700 USD
• 78% of smartphone users say they won't download an untrusted app
• New research says 51% of US teenagers avoid certain apps over privacy
concerns
• It's no wonder that phishing attacks still work - 30% would open an email
even if it seemed suspicious
• Speaking of Phishing…about 20% more brands were targeted by attackers in
the first half of 2013.
Website Security Threats: September 2013 Update
Hackers for hire
http://www.symantec.com/connect/blogs/hidden-lynx-professional-hackers-hire
Website Security Threats: September 2013 Update
Types of companies being attacked from inside and out
Website Security Threats: September 2013 Update
The volume of attacks
against smaller businesses
increased x 3
when compared with 2011,
resulting in its
percentage almost doubling
from 18%
to 31%
Hackers for Hire
THE SCALE OF CONSUMER CYBERCRIME
2/3 ONLINE ADULTS
HAVE BEEN VICTIMS OF CYBERCRIME IN THEIR
LIFETIME
46% VICTIMS IN PAST YEAR
CLOSE TO HALF OF ONLINE ADULTS HAVE FALLEN VICTIM TO ATTACKS SUCH AS
MALWARE, VIRUSES, HACKING, SCAMS, FRAUD & THEFT
18VICTIMS PER SECOND
THE SCALE OF CONSUMER CYBERCRIME
556 MILLION VICTIMS PER YEAR
MORE THAN THE ENTIRE POPULATION OF THE EUROPEAN UNION
1.5+ MILLION
VICTIMS PER DAY
$110 BN
FRAUD; 42%
THEFT OR LOSS;
17%
REPAIRS; 26%
OTHER; 15%
85% OF DIRECT FINANCIAL COSTS
ARE A RESULT OF FRAUD,
REPAIRS, THEFT & LOSS
USD $197
AVERAGE COST PER VICTIM
THE GLOBAL PRICE TAG OF CONSUMER CYBERCRIME
THE COST AMERICANS SPEND ANNUALLY ON FAST FOOD
ENOUGH TO BUY A WEEK’S WORTH OF NUTRITIOUS FOOD
FOR A FAMILY OF FOUR IN THE UNITED STATES
THE SCALE OF CONSUMER CYBERCRIME
ONE-AND-A-HALF MILLION VICTIMS DAILY
THE GLOBAL PRICE TAG OF CONSUMER CYBERCRIME
US $110 BILLION ANNUALLY
CHANGING FACE OF CYBERCRIME
CYBERCRIME GOES SOCIAL AND MOBILE
SECURITY IQ: MIXED REPORT CARD FOR CONSUMERS
CONSUMERS WISE UP TO TRADITIONAL THREATS, BUT MANY STILL
UNAWARE AS TO HOW CYBERCRIME IS RAPIDLY EVOLVING
STRONG PASSWORDS ARE KEY
EMAIL A POTENTIAL GATEWAY FOR CYBERCRIMINALS
KEY THEMES
Website Security Threats: September 2013 Update
Consumers are becoming less vigilant about protecting
their safety online
• Consumers are becoming less vigilant about protecting their
safety online
• Almost 30% said that they use secured wireless networks,
down from 36% last year
• 42% use passwords with upper and lower case letters,
numbers and/or symbols, compared to 49% in 2012
• 39% conduct transactions through reputable websites only,
down from 48% last year and 60% in 2011.
• 17% use a PIN or password to lock a smartphone while just 8%
use a mobile security app or feature.
Website Security Threats: September 2013 Update
German Data breach
• 2 Million identities stolen in
Germany
• Names, addresses, dob, genders
and banking details compromised
• Attacker was an insider.
Website Security Threats: September 2013 Update
Money for (almost nothing)
Compromised ATMs in
Mexico handing out cash to
criminals.
Website Security Threats: September 2013 Update
Car passes physical safety tests….
but fails the security test.
Website Security Threats: September 2013 Update
iPhone 5S Finger print
Website Security Threats: September 2013 Update
The new iPhone fingerprint reader relies on
the living layer of skin in order to
authenticate the owner.
Lily who?
Users searching for Lily Collins pictures and downloads, have a 14.5% chance of
visiting a website with spyware, adware, spam and other malware.
Website Security Threats: September 2013 Update
Link Glossary (Press Print screen now)
• What happens in an internet
minute
– http://intel.ly/15sGJgy
• Facebook Privacy concerns
– http://bit.ly/1b57zdu
• App concerns
– http://bit.ly/15sHINH
• Hidden Lynx; Hackers for hire
blog post
– http://bit.ly/18VVyZM
• Insider threats
– http://bit.ly/1eGx8Wk
• Cyber Attacks on SMB
– http://bit.ly/1gZOLNF
• Iphone finger print reader
needs your living finger….
– http://bit.ly/18YGYL8
• Iphone fingerprint hack
– http://bit.ly/1bFqiPF
• Celebs the lure for malware
– http://bit.ly/16yVBDZ
Website Security Threats: September 2013 Update
Thank you!
Copyright © 2012 Symantec Corporation. All rights reserved. Symantec and the Symantec Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in
the U.S. and other countries. Other names may be trademarks of their respective owners.
This document is provided for informational purposes only and is not intended as advertising. All warranties relating to the information in this document, either express or implied,
are disclaimed to the maximum extent allowed by law. The information in this document is subject to change without notice.
Andrew Shepherd
andrew_shepherd@symantec.com / +44 7912 552896
Andrew Horbury
andrew_horbury@symantec.com / +44 7703 468966
Website Security Threats: September 2013 Update
Next webinar: 24th October 2013
9.30am GMT/10.30am CET

