Showing posts with label statistics. Show all posts
Showing posts with label statistics. Show all posts

Tuesday, December 6, 2022

Sophos 2023 Threat Report

The Sophos 2023 Threat Report uncovers the latest cyberthreat trends and provides the insights you need to defend against evolving attacks.

Based on the research and real-world experiences of Sophos X-Ops – a new cross-operational unit that links Sophos' threat, incident response and AI cybersecurity experts, the report covers:
  • The lasting cyber impact of the war in Ukraine
  • The maturity of the “as-a-service” industry and how it has put advanced threat tactics into the hands of nearly any criminal
  • How ransomware operators have evolved their activities and mechanisms, both to evade detection and to incorporate novel techniques
  • A deep dive into the abuse of legitimate security tools by criminals to execute attacks
  • An analysis of the threats facing Linux, Mac, and mobile systems

Wednesday, February 9, 2022

Investigation-driven Findings Identify Major Spikes in Industrial Espionage Incidents

 Key findings of the DTEX Systems 2022 Insider Risk Report include:

  • The ‘Super Malicious Insider’ accounted for 32% of malicious insider incidents...

  • 72% year-over-year increase in actionable insider threat incidents;

  • 42% of actionable incidents were related to IP and data theft, including industrial espionage incidents related to the theft of trade secrets, source code, and active collusion with a foreign nexus;

  • 75% of insider threat criminal prosecutions were the result of remote workers;

  • 56% of organizations had an insider data theft incident resulting from employees leaving or joining companies;

  • +200% year-over-year increase in data loss associated with users taking screenshots during confidential Zoom and Microsoft Teams meetings; and

  • +300% year-over-year increase in employees utilizing corporate assets for non-work activities.

For more than a decade, insider threats have been categorized as either malicious, negligent or compromised. Based on the findings of the DTEX i3 team, a fourth persona has emerged—the Super Malicious Insider. 

The Super Malicious Insider is a technically proficient employee who is acutely aware of an organization’s cyber security architecture, solutions, and processes and who understands both the technical and human analyst limitations in detecting insider threat indicators. more

It is time for your organization to implement a corporate counterespionage plan.

Friday, July 30, 2021

3 in 10 Home Sellers Use Spycams During House Tours

Spycams are reportedly being used by home sellers who want to ink a deal sooner rather than later.

According to a recent LendingTree survey, 3 in 10 home sellers admit to using hidden cameras when they host an open house.

The survey, which was commissioned from the experience management firm Qualtrics, notably had a small sample size of home sellers – 346 – compared to home buyers – 1,160 – for a total sample size of 2,050. 

Of those sellers who admit to using cameras without notifying buyers, 49% claim they do so to find out what buyers "do and don’t like about their home." more

Learn how to spot spycams.

Tuesday, July 27, 2021

Corporate Espionage: Things are Tough All Over

Korea's tech industries are increasingly becoming the target of technology and intellectual property theft that has been growing in sophistication and harmfulness...

With industrial espionage, competitors' poaching of skilled employees, cyberattacks and other forms of theft being rampant, the world has been introducing stricter rules to ban theft of competitors' technologies across borders...

Industrial espionage and cyberattacks are still favored forms of theft, with the targets changing from conglomerates to their subcontractors, many of them small- and medium-sized enterprises (SMEs) that are often ill-equipped in terms of security and management. more


Sunday, November 29, 2020

Verizon’s 2020 Cyber Espionage Report


Verizon’s 2020 Cyber Espionage Report
, the result of a total of 14 years of research into global data breaches and threat actor activity, has come up with some illuminating observations about long-term patterns of cyber spying. 

Among the major highlights are that criminal organizations and disgruntled former employees play a trivial role in overall attempts, that the public sector is the preferred target of attackers and that desktops and laptops are far more likely to be breached than phones...

Though there is some market for corporate secrets in the criminal underworld, the research shows that these figures make up a small amount of overall cyber espionage incidents: about 4% are from organized crime, and about 2% are from former employees. An overwhelming 85% come from state-affiliated groups, with an additional 8% from nation-states. more

Friday, November 27, 2020

GPS Trackers, Hidden Cameras on the Rise During Pandemic

Domestic violence offenders are increasingly using GPS trackers and surveillance cameras to monitor their victims, with support workers saying technology-based abuse has escalated during the pandemic... 

