Page 3,854«..1020..3,8533,8543,8553,856..3,8603,870..»

Here’s how bitcoin gets to $12,000 – CNBC

The bitcoin boom is back on.

The cryptocurrency has risen 46% this year, pulling back above $10,000 this week for the first time since September.

The rally is far from over, according to MKM Partners chief market technician JC O'Hara.

"When we look at cryptos as a whole, they tend to trade in two distinct phases. The first being dormant consolidation, which is followed by phase two, which is a high-momentum phase," O'Hara told CNBC's "Trading Nation" on Wednesday. "And when you look at bitcoin we're starting to see signs that the dormant consolidation from the second half of last year is slowly starting to change in terms of positive bullish momentum here."

Bitcoin reached a near-term bottom in December and has been on a steady rise since then.

"We broke out of the downward sloping trend channel. We're breaking above the $10,000 psychological level, and we're of the opinion that positive momentum will continue to follow positive momentum. So that's why we think in the short term we could see $12,000 on bitcoin," O'Hara said.

Bitcoin was trading at $10,100 on Thursday morning. A move to $12,000 implies 18% upside from current levels. It briefly topped that level last summer.

Mark Tepper, president of Strategic Wealth Partners, is dipping a toe into bitcoin but isn't ready to jump all the way in.

"Overall, we're seeing investors just continue to diversify away from traditional stocks and bonds towards alternatives. Bitcoin could fit into that alternative sleeve, but I still think it's a little too early," Tepper said during the same segment. "The fact that it's becoming significantly less volatile, if you could imagine that, over the last two years is definitely helping its case."

Tepper holds bitcoin but isn't a believer yet. He says if it shot higher, "we'd be happy but if it goes to zero it's not going to change our lives."

"In my opinion, not an investment just yet still a speculative play," said Tepper.

Bitcoin is up nearly 200% over the past 12 months.

Disclaimer

See more here:
Here's how bitcoin gets to $12,000 - CNBC

Read More..

Tron CEO Failed to Convince Warren Buffet on the Merits of Bitcoin – newsBTC

Bitcoin makes a poor investment choice, well thats according to the famed investor, Warren Buffet. Who sees more benefit in buying land over buying the number one cryptocurrency.

Each year, business magnate, Warren Buffett auctions a charity lunch in honor of the Glide Foundation, a San Francisco based charity that aims to eradicate poverty and marginalization.

Tron CEO, Justin Sun became the talk of the town last year by bidding a staggering $4.6 million, to win lunch with Buffett. Naturally, the crypto world was buzzing with what this could mean for Bitcoin as well as the macro picture. Especially so considering Buffetts influence with the mainstream.

The lunch was originally scheduled to take place on July 25th, 2019, and was billed by Sun as the chance to sell the benefits of cryptocurrency to traditional investors.

bridge the gap between institutional and traditional investors and the realm of cryptocurrency and blockchain technology.

However, the plans fell into disarray following Suns cancellation, with a bout of kidney stones given as the reason. Things took a further twist as reports from Chinese media claimed Sun was barred from leaving China as investigations into his business dealings took place. A claim he strenuously denied.

Following months of hearsay, Sun and Buffett finally managed to sync their schedules to enjoy a steak lunch at the Happy Hollow Club, Nebraska on January 23rd.

Sun tweeted about the event almost two weeks later, stating that he had gifted Buffett the latest Samsung fold phone with Bitcoin and Tron balances included. He even published the addresses in hopes that the community will rally behind the cause and donate more coins.

Even so, Sun did not update the community on his efforts to convince the billionaire investor of the merits of Bitcoin.

However, a tweet today, release by the Tron Foundation lays out how the lunch went. And its fair to say that Buffett remains skeptical on Bitcoin as an investment.

Its no secret that billionaire business magnate cares little for Bitcoin. He once famously called the number one cryptocurrency rat poison. And todays update shows that little has changed.

Having said that, Buffett did acknowledge the value of blockchain technology as a disruptor to the payments market. But he didnt extend the same sentiment towards Bitcoin.

the reason why he doesnt think Bitcoin is a good investment is that as much as he recognizes the value of blockchain, its not all going into Bitcoin.

Instead, Buffett remains steadfast in his view that stocks and equities are safer. And that the current monetary system is good enough.

On that note, Buffett summarized his opinion by saying even though Bitcoin has value, that alone doesnt make it a good investment. Moreover, he also pointed out that other competing blockchains are much more technologically advanced.

