Organizer:
Fundacja Aktywni w Europie (Poland)
Partners:
Incir Genclik Grubu (Turkey)
Vocational Education Competence Centre "Riga State Technical School" (Latvia)
This publication has been realized with the financial support of the European Commission (Erasmus + Programme). It reflects the views only of the author, and the European Commission and the National Agency for Erasmus + Programme are not responsible for the information contained therein.
Cyber crime Facts and Stats Every 32 seconds, a hacker attacks someone online. Hackers attack people worldwide roughly every half a minute. This translates to a cybercrime being committed on an average of 2,244 times per day, according to internet security statistics. 85% of people posting puppy photos are trying to scam you. 1 in 36 mobile devices had high-risk apps installed. Since we all use our mobile devices for anything from making calls to playing games and browsing the Web, it would be logical to assume that we would safeguard the data that we have on them.
Human error accounts for 95% of all data breaches. The biggest data breach of all time compromised 3 billion accounts. Yahoo was the victim of one of the largest breaches of all time. In 2016, cybercriminals were able to access over 3 billion accounts of Yahoo users, making the incident one of the largest in cybercrime statistics and trends. In 2019, nearly 11,000 malicious mobile apps were blocked per day.
1 in 13 web requests leads to malware. This may not seem like a lot, but the danger is very real. Especially since about 20% of malicious domains are very new and used around 1 week after they are registered. Every 39 seconds there is a cyber attack. 43% of cyber attacks target small businesses. 75% of cyber attacks start with an email. Most companies take nearly 6 months to detect a data breach, even major ones. On average, only 5% of companies’ folders are properly protected.
Data breaches exposed 36 billion records in the first half of 2020. 4 million files are stolen every day - that’s 44 every single second. Around 95% of cloud security failures are predicted to be the customer’s fault.
Word, Powerpoint, and Excel (the Microsoft office formats) comprise the most prevalent group of malicious file extensions. Nearly 100% of all malware is delivered via email. In 2019, 94% of all malware was delivered by email, making it the weapon of choice for most cybercriminals, according to cybercrime statistics by country. Cybercrime is set to cost $6 trillion in 2021 - twice what it was in 2015. The Netherlands has the lowest cyber crime rate, whilst Russia has the highest.
Cryptomining is the main target area for 90% of remote code execution attacks. Remote code execution attacks have been very prevalent recently, especially with crypto mining becoming so popular. Remote code execution is a system by which an attacker exploits vulnerabilities in web applications, allowing them to run their own code on the applications and giving them control over the server and system that possesses the weakness.
Cybercrime statistics worldwide show that 22% of all folders were available to every employee. The .exe email type is one of the most malicious. The top malicious email attachment types are .doc and .dot, which make up 37% of problematic attachments. The next highest is .exe at 19.5%. 300 billion passwords will be used online by 2021. By 2021, cyber crime facts show that the estimated number of passwords used by humans and machines worldwide will grow to a mind-blowing 300 billion. What’s more, that figure is set to continue rising, so hackers will have numerous targets.
Over 1 in 3 online users have been cyberbullied. Around 34% of individuals admit to being the victim of cyberbullying in their lifetime, with half stating that they have been affected by at least one issue under the cyberbullying definition within the past 30 days. Around 83% of youth cyberbullying victims have suffered real-life abuse. A major factor in the problematic nature of cyberbullying is that it often spills over into real-world interactions. Over four in five young victims confirm they have also been targeted in real-life situations.
Instagram is the most targeted social media platform, with 42% of users experiencing abuse. 69% of individuals admit to abusive online actions. If you thought that the statistics on cyberbullying victimization were bad, the cyberbullying facts regarding how many people have partaken in cyberbullying activities are a real eye-opener. Almost 7 in 10 online users admit to acting inappropriately. Only 1 in 10 youth victims report cyberbullying to a parent.
Under 20% of cyberbullying, cases are reported to the officials. Fewer than 1 in 5 cases of incidents that break cyberbullying laws are actually reported to the police, and even fewer are investigated. So, cyberbullies do not see any risk in what they are doing due to the almost non-existent repercussions. Cyberbullying increases self-harm rates by over double.
5% of perpetrators have set up fake profiles. Over 1 in 20 people who have bullied someone online have done so by setting up fake profiles before sending abusive messages. Nearly one-quarter of victims quit social media. Despite the negative elements, social media can have a hugely positive impact on a person’s life. Sadly, 24% of social media bullying victims don’t get to experience them because they feel forced into quitting the social media channels as an escape.
Identity theft affects 1 in 10. Over 10.1% of online bullying victims have had someone impersonate them online, identity theft statistics suggest. Using their photos and making up profiles can land a victim in a lot of trouble. For children, it can be used to end friendships or land them in trouble. Over 4 in 10 students are bullied frequently. Over 40.6% of students report frequent involvement with bullying, meaning that some form of harassment has occurred at least twice within the past month. Worryingly, 9.4% admit to being the perpetrator as well as the victim on a frequent basis.
