10 Things You Need to Know About Data Theft

10 Things You Need to Know About Data Theft

Cybercriminals Increasingly Target Credit Card DataCybercriminals Increasingly Target Credit Card Data

Payment card data continues to top the list of types of data compromised, with 55% of data thefts in 2013 involving payment card data.

Cybercriminals Steal Confidential Information More OftenCybercriminals Steal Confidential Information More Often

Cybercriminals go after sensitive and confidential information, like financial credentials, internal communications, personally identifiable information and various types of customer records. This type of theft increased 33% in 2013.

Targeted Assets: Commerce and Data SystemsTargeted Assets: Commerce and Data Systems

E-commerce made up 54% of targeted assets, point-of-sale breaches accounted for 33%, and data centers for 10%.

Who Suffers the Most?Who Suffers the Most?

Most victims (59%) live in the U.S., more than four times the next victim location, which is the United Kingdom (14%). Australia ranks third at 11%.

Leading Compromised IndustriesLeading Compromised Industries

35% of attacks struck retailers. Food and beverage ranks second at 18%. Hospitality came in third at 11%.

Malware HostsMalware Hosts

The top three malware countries where cybercriminals are hosted: U.S.: 42%, Russia: 13%, Germany: 9%

Spam Still a FavoriteSpam Still a Favorite

Cybercriminals love spam. 70% of inbound e-mail included spam, a 5% drop since 2012. 59% of malicious spam included malicious attachments and 41% included malicious links.

Favorite E-Mail Subject LinesFavorite E-Mail Subject Lines

The top three subject lines of spam e-mails are: “Some Important Information Is Missing.” “Bank Statement. Please Read.” “Important—Payment Overdue.”

Cybercriminals Rely on Java AppletsCybercriminals Rely on Java Applets

Java applets are cybercriminals’ delivery method of choice, with 78% of detected exploits taking advantage of Java vulnerabilities.

Cybercriminals Exploit Third-Party Plug-InsCybercriminals Exploit Third-Party Plug-Ins

85% of cybercriminal activity detected in 2013 exploited third-party plug-ins, including Java, Adobe Flash and Acrobat Reader.

CIO Insight Staff
CIO Insight Staff
CIO Insight offers thought leadership and best practices in the IT security and management industry while providing expert recommendations on software solutions for IT leaders. It is the trusted resource for security professionals who need network monitoring technology and solutions to maintain regulatory compliance for their teams and organizations.

Latest Articles