More Related Content

What's hot

Arrott Htcia St Johns 101020
Arrott Htcia St Johns 101020Arrott Htcia St Johns 101020
Arrott Htcia St Johns 101020
Anthony Arrott
 

What's hot (11)

Arrott Htcia St Johns 101020
Arrott Htcia St Johns 101020Arrott Htcia St Johns 101020
Arrott Htcia St Johns 101020
 
Google & microsoft joins apple vs fbi
Google & microsoft joins apple vs fbiGoogle & microsoft joins apple vs fbi
Google & microsoft joins apple vs fbi
 
Dz hackevent 2019 Middle East Cyberwars V3
Dz hackevent 2019 Middle East Cyberwars V3Dz hackevent 2019 Middle East Cyberwars V3
Dz hackevent 2019 Middle East Cyberwars V3
 
The What If's of Hostile:Evil Personas
The What If's of Hostile:Evil PersonasThe What If's of Hostile:Evil Personas
The What If's of Hostile:Evil Personas
 
Targeted Defense for Malware & Targeted Attacks
Targeted Defense for Malware & Targeted AttacksTargeted Defense for Malware & Targeted Attacks
Targeted Defense for Malware & Targeted Attacks
 
The Next Cyber Warfare Wave: AR and VR Worlds
The Next Cyber Warfare Wave: AR and VR WorldsThe Next Cyber Warfare Wave: AR and VR Worlds
The Next Cyber Warfare Wave: AR and VR Worlds
 
Symantec intelligence report august 2015
Symantec intelligence report august 2015Symantec intelligence report august 2015
Symantec intelligence report august 2015
 
Trojan and Virus,Trojan horse,virus,how to make and defend the virus
Trojan and Virus,Trojan horse,virus,how to make and defend the virusTrojan and Virus,Trojan horse,virus,how to make and defend the virus
Trojan and Virus,Trojan horse,virus,how to make and defend the virus
 
READ THIS BEFORE USING FACEAPP! FACEAPP PRIVACY CONCERNS?
READ THIS BEFORE USING FACEAPP! FACEAPP PRIVACY CONCERNS?READ THIS BEFORE USING FACEAPP! FACEAPP PRIVACY CONCERNS?
READ THIS BEFORE USING FACEAPP! FACEAPP PRIVACY CONCERNS?
 
Laptop theft statistics
Laptop theft statisticsLaptop theft statistics
Laptop theft statistics
 
5 biggest cyber attacks and most famous hackers
5 biggest cyber attacks and most famous hackers5 biggest cyber attacks and most famous hackers
5 biggest cyber attacks and most famous hackers
 

Similar to Website Security Threats: September 2013 Update

proofpoint-blindspots-visibility-white-paper
proofpoint-blindspots-visibility-white-paperproofpoint-blindspots-visibility-white-paper
proofpoint-blindspots-visibility-white-paper
Ken Spencer Brown
 
Symantec's Internet Security Threat Report for the Government Sector
Symantec's Internet Security Threat Report for the Government SectorSymantec's Internet Security Threat Report for the Government Sector
Symantec's Internet Security Threat Report for the Government Sector
Symantec
 

Similar to Website Security Threats: September 2013 Update (20)

Symantec Website Security Threat Report 2014 - RapidSSLOnline
Symantec Website Security Threat Report 2014 - RapidSSLOnlineSymantec Website Security Threat Report 2014 - RapidSSLOnline
Symantec Website Security Threat Report 2014 - RapidSSLOnline
 
Protecting Yourself Against Mobile Phishing
Protecting Yourself Against Mobile PhishingProtecting Yourself Against Mobile Phishing
Protecting Yourself Against Mobile Phishing
 