The report, co-authored by researchers from WESNET, Curtin University and the University of New England, surveyed 442 support workers from around the country who specialise in helping victims of family and sexual violence...

In 2020, nearly one in three frontline workers said they saw victims tracked with GPS apps or devices "all the time". Five years ago, only 8 per cent of workers saw that type of abuse that often.

Surveillance camera misuse was seen "all the time" or "often" by 42 per cent of support workers in 2020, up from 16 per cent in 2015. more

Learn how to detect covert cameras.

Wednesday, May 27, 2020

Data Breach Report: 28% Involved Small Businesses

Almost a third or 28% of data breaches involved small businesses. The data comes from one of the most acclaimed cybersecurity reports in the industry, the Verizon Business 2020 Data Breach Investigations Report (2020 DBIR).

Currently, in its 13th year, the DBIR is an industry-standard when it comes to gauging the state of cybersecurity around the world...

Click to Enlarge
With small businesses making up 28% of the breaches, owners have to be more proactive in protecting their digital presence. Whether it is an eCommerce site, blog, V-log, podcast, or other digital assets, you have to protect your domain. This not only ensures your data is safe, but it is one more tool you can use to attract new customers; robust security. more

Sunday, November 17, 2019

The New York Times Reports: "Bugging Epidemic"

With surveillance gear cheaper and easier to use, security experts say checking your environment for cameras and microphones is not a crazy idea...

A growing array of so-called smart surveillance products have made it easy to secretly live-stream or record what other people are saying or doing. Consumer spending on surveillance cameras in the United States will reach $4 billion in 2023, up from $2.1 billion in 2018, according to the technology market research firm Strategy Analytics. Unit sales of consumer surveillance devices are expected to more than double from last year.

The problem is all that gear is not necessarily being used to fight burglars or keep an eye on the dog while she’s home alone. Tiny cameras have been found in places where they shouldn’t be, like Airbnb rentals, public bathrooms and gym locker rooms. So often, in fact, that security experts warn that we are in the throes of a “bugging epidemic.” more

Spybuster Tip #621: Conduct your own sweeps for covert spycams. Learn how.

Friday, July 12, 2019

Eavesdropping and TSCM Trends Track Each Other


Conclusion: As organizations and individuals realize that electronic eavesdropping is escalating, they search for Technical Surveillance Countermeasures (TSCM) services, aka bug sweeps.

Thursday, July 11, 2019

New Report Projects the Size of the World Spycam Market 2019-2025

An extensive analysis of the Global Spy Cameras market strategy of the leading companies in the precision of import/export consumption, supply and demand figures, cost, price, revenue and gross margins.

The report starts by an introduction about the company profiling and a comprehensive review about the strategy concept and the tools that can be used to assess and analyze strategy.

It also analyzes the company’s strategy in the light of Porter’s Value Chain, Porter’s Five Forces, SWOT analysis, and recommendation on Balanced Scorecard for supply chain analysis...

The Spy Cameras market was valued at xx Million US$ in 2018 and is projected to reach xx Million US$ by 2025, at a CAGR of xx% during the forecast period.

In this study, 2018 has been considered as the base year and 2019 to 2025 as the forecast period to estimate the market size for Spy Cameras.

This report presents the worldwide Spy Cameras market size (value, production and consumption), splits the breakdown (data status 2014-2019 and forecast to 2025), by manufacturers, region, type and application. more

If you want to fill in the X's, you'll have to purchase the report ($4,600.). 

Takeaway... It must be a monster market if professional forecast reports are covering it. But, we already knew that. ~Kevin

Wednesday, January 9, 2019

Security Awareness Report for Executives

What can executives do to create or enhance environments to enable awareness programs to succeed?

The first of its kind, the SANS Security Awareness Executive Report draws data from the 2018 Security Awareness Report to reveal a detailed analysis of what drives a thriving awareness program. more

Friday, January 4, 2019

Saturday, September 22, 2018

Wiretep Fun Fact: Estonia Beats Sweden and Findland

According to weekly Eesti Ekspress, last year Estonia's security authorities eavesdropped on a total of 4,596 calls made in provider Telia's network.

The same company's Swedish network was accessed by the Swedish authorities 3,822 times. Taking into account the countries' populations as well as Telia's market share, this means that the Estonian state's phone surveillance is ten times that of Sweden, the paper wrote.

