CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders
CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders
  • Home
  • News
  • Insights
  • Resources
Home
Cyber Crime
Latest
  • Latest
  • Oldest
  • Random
  • A to Z

Cyber Crime

Senior woman giving credit card details on phone showing $2.7 billion in personal and business losses through internet crime
Cyber SecurityNews

FBI Annual Internet Crime Report: $2.7 Billion in Losses Headlined by Non-Payment Scams, Business Email Compromise

May 3, 2019
In 2018, 351,936 complaints were filed with the FBI, averaging around 900 a day, and these successful internet crime schemes resulted in about $2.7 billion in personal and business losses.
Read More
Facebook app on phone sitting on laptop showing Facebook cybercrime groups using the social media platform to conduct cybercrime activities
Cyber SecurityInsights

Facebook Cybercrime Groups More Prevalent Than You Might Think

April 16, 2019
Cisco Talos recently highlighted the existence of 74 Facebook cybercrime groups with over 385,000 members. A growing concern that Facebook has become a platform to conduct cybercrime activities in plain sight.
Read More
Hacker programming in technology environment showing profitability of cyber extortion
Cyber SecurityInsights

New Report Shows Just How Profitable Cyber Extortion Can Be

April 4, 2019
In just a few years, cyber extortion has gone from a fringe hacking activity to something that is now very much mainstream. In fact, it’s now possible for hackers to make upwards of $360,000 per year by joining a cyber extortion team.
Read More
Cyber criminal standing in front of screens showing the problem of social media cyber crime
Cyber SecurityNews

Cyber Criminals Have Turned Social Media Cyber Crime Into a $3 Billion Business

March 12, 2019
The problem of social media cyber crime is growing at an astonishing rate and is now a $3 billion business. According to a recent report, nearly 1 in 5 organizations worldwide are now infected by malware distributed by social media.
Read More
Crime scene tape with blurred forensic law enforcement background showing need for digital forensics
Cyber SecurityInsights

Is Digital Forensics Effectively Joining the Dots in Today’s Corporate Crime Scenes?

March 1, 2019
While digital forensics software and services that are used in cases of cybercrime currently account for just about $430 million, the growth of cybercrime is likely to generate substantial demand in the years to come.
Read More
Hacker using laptop to execute a cyber heist
Cyber SecurityNews

Bangladesh Bank Files Suit against RCBC over $81 Million Cyber Heist

February 14, 2019
Bangladesh has initiated a lawsuit against Rizal Commercial Banking Corp for the 2016 cyber heist of US$81 million, supported by the Federal Reserve Bank of New York.
Read More
Rear view of a hacker using multiple computers for identity theft and cybercrime
Cyber SecurityInsights

How Your Organization Can Combat Identity Theft and Cybercrime in 2019

February 6, 2019
No one would argue that 2018 was a turbulent year for cybercrime and identity theft, and there’s no doubt that we’ll continue to outpace this volume and velocity. How can organizations empower themselves – and their employees – to protect sensitive personal and company data?
Read More
Man typing on keyboard of desktop PC showing the dangers of insider threats
Cyber SecurityInsights

Insider Threats: Not Just That Unhappy Employee

September 12, 2018
Recent Imperva survey found that nearly half of security professionals said they could implement an insider attack if they wished to. Insider threats remains one of the top cybersecurity threats to businesses.
Read More
Hacker using mobile smartphone for phishing and ransomware
Cyber SecurityInsights

Cybersecurity in 2018: What You Need to Know

July 9, 2018
Cybersecurity issues in 2018 are becoming a day-to-day struggle for businesses. To keep your organization and customers secure, you will need to know the latest movements in cybersecurity.
Read More
Executives discussing cybersecurity defenses
Cyber SecurityInsights

Getting Defensive: Expert Advice on Cybersecurity

July 2, 2018
CPO Magazine sat down with Prashant Pai and Scott Stransky at Verisk to understand what companies should consider when shoring their cybersecurity defenses.
Read More
Load More

Latest

Shield Icon against data and network showing zero trust and attack surface

Gartner: Slow Adoption and Expanding Attack Surface; Zero Trust Will Not Stop Over 50% Of Attacks by 2026

Hands holding smartphone using Google Fi service showing T-Mobile data breach

T-Mobile Data Breach Includes Massive Compromise of Google Fi Service, Unknown Quantity of Customer Records Exposed

Data Privacy’s Tipping Point: Where We Go From Here

Hacker using mobile smartphone calling victim showing remote monitoring and management software used in phishing of federal agencies

Hackers Breached Multiple Federal Agencies via Remote Monitoring and Management Software

- Advertisement -

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use

Stay Updated

CPO Magazine

News, insights and resources for data protection, privacy and cyber security professionals.

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use
Do Not Sell My Data

Stay Updated

Follow Us

© 2022 Rezonen Pte. Ltd.
CPO Magazine - News, Insights and Resources for Data Privacy, Protection and Cybersecurity Leaders
  • Home
  • News
  • Insights
  • Resources
    Start typing to see results or hit ESC to close
    U.S. Data Breach Regulations EU GDPR Facebook
    See all results