Thank you for your purchase. You will shortly receive an order confirmation by e-mail.
Let your friends know about our smart products simply and secure!
Send e-mail to friends
Your purchase couldn't be completed. Please check your entries and try again.
Happened again? Then please get in touch with our Help Desk using the contact form.
Detecting cyber crime on the Internet is often a Sisyphean task for both the police and IT experts. This article explains why it is extremely important to report even the most minor incidents.
“A further increase has been observed in the number of professional cyber attacks on the Internet,” writes the Swiss Federal Office of Police (Fedpol) in its report on combating criminality. This is consistent with other recent analyses – one such report, for example, estimated that global revenues from cyber crime have now outstripped those of organized drug dealing.
Whether it’s spammers disseminating malware, professional hackers stealing confidential data and blackmailing companies, or our neighbor hijacking our private webcam, criminality on the Internet has many faces. Thanks to the spread of smartphones, web applications, wireless payment systems and other tech tools, criminals have countless opportunities to steal, commit fraud and manipulate.
The fact that these crimes happen in the chaotic space that is the Internet and it is often difficult to identify the perpetrators makes it doubly important to report incidents to the police immediately. “The tricks employed by cyber criminals and Internet fraudsters are becoming cleverer and more insidious all the time. They exploit their apparent anonymity on the Internet shamelessly,” explains Andreas Eugster, a cyber crime investigator at the Zug police force.
Once a report has been submitted, the police’s work is like a jigsaw puzzle, Eugster says: “First of all, IT Forensics properly stores the electronic trail left by the cyber criminals and prepares it for further investigations and use in court. It is almost always necessary to work together with external government agencies, as cyber criminals rarely stop at national borders.”
Vice President of IBM Security Caleb Barlow explains in his TED talk the latest procedures of the highly organized cyber criminals and what exactly is behind it.
Although it is entirely understandable that someone whose private information is at stake may be reluctant to go to the police, filing a report is essential. This transparency helps the police to adapt their investigations to the changing technical conditions and to link different cases, says cyber crime investigator Eugster. Suspected cyber offences can be reported to the police just as you would something as simple as a stolen wallet. In Switzerland, such incidents can also be registered with Fedpol using this form.
For businesses too, transparency towards partners and customers is the key to reducing the damage. The German IT industry association Bitkom has worked out that fifty percent of companies in Germany have been hacked – often without even noticing. As businesses are usually worried about their image being damaged or losing customers, they are often reluctant to publicize their weaknesses. Experience shows, however, that the tolerance of those affected is higher if companies communicate openly from the outset.
The fact is that the perpetrators can only be caught if the crime is reported. Furthermore, developers of security tools are reliant on knowledge of the methods employed, the identity of the victims and the purpose of the attacks. When it comes to combating cyber crime, exchange of information is therefore vital. Everyone can and should do their bit – after all, no less than our security and our privacy are at stake.
In the autumn of 2016, the US company announced that personal data from at least 500 million users had already been stolen in a cyber attack at the end of 2014. The information included the names, e-mail addresses, telephone numbers, dates of birth, passwords and security questions of users.
Ashley Madison (2015)
Around 40 million datasets were stolen by hackers from Ashley Madison, a dating platform for people already in relationships. This included profiles of well-known politicians and business leaders.
In an attack on the Playstation network, hackers got hold of data from 75 million users around the world, including postal addresses and credit card information.