Cyber security olive green mint ppt .pdf
Cyber security olive green mint ppt .pdfCyber security olive green mint ppt .pdf
Cyber security olive green mint ppt .pdf
 
proofpoint-blindspots-visibility-white-paper
proofpoint-blindspots-visibility-white-paperproofpoint-blindspots-visibility-white-paper
proofpoint-blindspots-visibility-white-paper
 
6 Cybersecurity Trends to Watch in 2019
6 Cybersecurity Trends to Watch in 20196 Cybersecurity Trends to Watch in 2019
6 Cybersecurity Trends to Watch in 2019
 
Cyber Landscape in the Philippines.pptx
Cyber Landscape in the Philippines.pptxCyber Landscape in the Philippines.pptx
Cyber Landscape in the Philippines.pptx
 
The Social Takeover
The Social TakeoverThe Social Takeover
The Social Takeover
 
Key Findings from the 2015 IBM Cyber Security Intelligence Index
Key Findings from the 2015 IBM Cyber Security Intelligence IndexKey Findings from the 2015 IBM Cyber Security Intelligence Index
Key Findings from the 2015 IBM Cyber Security Intelligence Index
 
Mozilla - Let's take back the web
Mozilla - Let's take back the webMozilla - Let's take back the web
Mozilla - Let's take back the web
 
A Survey On Cyber Crime Information Security
A Survey On  Cyber Crime   Information SecurityA Survey On  Cyber Crime   Information Security
A Survey On Cyber Crime Information Security
 
Cybersecurity - Webinar Session
Cybersecurity - Webinar SessionCybersecurity - Webinar Session
Cybersecurity - Webinar Session
 
The Digital Insurer Award - Hanover Re (cyber)
The Digital Insurer Award - Hanover Re (cyber)The Digital Insurer Award - Hanover Re (cyber)
The Digital Insurer Award - Hanover Re (cyber)
 
Symantec's Internet Security Threat Report for the Government Sector
Symantec's Internet Security Threat Report for the Government SectorSymantec's Internet Security Threat Report for the Government Sector
Symantec's Internet Security Threat Report for the Government Sector
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
BLURRING BOUNDARIES
BLURRING BOUNDARIESBLURRING BOUNDARIES
BLURRING BOUNDARIES
 
"Cyber crime", or computer-oriented crime..!!
"Cyber crime", or computer-oriented crime..!!"Cyber crime", or computer-oriented crime..!!
"Cyber crime", or computer-oriented crime..!!
 
Most notable apt_ attacks_of_2015_and_2016 predictions
Most notable apt_ attacks_of_2015_and_2016 predictionsMost notable apt_ attacks_of_2015_and_2016 predictions
Most notable apt_ attacks_of_2015_and_2016 predictions
 
Tips and Tricks on Securing your Android Devices
Tips and Tricks on Securing your Android DevicesTips and Tricks on Securing your Android Devices
Tips and Tricks on Securing your Android Devices
 
User authentication-info-graphic
User authentication-info-graphicUser authentication-info-graphic
User authentication-info-graphic
 
The Major Types of Cybercrime
The Major Types of CybercrimeThe Major Types of Cybercrime
The Major Types of Cybercrime
 

More from Symantec Website Security

More from Symantec Website Security (20)

Symantec Code Sign (NAM)
Symantec Code Sign (NAM)Symantec Code Sign (NAM)
Symantec Code Sign (NAM)
 
Symantec Code Signing (SE)
Symantec Code Signing (SE)Symantec Code Signing (SE)
Symantec Code Signing (SE)
 
Сертификаты подписания кода Symantec
Сертификаты подписания кода SymantecСертификаты подписания кода Symantec
Сертификаты подписания кода Symantec
 
Symantec Code Signing (IT)
Symantec Code Signing (IT)Symantec Code Signing (IT)
Symantec Code Signing (IT)
 
Symantec Code Signing (FR)
Symantec Code Signing (FR)Symantec Code Signing (FR)
Symantec Code Signing (FR)
 
Code signing de Symantec (ES)
Code signing de Symantec (ES)Code signing de Symantec (ES)
Code signing de Symantec (ES)
 
Symantec Code Signing (DE)
Symantec Code Signing (DE)Symantec Code Signing (DE)
Symantec Code Signing (DE)
 
Symantec Code Signing (CH)
Symantec Code Signing (CH)Symantec Code Signing (CH)
Symantec Code Signing (CH)
 
Symantec Code Signing (UK)
Symantec Code Signing (UK)Symantec Code Signing (UK)
Symantec Code Signing (UK)
 
Um guia de e-commerce para a aquisição e manutenção de novos clientes da Syma...
Um guia de e-commerce para a aquisição e manutenção de novos clientes da Syma...Um guia de e-commerce para a aquisição e manutenção de novos clientes da Syma...
Um guia de e-commerce para a aquisição e manutenção de novos clientes da Syma...
 