Bitcoin cannot capture the value of blockchain.

Visit link:
Tron CEO Failed to Convince Warren Buffet on the Merits of Bitcoin - newsBTC

Read More..

Jimmy Nguyen discusses future of sports with Bitcoin SV – CoinGeek

The founding president of the Bitcoin Association Jimmy Nguyen has been discussing the future of sports, and the role Bitcoin SV (BSV) can play in transforming the sports industry, both now and in future.

In an interview with CoinGeek at the Future of Sports event in Moscow, Nguyen said that Bitcoin was the only blockchain ready to handle the needs of the sports industry right now, with the capacity to scale as necessary to respond to demand.

Bitcoin SV is the only blockchain capable of supporting microtransactions at the scale required of the sports industry, which tends to have significant peaks in interest around key global sporting events.

Fixtures like the soccer World Cup, the Olympics and the Super Bowl tend to lead to huge spikes in traffic in concentrated periods of time. According to Nguyen, the scalability of BSV means its the only blockchain ready to respond to these demands today.

Nguyen also spelled out the benefits of an honest public ledger in the sports sector, particularly applicable in sports betting as one obvious use case.

With provably fair records on the blockchain, BSV can deliver honest wins, honest transactions, and provably fair, honest sports betting, improving trust in the betting sector as well as delivering better value for players.

Beyond sports betting, the event also saw topics such as the use of BSV as a platform for anti-doping technology targeting amateur sports, with records recorded and written to the blockchain for independently verifiable, immutable record keeping.

The event also saw discussions on tokenization on BSV, with a number of commercial applications for sports fans.

Nguyen hailed the event as a success, with developers and stakeholders from across Russia and the wider region heading to Moscow in support of BSV.

The event comes at a time of growing interest in BSV globally, with more developers choosing bitcoin for developing blockchain apps.

The Future of Sports conference took place on February 14, with speakers including Toli Makris from Ex Sports, Joachim Thumfahrt on behalf of the UAE government, and representatives from global soccer team Tottenham Hotspur FC.

New to Bitcoin? Check out CoinGeeks Bitcoin for Beginners section, the ultimate resource guide to learn more about Bitcoinas originally envisioned by Satoshi Nakamotoand blockchain.

To receive the latest CoinGeek.com news, special discounts on CoinGeek Conferences and other inside information direct to your inbox, pleasesign upfor our mailing list.

Visit link:
Jimmy Nguyen discusses future of sports with Bitcoin SV - CoinGeek

Read More..

How Bitcoin is coming to Ethereum, again – Decrypt

Bitcoin has been tokenized on the Ethereum blockchain again. This time its interoperability solutions provider Summa and the Keep Network, a privacy layer for Ethereum (ETH), building the token, called tBTC.

On Thursday, it debuted on Ethereums testnet, and amainnet launch is planned in March. The project hopes to bring Bitcoin (BTC) into the Decentralized Finance (DeFi) industry. Could this be the most important project to launch on Ethereum in 2020?

The launch is big news especially for DeFi; tBTC means that Bitcoin holders can now earn interest on lending dapp Compound; get a loan from MakerDAO or a non-collateralized one from Aave; trade or lend on Fulcrum or dYdX; save with Dharma Network or Pool Together, and much more.

Up to now its been a pipe dream, despite several attempts to recreate a trustless way to bring Bitcoin to Ethereum. But tBTC creates a workaround: essentially, a decentralized issuance mechanism between two parties.

This isnt the first version of Bitcoin on Ethereum. But it offers several benefits.

Synthetixs sBTC, a synthetic asset which gives investors exposure to Bitcoins price movements, doesnt allow it to be used in DeFi applications. So, this new token has more potential there.

And a solution such as Wrapped Bitcoin, or wBTC, mandates a user to undergo know-your-customer (KYC) procedures, mint the token from a third party, and doesnt let them hold their own tokens. Instead, tBTC allows users to mint and hold the token themselves, suiting the Ethereum ethos.

tBTC is not the only project working on a solution, others such as Ren Protocol, are also striving to bring Bitcoin to Ethereum in a decentralized way.

But theyll need to be quick. tBTC contracts are currently being audited, leading up to the mainet launch, and there are plans to integrate it into lending platforms like Compound, immediately after. The race is on.

Read the original:
How Bitcoin is coming to Ethereum, again - Decrypt

Read More..

