XXI century cybercrime stats and what to expect in the 2020s
It is believed that a look back on the past can give valuable clues on what the future holds. How about applying this theory to cybercrime? From phishing and ransomware to mobile malware and cryptojacking, this century has already become a cradle of deleterious phenomena in this arena. This article encompasses some of the key cybercrime stats to date and outlines the top challenges that will likely emerge in the 2020s.
Did you know that Facebook pays $20 per month for installing its own pseudo-VPN?
Many Internet users do not believe that they can earn up to $20 a month selling their personal data. The latest scandal around Facebook shows that this statement has its right to exist. It turned out that Facebook has been running a secret Atlas project for more than two years, within which people get paid up to $20 a month for installing and using on their smartphones Facebook branded pseudo-VPN.
Understanding What, in Fact, Is Personal Data
Ipswich boy Ribald from the X century, turned the bark into a carrier of personal data, combining a drawing of his father and his name. Personal data is understood as a set of information that allows you to identify an individual - a set that unambiguously indicates a specific person. In some jurisdictions, like European countries, personal data is a broad term and may include various quasi-identifiers that may lead to the identification of a particular person.
Apple Mail client exposed to a crypto security bug
The sad truth is that the uncrackable security of macOS is a myth debunked quite a while ago. Ransomware, crypto miners, browser hijackers and adware compose an incomplete list of cyber threats successfully targeting this platform. To its credit, though, Apple keeps the scale of these attacks much lower than on competing operating systems, making malicious agents come up with non-standard workarounds like the recently discovered EFAIL compromise vector.
Researchers Found the Biggest Botnet Dedicated to Hidden Monero Mining
As the phenomenon of furtive cryptocurrency mining splashed onto the scene and took the world by storm, computer botnets underwent an apropos evolution. Rather than bolster spam campaigns spreading ransomware, they are now leveraged to combine numerous zombified machines into a huge Monero mining pool.