How Threats Increase in Internet Time

Cybercrime incidents and costs increase with each passing minute on the Internet.

A famous song from the musical Rent pointed out that there are 525,600 minutes in a year. A new report looks at just how much Internet evil can fit into each minute of the year, and it's definitely not all about love.

It's about the numbers inside the $1,138,888 dollars of cybercrime cost each minute that add up to $600 billion in damage each year, according to a February, 2018 McAfee report on the impact of cybercrime. And the details of those numbers tell a story of growing risk due to a growing computer footprint, detailed in The Evil Internet Minute, a new infographic generated by researchers at RiskIQ.

"Some of it [the data] is based on reports from companies like McAfee and Gartner, but the research comes from our own systems," says Yonathan Klijnsma, threat researcher at RiskIQ. He explains that RiskIQ builds large databases from information found in global data crawling and used portions of that data to draw conclusions on individuals threats and trends.

Those conclusions involve numbers that become almost mesmerizing as the time scales and dollar amounts change: For example, RiskIQ reports that four potential vulnerable Web components are discovered each minute. That works out to more than two million such discoveries every year.

Klijnsma worries more, however, about active criminal activities like the .07 incidents of Magecart (36,792 per year) that RiskIQ found. "People thought the Ticketmaster breach was a one-off based on Magecart, but it's a credit-card skimming group," Klijnsma says, referring to the June incident. Instead, he says, the group has taken the "classic" credit card skimmer attack and moved it from the gas pump and ATM to e-commerce sites.

The lesson for organizations from reports such as this? "You want it to be more expensive for the bad guys," he says. "You need to keep your stuff updated. People tend to install things and forget about them," Klijnsma says.

"Whatever's online immediately starts to go out of date. If you leave it on the Internet, it will be out of date in a few months," he says. 

Beyond up-to-date software, he says, "One golden rule is limiting exposure. Nothing goes accessible online until it really has to."

Related Content:

Learn from the industry's most knowledgeable CISOs and IT security experts in a setting that is conducive to interaction and conversation. Early bird rate ends August 31. Click for more info

About the Author(s)

Curtis Franklin, Principal Analyst, Omdia

Curtis Franklin Jr. is Principal Analyst at Omdia, focusing on enterprise security management. Previously, he was senior editor of Dark Reading, editor of Light Reading's Security Now, and executive editor, technology, at InformationWeek, where he was also executive producer of InformationWeek's online radio and podcast episodes

Curtis has been writing about technologies and products in computing and networking since the early 1980s. He has been on staff and contributed to technology-industry publications including BYTE, ComputerWorld, CEO, Enterprise Efficiency, ChannelWeb, Network Computing, InfoWorld, PCWorld, Dark Reading, and ITWorld.com on subjects ranging from mobile enterprise computing to enterprise security and wireless networking.

Curtis is the author of thousands of articles, the co-author of five books, and has been a frequent speaker at computer and networking industry conferences across North America and Europe. His most recent books, Cloud Computing: Technologies and Strategies of the Ubiquitous Data Center, and Securing the Cloud: Security Strategies for the Ubiquitous Data Center, with co-author Brian Chee, are published by Taylor and Francis.

When he's not writing, Curtis is a painter, photographer, cook, and multi-instrumentalist musician. He is active in running, amateur radio (KG4GWA), the MakerFX maker space in Orlando, FL, and is a certified Florida Master Naturalist.

Keep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox.

You May Also Like


More Insights