top of page
Working Mom

How Safe are you on the Internet?

37%
of US teenagers have been cyberbullied

50%
of all Americans were impacted by identity theft in 2021

$ 52 bn
financial loss of identity theft & fraud in 2021

Third-party app stores host mobile malware

So where’s all that mobile malware coming from? We’ve got a stat for that. A Symantec report found third-party app stores hosted 99.9 percent of discovered mobile malware.

 

A third-party app is a software application made by someone other than the manufacturer of a mobile device or its operating system. For instance, app developers create a lot of applications for Apple’s or Google’ operation systems. Some of those apps may only be available on third-party app stores.Third-party app stores might offer a normally pricey app for free. But the real cost might be malware installed on your device. That’s why it’s a good idea to stick to reputable purveyors like Google Play and Apple App Store.

Crypto mining is most detected malware in 2021

Cryptojacking is the unauthorized use of someone else's device to mine cryptocurrency. It happens when a victim unknowingly installs cryptocurrency miner malware through a phishing link ormalicious website enabling the criminals to access the victim's device.

Cryptocurrency miners were the most common malware, with 74,490 such threats detected in the first half of 2021 by Atlas VPN.

 

Throughout 2021, the CrowdStrike team has observed the volume of cryptojacking intrusions more than quadruple compared to 2020.

$300,478,433 USD has been stolen via email spoofing

Email spoofing is the fabrication of an email header in the hopes of duping the recipient into thinking the email originated from someone or somewhere other than the intended source. The ultimate goal of email spoofing is to get recipients to open, and possibly even respond to, a solicitation. The more malicious spoofed messages can cause significant problems, and real security threats. In 2019 $300,478,433 USD has been stolen via email spoofing.

How Smart are you?

Smart devices like Smartwatches, Smart Fridges, Smart Toys and Smart Lights are becoming more and more pupular, but did you know that these smart home devices can open the door for hackers to spy on you and steal from you? Irresponsibly implementing these technologies around your home can put your privacy and safety at risk.

Just how vulnerable are internet connected devices? Symantic research in 2015 found multiple vulnerabilities in 50 commercially available devices. They included a “smart” door lock that could be opened remotely online without a password.
That’s one reason why cyber security requires comprehensive coverage - to help protect your devices, privacy, personal information, and home. The number of connected things is growing exponentially, which is a big opportunity for Cybercriminals.

bottom of page