Skip to main content
XXI century cybercrime stats and what to expect in the 2020s

XXI century cybercrime stats and what to expect in the 2020s

It is believed that a look back on the past can give valuable clues on what the future holds. How about applying this theory to cybercrime? From phishing and ransomware to mobile malware and cryptojacking, this century has already become a cradle of deleterious phenomena in this arena. This article encompasses some of the key cybercrime stats to date and outlines the top challenges that will likely emerge in the 2020s.

David Balaban
David Balaban
64
Did you know that Facebook pays $20 per month for installing its own pseudo-VPN?

Did you know that Facebook pays $20 per month for installing its own pseudo-VPN?

Many Internet users do not believe that they can earn up to $20 a month selling their personal data. The latest scandal around Facebook shows that this statement has its right to exist. It turned out that Facebook has been running a secret Atlas project for more than two years, within which people get paid up to $20 a month for installing and using on their smartphones Facebook branded pseudo-VPN.

John Dee
John Dee
127
bing-test-table

bing-test-table

David Balaban
David Balaban
26
Understanding What, in Fact, Is Personal Data

Understanding What, in Fact, Is Personal Data

Ipswich boy Ribald from the X century, turned the bark into a carrier of personal data, combining a drawing of his father and his name. Personal data is understood as a set of information that allows you to identify an individual - a set that unambiguously indicates a specific person. In some jurisdictions, like European countries, personal data is a broad term and may include various quasi-identifiers that may lead to the identification of a particular person.

John Dee
John Dee
247
Apple Mail client exposed to a crypto security bug

Apple Mail client exposed to a crypto security bug

The sad truth is that the uncrackable security of macOS is a myth debunked quite a while ago. Ransomware, crypto miners, browser hijackers and adware compose an incomplete list of cyber threats successfully targeting this platform. To its credit, though, Apple keeps the scale of these attacks much lower than on competing operating systems, making malicious agents come up with non-standard workarounds like the recently discovered EFAIL compromise vector.

John Dee
John Dee
262
Researchers Found the Biggest Botnet Dedicated to Hidden Monero Mining

Researchers Found the Biggest Botnet Dedicated to Hidden Monero Mining

As the phenomenon of furtive cryptocurrency mining splashed onto the scene and took the world by storm, computer botnets underwent an apropos evolution. Rather than bolster spam campaigns spreading ransomware, they are now leveraged to combine numerous zombified machines into a huge Monero mining pool.

John Dee
John Dee
210