Name:
search
Internet Think Tank
Business Consulting
Home       Overview       Tools       Research Proposals            
Attack Profiles

How types of cyber crime are trending
Trending Attack Profiles

A report on where the next attack may come from

1. Fake News

Fake news is the latest in the surge of new cyber attacks. Fake news is the proliferation of misinformation to sway public opinion, influence public choices and promote falsehoods for political purposes. This type of cyber crime is the fastest on the rise, cutting across all forms of popular social media. The primary targets are governments and companies, where the internet has become the greatest vehicle to disseminate propaganda.

2. Cyber Espionage

Cyber espionage has also grown over the past year, where government and company information are stolen to undermine institutions. Information is stolen from databases, email accounts, and digital storage devices. The stolen information can be used for gaining access to accounts, stealing money or other assets, and medical records. Alternatively, such information can and is used to blackmail companies or individuals.

3. Cyber Ransom

Cyber ransom is the use of sensitive and private information for extorting money or concessions. It is a recent form of cyber crime that holds individuals, organizations, companies, and government agencies hostage in return for a ransom. Cyber attackers are no longer just interested in taking over systems, they are now targeting to take over the actions of others. This type of attack has seen a significant increase over the past two years and a particularly sharp increase in the area of political elections.

4. System Takeover

The largest and most damaging form of cyber attack is the system takeover. This covers an ever increasing number of systems connecting to computer networks. The Internet is by far the largest network which touches over millions of IP addresses. With the advent of Internet of Things (IoT), system takeovers pose a new threat to society. Smart homes, security systems, baby monitoring devices, and automobiles all increase the stakes of system takeovers. Emerging technologies such as driverless cars are susceptible to system takeovers. These attacks also include Distributed Denial of Service (DDoS) attacks, which effectively takeover one's system by denying others access to its normal functionality. This particular type of cyber attack is primarily on the rise due to the increase in our global network coupled with the proliferation of devices connected to the Web.

5. Piracy

Piracy is a form of cyber attack that undermines rights ownership. In doing so, pirates steal what is not theirs. Pirates not only enjoy the pirated goods for themselves, but also openly share or sell those goods through repeated copying of digital assets for others to enjoy. The particular type of goods most effected are pure information assets: music, motion pictures, print media and software. These assets are consumed by simply copying the information that represents them. Therefore, by simply copying such information sufficiently enough, the asset can be used by others. Trends around piracy are mixed, but recent use of streaming services is deflating interest around piracy. The dynamics describing this trend reflects the role certain technologies play on shaping consumer behavior.

6. Fraud

Commerce is no stranger to fraud. With more transactions taking place over digital channels, fraud has expanded significantly. The wide variety of payment channels and payment methods have given cyber criminals more opportunities to undermine transactions from the seclusion of their own homes or remote locations. Fraud covers not only the attack on individual transactions, but also the stealing of credit card numbers, bank account credentials and personal identities. This trend is on the rise primarily due to the massive increase in payment methods and outlets adopting ecommerce solutions.


How can we help?

inttk

About

inttk

Careers

inttk

Community

inttk

Feedback

inttk

Contact

inttk

Terms of Use