Feeds

Americans lost $2.4bn to net fraudsters in 2003

Phishing fastest growing online crime

  • alert
  • submit to reddit

Top three mobile application threats

US consumers lost $2.4bn last year to online scammers and phishing attacks.

Most fraud was carried out by people gaining access to account numbers and passwords. The average loss for the victims was $1,200. Gartner surveyed 5,000 US Internet users which led to the estimate that just under 2m US citizens were hit by some form of online fraud last year.

Avivah Litan, research director at Gartner, said: "In most cases that are not inside jobs, thieves likely stole account numbers and passwords to get into accounts online or through telephone banking services,"

Phishing and key logging are the most popular methods to obtain information. Phishing attacks send consumers emails which look like they come from trusted financial institutions. They are directed to a website, apparently part of the bank or auction site, and trick people into entering passwords and user names. The identities collected are then defrauded. Fraudsters also use key-logging software to capture passwords entered on a computer.

According to Gartner, banks must strengthen security on their websites and phone banking systems. "Shared secrets" are the best way to solve this problem until proper systems are in place, it says. Shared secrets are responses to questions like "Name of your favourite pet".

Gartner looked at five types of fraud: new account fraud, cheque forgery, unauthorised access to checking accounts, illegal credit card transaction and fraudulent cash advances on credit cards. Unauthorised access to accounts grew fastest in the past year, almost half of reported incidents took place in the past year, compared with 34 per cent of illegal credit card purchases.

Checking account hijackings were second only to dodgy credit card purchases, using a stolen credit card to buy goods.

The press release is here. ®

Related stories

Lottery scams new flavour of the month
Fear of phishing hits e-commerce
Phishing scams cost UK banks £1m+

The Essential Guide to IT Transformation

More from The Register

next story
BBC goes offline in MASSIVE COCKUP: Stephen Fry partly muzzled
Auntie tight-lipped as major outage rolls on
iPad? More like iFAD: We reveal why Apple ran off to IBM
But never fear fanbois, you're still lapping up iPhones, Macs
Nadella: Apps must run on ALL WINDOWS – PCs, slabs and mobes
Phone egg, meet desktop chicken - your mother
HP, Microsoft prove it again: Big Business doesn't create jobs
SMEs get lip service - what they need is dinner at the Club
ITC: Seagate and LSI can infringe Realtek patents because Realtek isn't in the US
Land of the (get off scot) free, when it's a foreign owner
Samsung threatens to cut ties with supplier over child labour allegations
Vows to uphold 'zero tolerance' policy on underage workers
Dude, you're getting a Dell – with BITCOIN: IT giant slurps cryptocash
1. Buy PC with Bitcoin. 2. Mine more coins. 3. Goto step 1
There's NOTHING on TV in Europe – American video DOMINATES
Even France's mega subsidies don't stop US content onslaught
You! Pirate! Stop pirating, or we shall admonish you politely. Repeatedly, if necessary
And we shall go about telling people you smell. No, not really
prev story

Whitepapers

Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Build a business case: developing custom apps
Learn how to maximize the value of custom applications by accelerating and simplifying their development.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.