{"id":34941,"date":"2018-10-28T15:21:51","date_gmt":"2018-10-28T19:21:51","guid":{"rendered":"https:\/\/sciencebusiness.technewslit.com\/?p=34941"},"modified":"2018-10-28T15:21:51","modified_gmt":"2018-10-28T19:21:51","slug":"infographic-top-u-s-cyber-crimes","status":"publish","type":"post","link":"https:\/\/technewslit.com\/sciencebusiness\/?p=34941","title":{"rendered":"Infographic &#8211; Top U.S. Cyber Crimes"},"content":{"rendered":"<figure id=\"attachment_34943\" aria-describedby=\"caption-attachment-34943\" style=\"width: 640px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/technewslit.com\/sciencebusiness\/wp-content\/uploads\/2018\/10\/TopCyberCrimes_IC3_Statista.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-34943\" src=\"https:\/\/technewslit.com\/sciencebusiness\/wp-content\/uploads\/2018\/10\/TopCyberCrimes_IC3_Statista.jpg\" alt=\"Chart: top cyber crimes\" width=\"640\" height=\"456\" srcset=\"https:\/\/technewslit.com\/sciencebusiness\/wp-content\/uploads\/2018\/10\/TopCyberCrimes_IC3_Statista.jpg 960w, https:\/\/technewslit.com\/sciencebusiness\/wp-content\/uploads\/2018\/10\/TopCyberCrimes_IC3_Statista-300x214.jpg 300w, https:\/\/technewslit.com\/sciencebusiness\/wp-content\/uploads\/2018\/10\/TopCyberCrimes_IC3_Statista-768x547.jpg 768w, https:\/\/technewslit.com\/sciencebusiness\/wp-content\/uploads\/2018\/10\/TopCyberCrimes_IC3_Statista-150x107.jpg 150w, https:\/\/technewslit.com\/sciencebusiness\/wp-content\/uploads\/2018\/10\/TopCyberCrimes_IC3_Statista-400x285.jpg 400w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" \/><\/a><figcaption id=\"caption-attachment-34943\" class=\"wp-caption-text\">Click on image for full-size view (IC3, Statista)<\/figcaption><\/figure>\n<p>28 Oct. 2018. We report occasionally at Science &amp; Enterprise on new cybersecurity technologies and related issues where remote computing is used, such as data security with telemedicine and mobile apps in health care. Earlier this week, our friends at <a href=\"https:\/\/www.statista.com\/chart\/15858\/top-cybercrimes-in-the-us\/\">Statista<\/a> reported on a study by the <a href=\"https:\/\/pdf.ic3.gov\/2017_IC3Report.pdf\">Internet Crime Complaint Center<\/a> or IC3 that tracks cyber crimes in the U.S., our infographic for this weekend.<\/p>\n<p>The findings show, from data in 2017, the top cyber crimes affect individual users, rather than the headline-grabbing mass data breaches or those affecting national security. By far, the most frequent cyber crime is non-payment of money owed or non-delivery of goods promised to individuals from transactions over the Internet, with more than 84,000 recorded last year. Another 31,000 people said their online accounts were hacked, while more than 25,000 reported cases of phishing or pharming, use of e-mail or phony web sites respectively to get individuals to divulge personal information, such as account numbers.<\/p>\n<p>More from Science &amp; Enterprise:<\/p>\n<ul>\n<li><a href=\"https:\/\/sciencebusiness.technewslit.com\/?p=34887\">Health System Connects Mobile App to 250 Devices<\/a><\/li>\n<li><a href=\"https:\/\/sciencebusiness.technewslit.com\/?p=34433\">Genomics-Blockchain Company Launches, Raises $4.3 Million<\/a><\/li>\n<li><a href=\"https:\/\/sciencebusiness.technewslit.com\/?p=34388\">Infographic \u2013 Smartphone Data Collection, Like It or Not<\/a><\/li>\n<\/ul>\n<p style=\"text-align: center;\">*\u00a0\u00a0\u00a0\u00a0 *\u00a0\u00a0\u00a0\u00a0 *<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Our friends at Statista reported on a study by the Internet Crime Complaint Center or IC3 that tracks cyber crimes in the U.S., our infographic for this weekend.<\/p>\n","protected":false},"author":1,"featured_media":34943,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[5],"tags":[109,86,105,78],"class_list":["post-34941","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-regulations","tag-computer-science","tag-engineering","tag-physical-sciences","tag-software"],"_links":{"self":[{"href":"https:\/\/technewslit.com\/sciencebusiness\/index.php?rest_route=\/wp\/v2\/posts\/34941","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/technewslit.com\/sciencebusiness\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/technewslit.com\/sciencebusiness\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/technewslit.com\/sciencebusiness\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/technewslit.com\/sciencebusiness\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=34941"}],"version-history":[{"count":2,"href":"https:\/\/technewslit.com\/sciencebusiness\/index.php?rest_route=\/wp\/v2\/posts\/34941\/revisions"}],"predecessor-version":[{"id":34944,"href":"https:\/\/technewslit.com\/sciencebusiness\/index.php?rest_route=\/wp\/v2\/posts\/34941\/revisions\/34944"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/technewslit.com\/sciencebusiness\/index.php?rest_route=\/wp\/v2\/media\/34943"}],"wp:attachment":[{"href":"https:\/\/technewslit.com\/sciencebusiness\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=34941"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/technewslit.com\/sciencebusiness\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=34941"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/technewslit.com\/sciencebusiness\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=34941"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}