Workflow
Cybercrime
icon
Search documents
Why the Digital World Needs Cyber Diplomats | Sanjana Rathi | TEDxGCEM
TEDx Talks· 2025-07-16 16:24
Cybersecurity Threats & Impact - Cybercrime is a global epidemic, not a niche concern, affecting ordinary people and causing them to lose their savings [1] - A farmer in India lost approximately ₹100,000 (₹1 Lakh) to an international phishing attack, highlighting the real-world impact of cybercrime [1] - A ransomware attack on one of the largest shipping companies caused approximately $300 million in damages [2] - In 2017, an attack on around 20 ships in the Black Sea showed navigation systems placing ships approximately 32 kilometers inland, demonstrating risks to life and the economy [3] Cybersecurity Challenges & Evolution - The world failed to evolve fast enough to meet digital threats, with laws and systems lagging behind technology [1] - Governments are investing billions of dollars in new institutions and policies, but building more silos instead of agility [1] - The issue is not a failure of intention, but a failure of evolution in cybersecurity [1] Cyber Diplomacy as a Solution - Cyber diplomacy is presented as a necessary next step in global evolution, blending technology and diplomacy [1][3] - Cyber diplomats are needed to understand firewalls, foreign policy, encryption, and empathy, acting swiftly across borders [1] - Cyber diplomats should be trained not just in response, but in anticipation, acting as new diplomats of peace across digital frontiers [1] - Cyber diplomacy can bring a solution to critical infrastructure systems that are increasingly digitized and vulnerable to collapse [1][3]
What to Do When Your Identity Is Used in a Scam? | Migs Bustos | TEDxRizalStreet
TEDx Talks· 2025-07-10 16:08
Industry Trend & Risk Awareness - The industry faces a growing threat from love scams and deep fakes, impacting individuals and families [3] - Scammers use stolen identities to build relationships and defraud victims of money [3][4] - Cybercriminals are evolving their methods, including using QR codes for phishing [16][17] - The Philippines ranks seventh globally in connection to love scams [15] Individual & Corporate Security Measures - The industry emphasizes the importance of regularly changing passwords and setting social media profiles to private to mitigate risks [18][19] - It is crucial to be vigilant about dubious links and requests for money in messaging apps [17] - Encourages individuals to report suspicious activity and break the stigma surrounding scams [21][22] Data & Statistics - In 2023, Filipinos may have lost around 10 linked to romance scams, increasing to 45 in 2024 [15] - Globally, approximately 1,000 people are linked to romance scams [15] - One victim lost $2,000, equivalent to approximately 9 to 11 million Philippine pesos [8]
Whispers of the Web: Exposing Data Privacy and Cyber Deception | Amit Dubey | TEDxNIIT University
TEDx Talks· 2025-07-09 15:14
Data Collection and Usage - Social media platforms collect extensive user data, including location, browsing history, contacts, and even health and fitness information [5][6] - Platforms like Facebook can infer sensitive information such as physical address, political and religious beliefs, and sexual orientation [7][8] - Companies are collecting data not just for targeted advertising but to control user behavior and decision-making [27] - Criminals exploit readily available personal data to manipulate individuals, emphasizing that users are targeted, not their devices [23] Security Vulnerabilities and Exploits - Applications with SMS access can be exploited to read and send OTPs, leading to financial losses [12][15] - Criminals are hacking individuals to reach their devices [23] - Even seemingly harmless actions, like a child installing an app for gaming currency, can have severe consequences [22] - User activities across devices linked to the same Gmail account can be tracked and exploited [18] Digital Footprint and Privacy - Individuals leave a unique digital fingerprint based on their internet usage patterns [24] - Google tracks user locations and activities precisely over many years, creating a detailed timeline [10][11] - This data can be used as court-admissible evidence [11] Recommendations - Users should be aware of the permissions granted to applications on their phones [13] - Users can check their Google activity to see what data is being tracked [17] - The industry should recognize that users are products of the data they consume, influencing their thoughts and aspirations [2]
Q1/2025 Gen Threat Report Reveals AI-Driven Scams Redefining Cybercrime
Prnewswire· 2025-05-28 13:00
Core Insights - The Q1/2025 Gen Threat Report reveals significant increases in cyber threats, including a 186% rise in breached personal information and a 466% increase in phishing reports [2][4][5] - The report highlights the evolution of online threats, with attackers utilizing AI and personalized tactics to enhance deception [3][7] - Gen has successfully protected over 4 million users from Scam-Yourself Attacks, which involve individuals being manipulated into compromising their own devices [7][8] Data Breaches - There was a 36% increase in the number of data breaches faced by companies compared to the previous quarter, with individual breached records rising by over 186% [4] - Attackers are employing advanced infostealers, making data compromise faster and harder to detect [4] Phishing Scams - Phishing reports surged by 466%, now accounting for nearly 32% of all scam submissions to the Norton Genie scam detector [5] - Phishing is identified as the fastest-growing threat, with generic scams making up 51% of reports [5] - Attackers are using dynamic DNS services and subdomain providers to create deceptive login pages, making phishing attempts harder to detect [6] Scam-Yourself Attacks - Gen protected over 4 million users from Scam-Yourself Attacks, where individuals are tricked into infecting their own devices [7] - Attackers are utilizing AI-generated personas and deepfake influencers to deliver malicious campaigns [7] - Fake browser update scams have increased to over 17 times the previous quarter's levels, tricking users into installing malware [8] Financial Threats - Mobile financial threats are on the rise, with malware exploiting accessibility features to steal sensitive data [10] - Digital currencies are increasingly targeted, with one campaign linked to the US presidential inauguration resulting in nearly $4 million stolen through over 2,000 transactions [11] Company Overview - Gen is a global leader in Cyber Safety, providing solutions through trusted brands like Norton, Avast, and LifeLock [1][13] - The company aims to empower individuals to live their digital lives safely and confidently, serving nearly 500 million users in over 150 countries [13]
Nasdaq Sell-Off: These 3 "Safe Stocks" Finally Look Like Bargains
The Motley Fool· 2025-03-11 10:00
The plunge is punishing some stocks far more than is merited. That spells opportunity for level-headed investors.Panicked yet? It would be a little surprising if you weren't at least a bit. Now down more than 10% from its most recent peak, the Nasdaq Composite (NASDAQINDEX: ^IXIC) is officially in correction territory. Such big tumbles often precede even more weakness, even if that continued selling is only rooted in fear, and the result of a self-fulfilling prophecy.However, the Nasdaq's steep pullback is ...