How Bitcoin Optech Is Connecting the Open-Source and Corporate Worlds – Bitcoin Magazine

Bitcoin Core and other open-source projects have, over the years, built a range of technologies to improve Bitcoin scaling and the general Bitcoin user experience. With examples including Segregated Witness (SegWit), Replace-By-Fee and the Lightning Network, Bitcoin users have a number of tools at their disposal to utilize the Bitcoin blockchain as best and efficiently as possible.

Yet, bigger companies in particular have historically been slow to adopt such tools. Segregated Witness is a prime example: Several of the largest Bitcoin businesses hadnt adopted the upgrade for over a year after it was activated on the Bitcoin network in August 2017. The total share of SegWit transactions even remained below 50 percent until the second half of 2019.

This was also noticed by John Newbery, engineer at Chaincode Labs; Steve Lee, former Google product director turned product manager at Square Crypto; and James OBeirne, former Chaincode engineer who recently joined DG Lab. Seeing this and other discrepancies, they wanted to help resolve the apparent disconnect. In mid-2018, the trio founded an initiative to bridge the gap: Bitcoin Optech.

Bitcoin is the most mature blockchain, and even though its been around the longest, theres still a lot of inefficiencies with the usage of the blockchain, and it is a scarce resource, Lee explained, as he announced the project at the Distributed 2018 conference in July 2018. Thats really what were focused on, helping various actors in the ecosystem to figure out how to best do that.

The initiative would consist of several projects united under the Bitcoin Optech umbrella.

The first of these projects is a series of workshops, bringing open-source developers and engineers at Bitcoin companies together to discuss relevant technologies in person. These workshops offer technical knowledge to all the participants, while also bringing together different parts of the Bitcoin ecosystem to hopefully help further cooperation parts that sometimes have different perspectives on the industry, with open-source developers and Bitcoin companies occasionally finding themselves in conflict with one another.

Bringing people together and having face-to-face meetings is really beneficial, it helps foster a more collaborative ecosystem, Newbery explained during the same Distributed 2018 announcement. On a purely technical level, having that experience feedback from engineers actually doing work on the ground, back to the open-source community makes those open-source projects better, and having information going from the open-source community into these companies lets those companies use better technology.

The first Bitcoin Optech workshop took place in San Francisco in July 2018. Fourteen engineers from Square, Coinbase, BitGo, Purse, Xapo and Ledger discussed topics including coin selection, fee estimation and Replace-By-Fee, as well more general topics like establishment of the Bitcoin Optech initiative itself and communication between the different parts of the Bitcoin ecosystem.

The initiative has grown significantly since then. A second workshop was organized in Paris (November 2018), followed by another event in San Francisco and one in New York (both in September 2019). The fifth and most recent workshop took place in London on February 5, 2020. Bitcoin Optech today counts 24 member companies who support the initiative financially, including the likes of Bitstamp, Kraken, Casa, OKcoin, Bitrefill and others. The vast majority of member companies also participated in at least one of the workshops.

The Bitcoin Optech team itself has grown as well. Although OBeirne stopped contributing after 2018, Blockstreams product manager Mike Schmidt, Chaincode Labs associate Adam Jonas and Chaincode Labs engineer Carl Dong have been taking on various organizational roles within the initiative.

I think Bitcoin Optech has grown to be a trusted voice on technical Bitcoin matters and continues to highlight ways in which users and businesses can make more efficient use of the blockchain, Newbery told Bitcoin Magazine, reflecting on the 20 months since the initiative got off the ground.

The Bitcoin Optech newsletter is the second big project under the Bitcoin Optech umbrella. Produced by technical writer David Harding and counting 84 editions at the time of writing, the newsletter continues to accumulate a wealth of information, containing high-quality technical documentation and offering an ongoing overview of developments across Bitcoin and Lightning implementations.

Among the more notable efforts carried out through the newsletter, Harding wrote a 24(!)-part series on bech32 sending support, encouraging wallet providers and companies to implement the option to send funds to bech32 addresses, the address format introduced in Bitcoin Core 0.16.0. With bech32, users can fully utilize the extra blockspace offered by SegWit and enjoy a number of other benefits. Nineteen of the 23 popular wallets integrated this option, while four of them even generated bech32 receiving addresses by default though it is, of course, hard to say how much of this was due to the series specifically.