Private info made public is the most common problem. Over 32% of teenagers confirm that private info being made public is an issue they’ve faced. This includes forwarding private messages (15%), spreading stories about a person (13%), receiving threatening messages (13%), and sharing embarrassing photos (6%). Cyberbullying leads to mental health issues. There is a clear link between cyberbullying and depression among teens, and older demographics are also at risk. Anxiety, depression, insomnia, and paranoia are among the most likely problems.
70% of child victims believe cyberbullying has affected their social life. A huge 7 in 10 children that suffer from cyberbullying admit that it has had a negative impact on their social life. Whether it’s the development of social anxiety, a lack of confidence, avoiding situations, or being more reserved, the problems are hugely significant. Furthermore, 64% of cyberbullying victims believe that it has impacted their academic achievement, partly due to the distractions that it causes.
Only 1 In 10 cyberbullying child victims will report it to an adult. While millions of children receive threats every single day, just 10% will actually tell a parent, teacher, or adult in a position of authority. The vast majority suffer in silence, allowing themselves to be bullied for weeks, months, or even years. Unlike other forms of bullying, it’s very difficult to see bullying occur. However, the symptoms are evident, which is something parents and other adults should look to identify.
Be safe on the Internet Do not trust 100% of people you meet on the Internet as they may turn out to be a scam who have no good intentions towards you. Never share your password with anyone. Log out after each use of your social media account. Although it is not practical to log in and out every time, this is one of the most effective ways to protect you from attacks. Do not accept any invitations from people you do not know. Even if it comes from someone you know, be skeptical of every invitation and question its credibility. Create a hard password. Do not use information about your own life that others can easily guess (for example, the year of birth or your child's name) in your password. Among the most secure passwords are the combinations of numbers, uppercase and lowercase letters, and special symbols such as asterisks and question marks. Don't be shy and create yourself a good password. Better still change this password to the pattern. Do not use the same password for different accounts, because this is where the hacker hacking one account could easily break into another one. Do not upload networks, recordings, and posts that may harm you now or in the future. Use anti-virus software designed to protect our personal data against viruses. Pay attention to the messages from your social media accounts requesting money or personal information from you and question their accuracy. In such attempts, the logo and information of a well-known brand are imitated in the message you receive. But vigilant eyes can spot the oddities in such messages. It's okay if you don't notice it, just know this: Personal information or payment requests are never made this way via message.
Before buying an item online, check the information about the seller because he may be a fraud. Do not go into suspicious links because they may contain viruses. Carefully read the pop-up messages that want to access our data. Be careful when using the public internet network because hackers may try to steal your personal information. Do not reply to messages in the mail in which you are asked to verify confidential data. Review your security/privacy settings. Don't make your social media accounts public. Preferably only allow people you trust to see your information. Otherwise, people you don't want can easily access your date of birth, place of residence, work information, family, friends, and personal photos of you. In fact, it's best to completely remove this information from your account. Try not to use free internet connections available in public places. Although it is a big plus to have free internet in the place we go, remember that these connections are very weak in terms of security. Similarly, shared computers in the public environment are also high risk. If you do not have to, be careful not to use these computers. Do not install any files and software of unknown origin downloaded from electronic mail or untrusted websites. Never give your phone number, home address, or other similar information to strangers. Do not send your photos to strangers because you do not know what they will do with them. In your relations with other Internet users, follow the etiquette which defines the rules of behavior in the network. Be aware that whatever you put online, it stays there forever. Be aware that while using the Internet you can become addicted to it and not realize how much time we spent online. If you experience cyberbullying, report it to an adult. Treat other internet users with respect, do not insult them, and express yourself in a nice way.
Treat other internet users with respect, do not insult them, and express yourself in a nice way. Keep your antivirus program up to date. Internet security software cannot protect against every threat, but it will detect and remove most malware— though you should make sure it's to date. Be sure to stay current with your operating system's updates and updates to applications you use. They provide a vital layer of security. Be careful what you download. A top goal of cybercriminals is to trick you into downloading malware—programs or apps that carry malware or try to steal information. This malware can be disguised as an app: anything from a popular game to something that checks traffic or the weather. Online ads. Don’t buy anything online without talking to your parents first. Some ads may try to trick you by offering free things or telling you that you have won something as a way of collecting your personal information. Social networking. Many social networking websites (e.g., Facebook, Twitter, Second Life, and MySpace) and blog hosting websites have minimum age requirements to signup. These requirements are there to protect you. Never open an attachment from someone you don’t know. No matter how tempting. Never share your password with anyone. Never upload (post) pictures of yourself onto the Internet or online service to people you do not personally know. Never send money or account information to a non-validated source. Never use imagines or messages that are hurtful or insulting to others. Use tech to make life better. We can use technology to learn things, create things, connect with friends and family, reach out to people who are having a hard time, enjoy great entertainment, and even boost our fitness and mental health. Keep your balance. Technology is incredible. Gaming, networking, apps, online shopping! But relying too much on tech can mess with your sleep and make you feel exhausted, stressed, or lonely. Make time for the other things that matter to you: family meals, playing with pets, kicking a ball around, reading, cooking, art, or just sitting out in the sunshine.
@FundacjaAktywniwEuropie