Eskenzi PR ad banner Eskenzi PR ad banner
  • About Us
Sunday, 4 June, 2023
IT Security Guru
Eskenzi PR banner
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
IT Security Guru
No Result
View All Result

Digital Media Disruptors Become the Latest Major Target for Cybercriminals

by The Gurus
September 11, 2017
in Editor's News
Share on FacebookShare on Twitter

Today it is revealed that cybercrime attacks have reached their highest-ever levels, both in the UK and internationally. ThreatMetrix®, The Digital Identity Company®, which monitors more than 24 billion online transactions each year, has seen a staggering 144 million attacks over the last 90 days. In the UK, attack levels have risen 150 percent since 2015 – reaching 20 million attacks by the end of the second quarter of 2017. However, it’s the fast-growing digital media industry, in particular, is taking the brunt of the latest criminal techniques emerging from the cyber underworld.
 
As new business models take the digital economy by storm, innovative methods of monetising stolen credentials found on the dark web are emerging, and cybercriminals are taking full advantage of the vulnerabilities within media sites and apps. The ThreatMetrix Q2 Cybercrime Report has revealed a 527 percent increase in new account origination attacks since 2015 in this sector.
 
With attack levels rising in the UK to an all-time high, cybercriminals are increasingly targeting: social networking sites, online dating, ridesharing apps, video-on-demand and media streaming organisations. This demonstrates the ability of cybercrime rings to evolve the nature of their attacks based on new consumer trends and behaviour.
 
Why have digital media sites become such a target?
The criminal potential of the most popular digital media sites comes off the back of their dramatic surge in popularity. Industry experts have reported that 2.8 billion (almost 40 percent of the entire population) are active social media users. One-quarter (25 percent) of the global population also stream and watch TV content via a laptop or mobile device*. Likewise the popularity of job marketplace sites, daily news digests and blogs have skyrocketed. Market research agency Mintel also predicted that the UK online dating market will grow from £165m to £225m by 2019**.
 
Fraudsters are capitalising on what are sometimes modest sign-up requirements and security features of some media sites to test stolen identity credentials and cultivate opportunities to monetise stolen credit cards. Cybercriminals are essentially looking to game the system, either by creating multiple free trials for content-streaming accounts or by selling accounts online at a reduced rate.
 
“One of the key trends we’re noticing is the complex, interconnected nature of attacks as cybercriminals use stolen identity credentials to cultivate lists, launch botnet attacks and compromise trusted user accounts,” says Vanita Pandey, vice president of product marketing and strategy for ThreatMetrix.
 
“Fraudsters see the potential of digital-first businesses such as ridesharing, social networking and video streaming where consumers are spending their time and money, and they want a piece of the pie,” adds Pandey. “With ridesharing apps, for instance, fraudsters are taking trips using stolen credit cards or breeding two-party fraud by using a fake driver account and ‘accepting customers’ using stolen credentials. Some cybercriminals are even leveraging ridesharing business models to create fake customer accounts and launder money via false insurance claims.”
 
ThreatMetrix Q2 2017 Cybercrime Report – download now
 
*Source: WeAreSocial/Hootsuite Digital Media Report January 2017
**Source: Mintel Global Dating Insights Report

FacebookTweetLinkedIn
Tags: CybersecurityTechnology
ShareTweet
Previous Post

Equifax hit by critical breach leaving 143m affected – Cyber experts give insight

Next Post

Putting app security centre stage against threat actors

Recent News

A Roadmap for Becoming a Penetration Tester in 2023

A Roadmap for Becoming a Penetration Tester in 2023

May 31, 2023
Electronic tablet with social media icons, hands holding screen.

Research Reveals UK Firms Plan to Embrace New Era of Digital Identity

June 1, 2023
AWS and Salt

Salt Security Attains AWS Security Competency Status 

May 31, 2023
Purple spiral circle. Text reads "Centripetal", san-serif.

Centripetal Extends Innovative CleanINTERNET® Technology to the Cloud

May 31, 2023

The IT Security Guru offers a daily news digest of all the best breaking IT security news stories first thing in the morning! Rather than you having to trawl through all the news feeds to find out what’s cooking, you can quickly get everything you need from this site!

Our Address: 10 London Mews, London, W2 1HY

Follow Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

This site uses functional cookies and external scripts to improve your experience.

Privacy settings

Privacy Settings / PENDING

This site uses functional cookies and external scripts to improve your experience. Which cookies and scripts are used and how they impact your visit is specified on the left. You may change your settings at any time. Your choices will not impact your visit.

NOTE: These settings will only apply to the browser and device you are currently using.

GDPR Compliance

Powered by Cookie Information