Thursday, February 25, 2021
Primarius Group
No Result
View All Result
PG-Intel
Advertisement
  • Home
  • Physical Security
  • Cyber security
  • Defense
  • Corporate Security
  • Emergency Management
  • Open Source Intelligence
  • More
    • Geo-politics
    • Threat intelligence
    • Protective Intelligence
    • Risk Management
  • Home
  • Physical Security
  • Cyber security
  • Defense
  • Corporate Security
  • Emergency Management
  • Open Source Intelligence
  • More
    • Geo-politics
    • Threat intelligence
    • Protective Intelligence
    • Risk Management
PG-Intel
No Result
View All Result

Think Tank Warns of “Silent Stealing” Fraud

2 days ago
in Information Security/Cyber security
0
Think Tank Warns of “Silent Stealing” Fraud
Share on FacebookShare on TwitterShare on LinkedIn


Fraudsters might more and more be shifting away from main company scams to focus on massive numbers of shoppers for very small quantities, in line with a brand new assume tank report.

The report from RUSI, The UK’s Response to Cyber Fraud, is meant to supply long-term suggestions for presidency and personal sector organizations to assist deal with the fashionable on-line scourge.

It famous that some researchers consulted by the report’s authors have posited that some fraudsters are migrating from “industrial scale” assaults on companies to simpler prey.

“For all of the protections that may be put in place to assist people keep secure on-line, a financial institution can not all the time improve a buyer’s degree of safety immediately, and a degree of consciousness and motion is incumbent on clients themselves,” it noted. “This leaves gaps which criminals can exploit, with some analysis contributors conceptualizing this as ‘silent stealing.’”

The rationale is that, somewhat than making an attempt to steal £10m from a financial institution direct, it could be simpler to steal £10 every from 100,0000 shoppers. This theoretically retains the scammers underneath the radar as, even when a client discovered they’d misplaced the cash, few would hassle reporting it.

Residence employees are more and more prone to such threats on condition that house networks and gadgets could also be much less properly protected than these within the workplace and utilized by varied members of the family for probably dangerous actions.

Nevertheless, Adenike Cosgrove, cybersecurity strategist, worldwide at Proofpoint, argued that it’s necessary to place the findings into perspective. BEC losses reported to the FBI hit practically $1.8bn final yr, for example.

“Our analysis has proven that just about two-thirds of companies worldwide confronted these assaults in 2020, and we count on this development to get even worse all through 2021,” she mentioned.

“From the attacker’s perspective, the barrier to entry is low, but with the potential reward so excessive, BEC will stay a draw for cyber-criminals and isn’t going away any time quickly.”

Final month, RUSI warned that fraud had turn out to be a grave risk to the UK’s nationwide safety and urged authorities to get a deal with on it.

ShareTweetShare

Related Posts

The 3 Most Common Types of BEC Attacks (And What …
Information Security/Cyber security

61% of Malware Delivered via Cloud Apps: Report

February 24, 2021
The 3 Most Common Types of BEC Attacks (And What …
Information Security/Cyber security

Cybercriminals Target QuickBooks Databases

February 24, 2021
How to protect yourself from common job search scams
Information Security/Cyber security

How to protect yourself from common job search scams

February 24, 2021
Ransomware threats to watch for in 2021 include crimeware-as-a-service
Information Security/Cyber security

Ransomware threats to watch for in 2021 include crimeware-as-a-service

February 24, 2021
Medical Data of 500,000 French Residents Leaked Online
Information Security/Cyber security

Medical Data of 500,000 French Residents Leaked Online

February 24, 2021
Kroger data breach highlights urgent need to replace legacy, end-of-life tools
Information Security/Cyber security

Kroger data breach highlights urgent need to replace legacy, end-of-life tools

February 24, 2021
Next Post

Rapport Accenture Technology Vision 2021 : alors que l’écart digital se creuse suite à la pandémie, ce sont les « champions du changement » qui écriront le futur

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Latest Updates

Federal Reserve’s Money Transfer Services Suffer Outage

Federal Reserve’s Money Transfer Services Suffer Outage

26 mins ago
Workiva Announces CFO Transition | Business Wire

Workiva Inc. to Participate in Upcoming Virtual Investor Conferences

50 mins ago
Mother of terrorism victim works to ‘turn the page’ on violent extremism |

Mother of terrorism victim works to ‘turn the page’ on violent extremism |

54 mins ago
Bell Announces Sale of Six Bell 505 Helicopters to Jamaica Defence Force

Bell Announces Sale of Six Bell 505 Helicopters to Jamaica Defence Force

1 hour ago
NVIDIA Closes Out Q4 & FY2021 With Another Round of Record Earnings

NVIDIA Closes Out Q4 & FY2021 With Another Round of Record Earnings

1 hour ago
Air Force’s Roper Is Gone, But His Vision Lives On

Air Force’s Roper Is Gone, But His Vision Lives On

2 hours ago

Bentley Systems to Present at the Berenberg Design Software Conference

2 hours ago
Explainer: Turkey Turning ‘Supplier’ For Navies of India, Pakistan?

Explainer: Turkey Turning ‘Supplier’ For Navies of India, Pakistan?

2 hours ago
Load More
PG-Intel

© 2020 All Rights Reserved .

Brought to you by Primarius Group

  • Disclaimer
  • Privacy Policy
  • Cookie Privacy Policy
  • Terms and Conditions
  • Contact us

Follow Us

No Result
View All Result
  • Home
  • Physical Security
  • Cyber security
  • Defense
  • Corporate Security
  • Emergency Management
  • Open Source Intelligence
  • More
    • Geo-politics
    • Threat intelligence
    • Protective Intelligence
    • Risk Management

© 2020 All Rights Reserved .