Other projects under the Bitcoin Optech umbrella include a dashboard with detailed statistics and adoption metrics on a range of technologies; compatibility matrices with overviews of SegWit and Replace-By-Fee support across different wallets; and the Scaling Cookbook, a technical document for scaling technologies for engineers and businesses. Bitcoin Optech also offers a broad overview on Bitcoin-related technical topics, which has grown to become a go-to resource for many.

Perhaps at least as important, Bitcoin Optech has probably helped heal a rift caused by the years-long scaling dispute. Having started with nothing but an idea midway through 2018, and helped by seed money from Xapo founder Wences Casares, venture capitalist John Pfeffer and Chaincode Labs co-founder Alex Morcos, Bitcoin Optechs focus on technical solutions may well have been instrumental in aligning different parts of the Bitcoin ecosystem.

I think it is going very well and exceeding our expectations in terms of company engagement and impact the workshop content and newsletter has, Lee told Bitcoin Magazine. It is hard to say how much actual adoption of various optimizations is due to Optech, but at minimum I think Optech has helped the post-SegWit2X healing process, and given businesses better insight into how the open source developers and process work.

The rest is here:
How Bitcoin Optech Is Connecting the Open-Source and Corporate Worlds - Bitcoin Magazine

Read More..

Cyber Security & Network Security Services – Internet …

Defend your digital landscape

The Digital Transformation is bringing new opportunities to your company, but it is also exposing you to new security risks. There are new vulnerabilities, new regulations, new tools appearing every day. Many worries about the inevitable attack they have yet to discover. What will they do when the company is breached? Is the organization ready? How bad will it be? This is why we adopt an assume breach mindset. Organizations must prevent and be able to recover from as many attacks as they can, but they also must be able to detect when a bad actor has made it past their defenses and be ready to act. Internet Security Consulting can guide your company through all of it.

Think you dont have anything of value to protect? Think again. The key asset that a security program helps to protect is your data and the value of your business is in its data. You already know this if your company is one of many whose data management is dictated by governmental and other regulations for example, how you manage customer credit card data. If your data management practices are not already covered by regulations, consider the value of the following:

Streamline your IT security operations

Save time and money with Internet Security Consulting cloud-based solutions. No hardware to install or software to maintain. Avoid the gaps that come with trying to glue together different security solutions.

Simplify your IT security and lower the cost of compliance

Respond to auditors and regulations in a timely and accurate manner. We help you show that the required controls are in place and your environment is continually compliant.

A flexible approach

Our Cyber Security strategy offers you protection from malware, unethical hacking, ransomware attacks and natural disasters. If your organization network security system does not have adequate protection you may lose valuable information and data. Our flexible approach to cyber security services enables us to work according to our client's needs, offering you the best value for your money.

Original post:
Cyber Security & Network Security Services - Internet ...

Read More..

Internet security Market Analysis With Key Players, Applications, Trends and Forecast To 2026 – Instant Tech News

Internet security Market Overview:

Verified Market Research adds new research report Internet security Market Development Overview 2020, The report includes an in-depth analysis of the toggle switch market, taking into account market dynamics, segmentation, geographic expansion, competitive landscape and some other key issues. The market analysts who prepared the report have thoroughly examined the toggle switch market and provided reliable and accurate data. They understand the needs of the industry and customers, which makes it easier for them to focus on the problems that end users have been looking for. The research report provides an analysis of an assessment of existing and future trends in which players can invest. It also includes an assessment of the players financial perspectives and the nature of the competition.

Global Internet security Market was valued at USD 32.67 Billion in 2017 and is projected to reach USD 61.42 Billion by 2025, growing at a CAGR of 8.2% from 2018 to 2025.

Request a Report Brochure @ https://www.verifiedmarketresearch.com/download-sample/?rid=5846&utm_source=ITN&utm_medium=005

Top 10 Companies in the Internet security Market Research Report:

Competitive Landscape

The competitive landscape is a must-have information for the marketplayersto withstand the competition present in theglobal Internet security market. This further helps the market participants to develop effective strategies to optimize their market positions. Moreover, the competitive analysis helps them to determine potential advantages as well as barriers within the global Internet security market. This way, they can monitor how their competitors are implementing various strategies including pricing, marketing, and distribution.

The report analyses thecurrent trends, growth opportunities, competitive pricing, restraining factors, and boosters that may have an impact on the overall dynamics of the global Internet security market. The report analytically studies the microeconomic and macroeconomic factors affecting the global Internet security market growth. New and emerging technologies that may influence the global Internet security market growth are also being studied in the report.