Guide Symantec de conquête et de fidélisation de nouveaux clients sur vos sit...
Guide Symantec de conquête et de fidélisation de nouveaux clients sur vos sit...Guide Symantec de conquête et de fidélisation de nouveaux clients sur vos sit...
Guide Symantec de conquête et de fidélisation de nouveaux clients sur vos sit...
 
Guida per l'e-commerce Symantec - Come acquisire nuovi clienti e conservarli
Guida per l'e-commerce Symantec - Come acquisire nuovi clienti e conservarliGuida per l'e-commerce Symantec - Come acquisire nuovi clienti e conservarli
Guida per l'e-commerce Symantec - Come acquisire nuovi clienti e conservarli
 
Guía de comercio electrónico de Symantec: Cómo atraer y retener a nuevos clients
Guía de comercio electrónico de Symantec: Cómo atraer y retener a nuevos clientsGuía de comercio electrónico de Symantec: Cómo atraer y retener a nuevos clients
Guía de comercio electrónico de Symantec: Cómo atraer y retener a nuevos clients
 
Guía de comercio electrónico de Symantec: Cómo atraer y retener a nuevos clients
Guía de comercio electrónico de Symantec: Cómo atraer y retener a nuevos clientsGuía de comercio electrónico de Symantec: Cómo atraer y retener a nuevos clients
Guía de comercio electrónico de Symantec: Cómo atraer y retener a nuevos clients
 
Guide Symantec de conquête et de fidélisation de nouveaux clients sur vos sit...
Guide Symantec de conquête et de fidélisation de nouveaux clients sur vos sit...Guide Symantec de conquête et de fidélisation de nouveaux clients sur vos sit...
Guide Symantec de conquête et de fidélisation de nouveaux clients sur vos sit...
 
Leitfaden von Symantec: „Das 1×1 der Kundengewinnung und -bindung im E-Commerce“
Leitfaden von Symantec: „Das 1×1 der Kundengewinnung und -bindung im E-Commerce“Leitfaden von Symantec: „Das 1×1 der Kundengewinnung und -bindung im E-Commerce“
Leitfaden von Symantec: „Das 1×1 der Kundengewinnung und -bindung im E-Commerce“
 
Symantec: The rise of hacktivism and insider threats
Symantec: The rise of hacktivism and insider threatsSymantec: The rise of hacktivism and insider threats
Symantec: The rise of hacktivism and insider threats
 
Symantec Website Security Threats: February 2014 Update.
Symantec Website Security Threats: February 2014 Update.Symantec Website Security Threats: February 2014 Update.
Symantec Website Security Threats: February 2014 Update.
 
Symantec SSL Explained
Symantec SSL ExplainedSymantec SSL Explained
Symantec SSL Explained
 
Website Security Threats - January 2014 Update
Website Security Threats - January 2014 Update Website Security Threats - January 2014 Update
Website Security Threats - January 2014 Update
 

Recently uploaded

Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 

Recently uploaded (20)

Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 

Website Security Threats: September 2013 Update

  • 1. Website Security Threats: September 2013 Update WEBSITE SECURITY THREATS: SEPTEMBER 2013 UPDATE Thursday 26th September 2013 Andrew Shepherd andrew_shepherd@symantec.com Andrew Horbury andrew_horbury@symantec.com
  • 2. Agenda • The month in numbers • Hackers for hire • Data breaches • ATM Trojans • Celebrity infections Website Security Threats: September 2013 Update
  • 3. The month in numbers…. • Over 48% of people who quit Facebook did it because of privacy concerns • Hackers set up a 10,000 USD bounty for the first person who can crack the iPhone 5S fingerprint scanner • The average cost associated with a cyberattack for small businesses was almost 8,700 USD • 78% of smartphone users say they won't download an untrusted app • New research says 51% of US teenagers avoid certain apps over privacy concerns • It's no wonder that phishing attacks still work - 30% would open an email even if it seemed suspicious • Speaking of Phishing…about 20% more brands were targeted by attackers in the first half of 2013. Website Security Threats: September 2013 Update
  • 4.
  • 6. Types of companies being attacked from inside and out Website Security Threats: September 2013 Update The volume of attacks against smaller businesses increased x 3 when compared with 2011, resulting in its percentage almost doubling from 18% to 31%
  • 7. Hackers for Hire THE SCALE OF CONSUMER CYBERCRIME 2/3 ONLINE ADULTS HAVE BEEN VICTIMS OF CYBERCRIME IN THEIR LIFETIME 46% VICTIMS IN PAST YEAR CLOSE TO HALF OF ONLINE ADULTS HAVE FALLEN VICTIM TO ATTACKS SUCH AS MALWARE, VIRUSES, HACKING, SCAMS, FRAUD & THEFT 18VICTIMS PER SECOND THE SCALE OF CONSUMER CYBERCRIME 556 MILLION VICTIMS PER YEAR MORE THAN THE ENTIRE POPULATION OF THE EUROPEAN UNION 1.5+ MILLION VICTIMS PER DAY $110 BN FRAUD; 42% THEFT OR LOSS; 17% REPAIRS; 26% OTHER; 15% 85% OF DIRECT FINANCIAL COSTS ARE A RESULT OF FRAUD, REPAIRS, THEFT & LOSS USD $197 AVERAGE COST PER VICTIM THE GLOBAL PRICE TAG OF CONSUMER CYBERCRIME THE COST AMERICANS SPEND ANNUALLY ON FAST FOOD ENOUGH TO BUY A WEEK’S WORTH OF NUTRITIOUS FOOD FOR A FAMILY OF FOUR IN THE UNITED STATES THE SCALE OF CONSUMER CYBERCRIME ONE-AND-A-HALF MILLION VICTIMS DAILY THE GLOBAL PRICE TAG OF CONSUMER CYBERCRIME US $110 BILLION ANNUALLY CHANGING FACE OF CYBERCRIME CYBERCRIME GOES SOCIAL AND MOBILE SECURITY IQ: MIXED REPORT CARD FOR CONSUMERS CONSUMERS WISE UP TO TRADITIONAL THREATS, BUT MANY STILL UNAWARE AS TO HOW CYBERCRIME IS RAPIDLY EVOLVING STRONG PASSWORDS ARE KEY EMAIL A POTENTIAL GATEWAY FOR CYBERCRIMINALS KEY THEMES Website Security Threats: September 2013 Update
  • 8. Consumers are becoming less vigilant about protecting their safety online • Consumers are becoming less vigilant about protecting their safety online • Almost 30% said that they use secured wireless networks, down from 36% last year • 42% use passwords with upper and lower case letters, numbers and/or symbols, compared to 49% in 2012 • 39% conduct transactions through reputable websites only, down from 48% last year and 60% in 2011. • 17% use a PIN or password to lock a smartphone while just 8% use a mobile security app or feature. Website Security Threats: September 2013 Update
  • 9. German Data breach • 2 Million identities stolen in Germany • Names, addresses, dob, genders and banking details compromised • Attacker was an insider. Website Security Threats: September 2013 Update
  • 10. Money for (almost nothing) Compromised ATMs in Mexico handing out cash to criminals. Website Security Threats: September 2013 Update
  • 11. Car passes physical safety tests…. but fails the security test. Website Security Threats: September 2013 Update
  • 12. iPhone 5S Finger print Website Security Threats: September 2013 Update The new iPhone fingerprint reader relies on the living layer of skin in order to authenticate the owner.
  • 13. Lily who? Users searching for Lily Collins pictures and downloads, have a 14.5% chance of visiting a website with spyware, adware, spam and other malware. Website Security Threats: September 2013 Update
  • 14. Link Glossary (Press Print screen now) • What happens in an internet minute – http://intel.ly/15sGJgy • Facebook Privacy concerns – http://bit.ly/1b57zdu • App concerns – http://bit.ly/15sHINH • Hidden Lynx; Hackers for hire blog post – http://bit.ly/18VVyZM • Insider threats – http://bit.ly/1eGx8Wk • Cyber Attacks on SMB – http://bit.ly/1gZOLNF • Iphone finger print reader needs your living finger…. – http://bit.ly/18YGYL8 • Iphone fingerprint hack – http://bit.ly/1bFqiPF • Celebs the lure for malware – http://bit.ly/16yVBDZ Website Security Threats: September 2013 Update
  • 15. Thank you! Copyright © 2012 Symantec Corporation. All rights reserved. Symantec and the Symantec Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners. This document is provided for informational purposes only and is not intended as advertising. All warranties relating to the information in this document, either express or implied, are disclaimed to the maximum extent allowed by law. The information in this document is subject to change without notice. Andrew Shepherd andrew_shepherd@symantec.com / +44 7912 552896 Andrew Horbury andrew_horbury@symantec.com / +44 7703 468966 Website Security Threats: September 2013 Update Next webinar: 24th October 2013 9.30am GMT/10.30am CET