Why Cybercrime Now Exceeds Conventional Crime

cyber-security-laws-5-638.jpg?cb=1426621844

 

Online crime worldwide is increasingly displacing conventional forms of property crime, such as burglary and robbery.

In London, for example, police report that organized crime syndicates have been increasingly embracing cybercrime - in particular, payment card fraud and identity scams - given the potential for a vastly greater return on their investment, as well as much lower risk, UK cybersecurity expert Alan Woodward says in an interview.

"It's no longer the spotty youth in his bedroom, committing some opportunistic crime," says Woodward, a visiting professor at the University of Surrey who is also a cybersecurity adviser to the association of European police agencies known as Europol. "Some of these are very highly orchestrated crimes. They require money and they require some quite sophisticated software to be written. And indeed, 'crime as a service' is actually growing as a genre online."

Earlier this year, London's mayor's office and Metropolitan Police released an online theft and fraud report, noting that 70 percent of all fraud now involves the Internet.

But fraud-related losses may be dramatically underreported. Woodward says that in the UK alone, the City of London Police, which takes the lead on fraud investigations, estimates that £2.2 billion ($3.4 billion) is lost to card fraud every year. But police also suspect that 85 percent of fraud is not being reported by consumers, meaning that annually, actual losses might total £12.1 billion ($18.7 billion).

The good news, however, is that police forces in many countries - not just across Europe, but also in North America - have been conducting joint operations where they have been able to track back crimes, shut down criminal organizations and, in many cases, prosecute suspects. 

However, statements by the UK government that overall crime in the UK is reducing take little account of the substantial increase in cyber crime, which often goes unreported and uninvestigated.

DataBreachToday:

 

 

« Using Threat Intelligence Against Cybercriminals
FBI Urges Firms to Plan For Cyber Attack »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

TrustedSec

TrustedSec

TrustedSec is an information security consulting services, providing tailored solutions and services for small, mid, and large businesses.

Dome9

Dome9

Dome9 is a cloud firewall management service that stops vulnerabilities, secures remote access, and centralizes policy management.

Telos

Telos

Telos offers cybersecurity solutions and services that empower and protect the world’s most security-conscious enterprises.

Cofense

Cofense

Cofense (formerly PhishMe) is a leading provider of human-driven phishing defense solutions.

OneWelcome

OneWelcome

Onegini and iWelcome have merged to become OneWelcome, the largest European Identity Access Management Saas Vendor.

Global Cyber Alliance (GCA)

Global Cyber Alliance (GCA)

Global Cyber Alliance is an international, cross-sector effort dedicated to eradicating cyber risk and improving our connected world.

FirstPoint

FirstPoint

FirstPoint has developed the market’s most advanced solution for securing cellular devices, including mobile phones and IoT products, by blocking malicious data leakage.

Applied Magnetics Laboratory (AML)

Applied Magnetics Laboratory (AML)

Applied Magnetics Laboratory is a manufacturer of military security and data destruction equipment for sensitive, classified, and secret information.

Black Hills Information Security (BHIS)

Black Hills Information Security (BHIS)

Black Hills Information Security provide security testing and vulnerability assessment services.

EVOKE

EVOKE

EVOKE is an award-winning Digital Transformation company that partners with its clients to build digital workplace solutions for organizational challenges.

Centre for Cyber Security Research and Innovation (CSRI) - Deakin University

Centre for Cyber Security Research and Innovation (CSRI) - Deakin University

CSRI solves the cyber security threats of tomorrow, today. We work with industry and government leaders on innovative research that has real-world impact.

Kiberna

Kiberna

Kiberna are a small but niche company specialising in data driven security to manage your cyber risks.

Match Systems

Match Systems

Match Systems provides blockchain investigations, KYC, KYT, AML, Due Diligence and compliance services.

MajorKey Technologies

MajorKey Technologies

MajorKey improves security performance by reducing user friction and business risk, empowering your people, and protecting your IP.

Qevlar AI

Qevlar AI

Qevlar AI empowers SOC teams, to eliminate redundant tasks and refocus on what truly matters - making the most of every employee within the SecOps team.

Culminate

Culminate

Adopt AI with confidence in your SOC. Utilize human-AI teaming to conduct your investigations with unmatched accuracy and speed.