Global Internet security Market: Regional Segmentation

For a deeper understanding, the research report includes geographical segmentation of the global Internet security market. It provides an evaluation of the volatility of the political scenarios and amends likely to be made to the regulatory structures. This assessment gives an accurate analysis of the regional-wise growth of the global Internet security market.

Regions Covered by the global market for Internet security :

Middle East and Africa (GCC countries and Egypt)North America (USA, Mexico and Canada)South America (Brazil, etc.)Europe (Turkey, Germany, Russia, Great Britain, Italy, France etc.)Asia Pacific (Vietnam, China, Malaysia, Japan, Philippines, Korea, Thailand, India, Indonesia and Australia)

Ask for Discount @ https://www.verifiedmarketresearch.com/ask-for-discount/?rid=5846&utm_source=ITN&utm_medium=005

The study objectives are:

Important Questions Answered in this Report:-

Get a Complete Market Report in your Inbox within 24 hours @ https://www.verifiedmarketresearch.com/product/global-internet-security-market-size-and-forecast-to-2025/?utm_source=ITN&utm_medium=005

About Us:

Verified market research partners with clients to provide insight into strategic and growth analytics; data that help achieve business goals and targets. Our core values include trust, integrity, and authenticity for our clients.

Analysts with high expertise in data gathering and governance utilize industry techniques to collate and examine data at all stages. Our analysts are trained to combine modern data collection techniques, superior research methodology, subject expertise and years of collective experience to produce informative and accurate research reports.

Contact Us:

Mr. Edwyne FernandesCall: +1 (650) 781 4080Email: [emailprotected]

TAGS: Internet security Market Size, Internet security Market Growth, Internet security Market Forecast, Internet security Market Analysis, Internet security Market Trends, Internet security Market

See more here:
Internet security Market Analysis With Key Players, Applications, Trends and Forecast To 2026 - Instant Tech News

Read More..

Google Announced US$1 Million for its Be Internet Awesome Initiative – CISO MAG

Google recently announced that its going to spend US$1 million to bring awareness on data privacy and internet security across the sub-Saharan Africa region. The search engine giant also launched its child online safety program Be Internet Awesome in South Africa, the Netherlands, and Nigeria.

Be Internet Awesome initiative helps minors explore the internet confidently and securely. The initiative teaches kids and minor students skills for surfing the internet, how to recognize potential online scams, secure valuable information, how to identify and refrain from cyberbullying. Google stated that it partnered with the South African Film and Publications Board (FPB) to implement the program locally.

Commenting on the initiative, Abongile Mashele, acting Chief Executive Officer at FPB, said, The FPB has a responsibility to protect children from exposure to harmful content, thus the organization needs to play a leading role in creating awareness around the dangers of the internet, as much as it is incumbent on us to also encourage the use of the digital space as an empowering tool.

Fortune Mgwili-Sibanda, Head of Public Policy and Government Relations at Google Africa, said, Google is committed to a safe internet for children. We are also passionate about the empowerment of organizations that share this commitment. The fund will be administered by a third-party partner on behalf of Google.org, and we will be sharing details on application criteria and deadlines soon.

Mgwili-Sibanda also highlighted that Children are being exposed to the internet at their most vulnerable age so its important for us, at Google, to ensure that they do so as safely as possible. At the same time, teachers and parents can use these resources in order to support and guide children as they navigate the Web.

A research report from the information security firm Dataprotect revealed that the estimated cost of cybercrimes in Africa is 3.5 billion (approximately US$3.87 billion), compared to 528 billion (US$585 billion) worldwide. However, Africa still falls short in handling cybersecurity challenges. The analysis highlighted that the lack of skilled and qualified workforce and lesser investments in cybersecurity made West African banks vulnerable to cyberattacks including bank card fraud, phishing, and intrusions, etc.

See the rest here:
Google Announced US$1 Million for its Be Internet Awesome Initiative - CISO MAG

Read More..

Cybersecurity Level in the Middle East: An Overview of the Cybersecurity Market State – SCOOP EMPIRE

Recently,in the countries of the Middle East, there has been a progressive success indigitization. This, in turn, leads to an increase in the risks ofcyber-attacks, which can come from both other countries and criminal hackergroups. In this region, the government of each country seeks to provide asecure digital environment using new modern measures.

