Vulnerabilities / Threats
3/22/2010
06:10 PM
Connect Directly
LinkedIn
Twitter
Google+
RSS
E-Mail
50%
50%

Symantec's Norton Rates Cities For Cybercrime Risk

Cities with lots of Internet use and free Wi-Fi are considered to be the riskiest places for cybercrime.

Seattle, Washington, has been declared the riskiest city in America for cybercrime, according to a survey released on Monday by Symantec's Norton product group.

"With more people than ever relying on the Internet to stay in touch, shop and pay their bills, feeling confident and secure in our information-driven world is vital," said Norton Internet safety advocate Marian Merritt in a statement. "This study highlights the cities most at risk of cybercrime and reminds individuals, families and businesses across the country of the hazards they face each time they go online."

Known for its rain and coffee, among other things, Seattle took the top spot in the survey as a result of the number of malicious cyber attacks and malware detected in the area, in conjunction with the ubiquity of Wi-Fi hotspots and the "percentage of the city population engaging in computer risky computer use, such as online purchases, e-mail, and accessing financial information."

By Norton's standard, a safe computer appears to be one that's unplugged.

Other criteria used to measure risk include the number of spam zombies and the number of bot infected machines detected in the city.

According to Norton, almost 68% of Seattle residents are regular Internet users and about 29% use the Internet at least five times daily. In addition, more people in Seattle check their bank statements and pay their bills online (about 27%) than in any of the other 50 largest U.S. cities covered in the survey.

Seattle's proximity to Redmond, home of Microsoft, which makes the world's most popular -- and most attacked -- operating system, has no bearing on the survey data, a Symantec spokesperson said.

San Francisco, less than an hour's drive north of Apple, Google and the rest of Silicon Valley, earned a spot as the fourth riskiest city for cybercrime, due to high levels of Internet use and to having more Wi-Fi hot spots per capita than any other city in the survey. San Francisco has 113 Wi-Fi hotspots per 100,000 residents, compared to 103 in Seattle. Almost 60% of San Franciscans have broadband connections, more than any other city, according to Norton.

The ten riskiest cities for cybercrime, by Norton's measure, are: 1) Seattle; 2) Boston; 3) Washington, D.C.; 4) San Francisco; 5) Raleigh, N.C.; 6) Atlanta; 7) Minneapolis; 8) Denver; 9) Austin, Texas; 10) Portland, Ore.

Annual losses due to cybercrime in 2009 reached $560 million, up from $265 million in 2008, according to the Internet Crime Complaint Center's 2009 Annual report.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2015-4231
Published: 2015-07-03
The Python interpreter in Cisco NX-OS 6.2(8a) on Nexus 7000 devices allows local users to bypass intended access restrictions and delete an arbitrary VDC's files by leveraging administrative privileges in one VDC, aka Bug ID CSCur08416.

CVE-2015-4232
Published: 2015-07-03
Cisco NX-OS 6.2(10) on Nexus and MDS 9000 devices allows local users to execute arbitrary OS commands by entering crafted tar parameters in the CLI, aka Bug ID CSCus44856.

CVE-2015-4234
Published: 2015-07-03
Cisco NX-OS 6.0(2) and 6.2(2) on Nexus devices has an improper OS configuration, which allows local users to obtain root access via unspecified input to the Python interpreter, aka Bug IDs CSCun02887, CSCur00115, and CSCur00127.

CVE-2015-4237
Published: 2015-07-03
The CLI parser in Cisco NX-OS 4.1(2)E1(1), 6.2(11b), 6.2(12), 7.2(0)ZZ(99.1), 7.2(0)ZZ(99.3), and 9.1(1)SV1(3.1.8) on Nexus devices allows local users to execute arbitrary OS commands via crafted characters in a filename, aka Bug IDs CSCuv08491, CSCuv08443, CSCuv08480, CSCuv08448, CSCuu99291, CSCuv0...

CVE-2015-4239
Published: 2015-07-03
Cisco Adaptive Security Appliance (ASA) Software 9.3(2.243) and 100.13(0.21) allows remote attackers to cause a denial of service (device reload) by sending crafted OSPFv2 packets on the local network, aka Bug ID CSCus84220.

Dark Reading Radio
Archived Dark Reading Radio
Marc Spitler, co-author of the Verizon DBIR will share some of the lesser-known but most intriguing tidbits from the massive report