Telia also operate a phone network in Finland, where the state listened in on 3,640 calls last year. Taking into account market share and population, this is more than the number recorded in Sweden, but still five times less than in Estonia. more

Thursday, July 12, 2018

U.S. Wiretap Report - 2017

This report covers intercepts (also known as wiretaps) concluded between January 1, 2017, and December 31, 2017, as reported to the AO, and provides supplementary information reported to the AO on arrests and convictions resulting from intercepts concluded in prior years.

Click to enlarge
Forty-eight jurisdictions (the federal government, the District of Columbia, the Virgin Islands, Puerto Rico, and 44 states) currently have laws that authorize courts to issue orders permitting wire, oral, or electronic surveillance. Table 1 shows that a total of 30 jurisdictions reported using at least one of these types of surveillance as an investigative tool during 2017. more

Friday, July 6, 2018

Infographic - Countries Where Private Security Outnumber Police

Whether they're patrolling shopping malls, conducting screening at airports or protecting VIPs, private security guards have become an increasingly common sight across the world. 

In many countries, they are armed with handguns and even dress in uniforms similar to the police.

The sector has experienced huge growth in recent years and today there are an estimated 20 million private security workers worldwide while the industry is worth approximately $180 billion. That is expected to grow even further to $240 billion by 2020, greater than the GDP of 100 countries including Portugal, Romania and Hungary.

According to research conducted by The Guardian, half of the planet's population lives in countries where there are more private security workers than police officers. more

Click to enlarge.
It is likely these are very conservative statistics, as they don't include security specialists, like: professional security consultants, Technical Surveillance Countermeasures (TSCM) specialists, private investigators, computer security specialists, and people working in the alarm and video surveillance sectors. ~Kevin

Thursday, October 19, 2017

Most of Your Employees are Snoops

A new survey of IT security professionals reveals that 92 percent of respondents say employees at their organizations try to access information that is not necessary for their day-to-day work.

The study from identity management company One Identity also shows that IT security professionals themselves are among the worst offenders for corporate data snooping. One in three respondents admit to having accessed sensitive information that is not necessary for their day-to-day work -- showing an ongoing abuse of elevated rights given to the IT security role.

More than one in three (36 percent) of IT pros admit to looking for or accessing sensitive information about their company’s performance, beyond what is required to do for their job. 71 percent of executives admit seeking out extraneous information, compared to 56 percent of non-manager-level IT security team members. Additionally, 45 percent of executives admit to snooping for or accessing sensitive company performance information specifically, compared to just 17 percent of non-manager team members.

In smaller companies the problem is worse... more

No surprise here. Over half of the eavesdropping and information loss issues crossing my path (over the last four decades) are employee related. ~Kevin

Sunday, July 23, 2017

Business Espionage: Half of German Firms Hit by Spying Last Two Years

More than half the companies in Germany have been hit by spying, sabotage or data theft in the last two years, the German IT industry association Bitkom said...

Some 53 per cent of companies in Germany have been victims of industrial espionage, sabotage or data theft in the last two years, Bitkom found – up from 51 per cent in a 2015 study...

Arne Schoenbohm, president of Germany’s BSI federal cyber agency, said many big companies and especially those operating critical infrastructure were generally well-prepared for cyber attacks. But many smaller and medium-sized companies did not take the threat seriously enough, he said...

Some 62 per cent of companies affected found those behind the attacks were either current or former employees. Forty-one per cent blamed competitors, customers, suppliers or service providers for the attacks, Bitkom said...

The BSI urged companies in Europe’s largest economy to make information security a top priority... more

Monday, April 3, 2017

Burglars and Peeping Toms Use Drones

UK - Loud music, unkempt gardens and disputed boundaries have long caused acrimony between neighbours. Now technology has brought a new grievance: low-flying drones.

As well as causing arguments between neighbours they have been used by burglars planning raids and to snoop on teenage girls sunbathing.

Figures obtained under the Freedom of Information Act showed that last year forces recorded 3,456 incidents involving drones, nearly ten a day. The true total is likely to be higher as data was not available for all forces. more

Tuesday, March 28, 2017

Smartphone Malware Up 400% in 2016

Mobile device malware infections reached an all-time high last year, according to a new Nokia Threat Intelligence Report, released Monday.

Smartphones were by far the most vulnerable devices, with infections that rose nearly 400% in 2016. Attacks on smartphones represented 85% of all mobile device infections in the second half of the year, according to the report. more