Forsecurity, the use of reliable antivirus software both at the government leveland for ordinary users plays an important role. In the countries of the MiddleEast, an active policy is being directed to develop the antivirus softwaremarket, which also includes the distribution and support of the best internet security software.

Thesecurity market in the Middle East and Africa at the end of 2019 was estimatedat more than 7 billion US dollars, and according to forecasts for the period2020-2025, CAGR will reach 14.97%. In connection with the rapid growth of thedigital system, new gateways for cyber-attacks have opened.

Themain factor that influences the existence of cyberattacks is a constantincrease in vulnerabilities in supply chains and digital communicationnetworks, an increase in the online consumer base, and, unfortunately,vulnerable cybersecurity infrastructure.

Mostof the social infrastructure and public services have increasingly begun to payattention to ensuring interconnection while bypassing the security of thesedevelopments.

Accordingto Kaspersky Lab reports, about 43% of organizations in the region haveinsufficient cybersecurity infrastructure, and 72% of companies have web-basedapplications vulnerable to attacks.

Thelink between business-critical data and applications, devices, and users is abase of the digital infrastructure. To penetrate the digital system and getinformation, cybercriminals use a variety of methods ranging from theintroduction of malware and phishing to various types of DDoS attacks. Suchforms of threats can lead not only to information leakage but also tosignificant financial losses.

Accordingto statistics, about 50% of all threats are directed against oil and gascompanies. In this regard, the government and organizations of the countries ofthe Middle East are making every effort to protect their networks, user data,and endpoints. Here are some measures:

Firstof all, the government of the countries is, of course, increasing investmentsin the communication and information fields. For example, one of the UAE banksinvested about 1 billion AED in digital transformation.

Itis crucial to increase the base of skilled workers in the digital field.Developing opportunities and encouraging career professionals in cybersecurity,developing training programs and providers. Kuwait has developed specifice-health and government policies. A policy of educating citizens about possiblecyber threats and active promotion so-called cyber hygiene.

Awardsand incentives for achievements in the field of cybersecurity, the governmentof the countries of the Middle East region contributes to the development ofinnovation and research in this field, motivating young scientists and studentsto a cyber-worker career. An excellent indicator is that Saudi Arabia receivedthe World Banks vocation through the development of new secure payment systemsand electronic filing of documents.

Expandingthe market for antivirus software and promoting the use of antivirus software amongall Internet users.

Cybersecurityis also developing through the improvement and development of the ecosystem ofthe cybersecurity market. It includes such significant security supplierssoftware as Intel Security (USA) McAfee Antivirus, Software Technologies Ltd(Israel), Cisco Systems, Inc. (USA) Immunet Antivirus, IBM Corporation (USA) Powertech Antivirus, Symantec Corporation (USA) e.g. Norton Antivirus,Computer Sciences Corporation (USA) and others. According to statistics, thetop-5 most common antivirus solutions include:

1.Cisco Systems, Inc.

2.Dell Technologies.

3.Kaspersky Lab.

4.IBM Corporation.

5.Check Point Software Technologies Ltd.

Inaddition to antivirus solutions, the listed companies supply the market withIAM, Encryption, DLP, UTM, Firewall, IDS / IPS, Disaster Recovery securitysoftware.

Thedefinition of cybersecurity implies the achievement and preservation of thesecurity properties of the resources of organizations or users against varioustypes of cyber threats arising on the Internet.

Themain objectives of securing a network are accessibility, integrity, andconfidentiality.

Therefore, cybersecurity is the most important condition for the development of the information society in the countries of the Middle East at the present stage and requires close attention from international organizations, representatives of academic and analytical centers, government officials, and media representatives. As you can see, attention to cybersecurity is growing, and governments are making significant efforts to achieve a secure digital society.

Original post:
Cybersecurity Level in the Middle East: An Overview of the Cybersecurity Market State - SCOOP EMPIRE

Read More..

IC3.gov 2019 Internet Crime Report: Its All About that BEC – Security Boulevard

For years I have been encouraging people to report their instances of Cybercrime to the FBIs Internet Crime & Complaint Center, IC3.gov. Based on the number of reports, people are finally doing just that. The growth in reporting over the last two years is remarkable driven in part by the desperation people are facing regarding two major cybercrime trends: Ransomware and Business Email Compromise. State and local authorities seem powerless to do anything about either of these, so finally they are encouraging (and in many cases helping) to get these crimes reported to the IC3, where we can use pattern matching to identify trends that reveal top criminals.

