These Facts Explain the Threat of Cyber Warfare

America has spent decades and trillions of dollars building up the greatest military force the world has ever seen. But the biggest threat to national security these days comes from not from aircraft carriers or infantry divisions, but a computer with a simple Internet connection. That much became clear after the catastrophic hack—most likely by a foreign power—of sensitive federal employee data stored online. These 5 stats explain the evolution of cyber warfare, its astronomical costs and its increasingly important role in geopolitics.

1. Government Threats
The massive breach of the Office of Personnel Management a couple weeks ago made headlines, but Washington has been fending off cyber-attacks for years now. The federal government suffered a staggering 61,000 cyber-security breaches last year alone. This most recent wave of hacks exposed the records of up to 14 million current and former US government employees, some dating back to 1985. Compromised information includes Social Security numbers, job assignments and performance evaluations. This is dangerous information in the hands of the wrong people, which by definition these hackers are. There is a good reason why the U.S. Director of National Intelligence ranks cyber crime as the No. 1 national security threat, ahead of terrorism, espionage and weapons of mass destruction.
2. Business Threats
Hackers aren’t only in the game to damage governments—sometimes good old-fashioned robbery is enough. The FBI had to notify over 3,000 U.S. companies that they were victims of cyber security breaches in 2013. Victims ranged from small banks to major defense contractors to mega retailers. An astounding 7 percent of U.S. organizations lost $1 million or more due to cyber crime in 2013; 19 percent of U.S. entities have claimed losses between $50,000 and $1 million over the same span. Hacking costs the U.S. some $300 billion per year according to some estimates. Worldwide that figure is closer to $445 billion, or a full 1 percent of global income. The research firm Gartner projects that the world will spend $79.9 billion on information security in 2015, with the figure rising to $101 billion in 2018—and that still won’t be enough.
3. Social Media Threats
With the rise of social media also comes the rise in social media cyber crime. Social media spam increased 650 percent in 2014 compared to 2013. Nearly 30 percent of U.S. adults say one of their social media accounts has been hacked. That number is only set to grow: an estimated 10 to 15 percent of home computers globally are already infected with botnet crime-ware, and over 30,000 new websites are corrupted daily with compromising code. In a day and age where your online presence increasingly defines you to the rest of the world, hackers with access to your accounts can cause untold damage to both your personal and professional life. Back in 2011, Facebook admitted that it was the target of 600,000 cyber-attacks every day. Not wanting to scare off potential users, it hasn’t released official figures since.
4. Russia
Speaking of social media, cyber threats don’t only come in the form of traditional hacking. Moscow has set up a sophisticated “troll army” under the umbrella of its Internet Research Agency to wage a massive disinformation campaign in support for its invasion of Ukraine, and of the Kremlin in general. These trolls work hard, each one pumping out 135 comments per 12-hour shift. Furthermore, each troll is reportedly required to post 50 news article a day while maintaining at least six Facebook and ten Twitter accounts. That’s a whole lot of misinformation. Despite economic hardship caused by sanctions, Moscow believes in this mission enough to employ a full-time staff of 400 with a monthly budget of $400,000.
5. China
But the single biggest threat to the US remains China. A full 70 percent of America’s corporate intellectual property theft is believed to originate from China. That doesn’t just mean random hackers who operate within China’s borders; we’re talking about elite cyber groups housed by the government in Beijing. China decided long ago that it couldn’t compete with the U.S. in direct military strength. The US already outspends China more than 4-to-1 in that regard, making catch-up near impossible. Beijing has instead decided to focus instead on commercial and government espionage. While exact figures are hard to come by, in May 2013 two former Pentagon officials admitted that “Chinese computer spies raided the databanks of almost every major U.S. defense contractor and made off with some of the country’s most closely guarded technological secrets.”

That would be really impressive if it wasn’t so terrifying.
Time:  http://ti.me/1evXzRN

 

« 21 Announces the Bitcoin Computer
Should US Hacked Federal Employees Lose Security Clearance? »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Clearpath Solutions Group

Clearpath Solutions Group

Clearpath Solutions Group expertise covers virtualization and data storage technologies, networking, security and cloud computing.

Rollbar

Rollbar

Rollbar is a full-stack error monitoring platform for web and mobile applications. We help developers find and fix bugs fast. Built by developers for developers.

CTR Secure Services

CTR Secure Services

CTR Secure Services provides a broad range of security consulting services from asset protection to cyber security.

Bowbridge

Bowbridge

Bowbridge provides anti-virus and application security solutions for SAP systems.

Gita Technologies

Gita Technologies

Gita Technologies works to create integrated solutions to the thorniest problems in the field of intelligence and cyber today.

Dellfer

Dellfer

Dellfer secures connected cars and other IOT devices through Intrinsic protection, enabling the most sophisticated cybersecurity attacks to be seen instantly and remediated with precision.

Gallarus Industry Solutions

Gallarus Industry Solutions

Gallarus leads innovation within industrial Manufacturing, Production and Management Systems, including Cyber Security solutions specifically developed to protect against the latest cyber criminality.

TechForing

TechForing

TechForing Ltd. works for business organization's cyber security and cyber crime incident managements. We help business to secure their business online.

Chainlink

Chainlink

Chainlink expands the capability of smart contracts by enabling access to real-world data and systems without sacrificing the security and reliability guarantees inherent to blockchain technology.

Cyber Insurance Academy

Cyber Insurance Academy

Cyber Insurance Academy was founded to provide insurance professionals with the knowledge needed to work in cyber-insurance and cyber-related insurance fields.

ELLIO Technology

ELLIO Technology

ELLIO Technology is a cybersecurity company that reduces alert overload, improves incident response, and helps security teams target serious attackers who pose a real threat.

Carahsoft Technology Corp

Carahsoft Technology Corp

Carahsoft Technology is The Trusted Government IT Solutions Provider, supporting Public Sector organizations across Federal, State and Local Government agencies and Education and Healthcare markets.

DeXpose

DeXpose

DeXpose is a hybrid dark/deep web monitoring and attack surface mapping platform to help you find compromised data or exposed assets related to your organization way before threat actors.

ABPCyber

ABPCyber

ABPCyber offers holistic cybersecurity solutions spanning DevSecOps, advisory and consultancy, designing and integration, managed operations, and cybersecurity investment optimization.

Cythera

Cythera

Cythera is an Australian cyber security company with in-house cyber security professionals providing world-class cyber protection to medium to large companies all over Australia.

Modat

Modat

Modat is an AI-powered, research-driven company focused on developing products and services that enable cybersecurity professionals to outpace adversaries.