Comparing 2015 to 2019, cybercrime reports are up 61% with 467,361 complaints received just in calendar 2019. An average of 1280 complaints per day! But while the NUMBER of complaints has gone up by 61%, the dollars lost in those complaints has more than tripled! While Ransomware is certainly an important topic, the key difference in the financial impact has been Business Email Compromise. During calendar 2019, BEC complaints only accounted for 5% of the complaint volume (23,775 out of 467,361) that 5% of complaints accounted for 48.5% of all financial losses experienced by the victims ($1.7 Billion of 3.5 Billion!)

The good news on the BEC front is that the FBI has a stream-lined internationally successful process for recovering funds. Started in February 2018, the FBIs Recovery Asset Team has been getting better and better at their process. In Calendar 2019, the RAT was invoked on 1,307 cases, and were successful at recovering funds 79% of the time. Out of $384,237,651 stolen, they recovered $304,930,696! That is an amazing improvement over times past!

While Phishing, a crime that Ive been personally invested in chasing for at least 15 years, remains the most commonly experienced crime, with 114,702 cases reported to the ic3.gov in 2019, from a financial perspective, it just isnt even close to BEC and Romance Scams, the two categories we also called out as most important in our review of the 2018 IC3.gov Report. (See our blog post:IC3.gov: BEC Compromises and Romance Fraud 2018from last April.)

By victim count, BEC came in as the #6 category, while Romance Scams came in at #7.But by dollars lost, BEC is clearly #1 and Romance Scams are clearly #2.

While these losses seem staggering, please remember that these are ONLY THE REPORTED losses. Especially in the area of Romance Scams, we believe the number is dramatically under-reported. Often this is because the victim is an elderly person who either hides their victimization because they are embarrassed by the loss, or perhaps never realizes that theyve been scammed, especially in the case of a person who may be experiencing mental decline, but has no caretaker.

The Financial Crimes Enforcement Network, FinCEN, used a far different approach to trying to identify the scale of BEC attacks, as we reported last year in our blog article:FinCEN: BEC far worse than previously believed. FinCEN performed analysis on the Suspicious Activity Reports that are required of financial institutions in the United States and looked for tell-tale signs that the activity may have been a Business Email Compromise instance, whether reported to IC3 or not. Based on FinCENs numbers, we estimated the amount of money stolen by BEC criminals to be $8.7 Million per day JUST IN THE United States!

Our friends at Agari, (Hi John! Hi Crane! Hi Ronnie! Hi Patrick!), do a great deal of work in the BEC space, including running the Business Email Compromise Working Group. Ronnie shared some stats in his blog last fall about how long it would take BEC crime to surpass each of several other crime types. I encourage the interested reader to check it out here: Business Email Compromise (BEC): Putting $26 Billion in Known Losses into Context.

The 2019 Annual IC3.gov report also has a break-down of state losses. As we did last year (see:http://garwarner.blogspot.com/2019/04/ic3gov-bec-compromises-and-romance.html) , weve tried to normalize these numbers by allowing you to compare the number of BEC victims and losses per state, but also expressing those as an average loss per victim and the number of victims per 100,000 population in that state.

To allow the reader to easily see if their state number of victims or their average victims per loss is far above or below the average, well share that information here.

The national average was $71,569 loss per BEC victim.The average state had 6.8 victims per 100,000 population.

So, for example, my state, Alabama, has far less than the average loss, and also fewer victims per 100,000 than the national average.

The ten states (or territories) with the highest average BEC loss per victim were:

And the states (or territories) with the highest rate of victimization per 100,000 population were:

Here is the BEC data for each state from IC3.gov (plus the population and average that we calculated here:) click for BEC Data by State in a sortable Excel spreadsheet

For Confidence/Romance Scamsthe national average loss was $25,911 per victim.the average number of victims per 100,000 population was 4.9.

In my state, we were about normal for victimization rate, with a slightly lower 4.1 victims per 100,000. We were also slightly below the national average loss per victim, with $21,166 lost per victim or Romance Scams.

The ten states that the highest average losses per victim for Romance Scams were:

While the states with the highest number of romance scam victims per 100,000 population were:

Read more:
IC3.gov 2019 Internet Crime Report: Its All About that BEC - Security Boulevard

Read More..