Alerts

The Real Cost of Cybercrime

Analysts estimated for the companies worldwide billions and billions of yearly losses in terms of infrastructure and productivity expenses.
Several weeks ago I published a small overview of the e-mail spam which concluded with the costs behind this kind of activity. Analysts estimated for the companies worldwide billions and billions of yearly losses in terms of infrastructure and productivity expenses.

Because spamming is just one of those many types of cybercrime, the figures are probably multiplying with each and every other e-threat, whether we talk about phishing, ID theft, scams, viruses, worms, Trojans, botnets, rootkits, or any other malware. Of course, the numbers run well for the business tier, especially since corporations and organizations have the means to statistically pull together facts and figures.

But what about the other costs which are even more tangible, but also more difficult to catch in a chart? What about the hours an ordinary user spends deleting each spam or removing the malware affecting his or her home computer? Or the phishing scheme that ruins family savings? Or the energy and resources the authorities deploy for pursuing and apprehending cybercriminals around the globe? Or the years a felon spends in jail for hacking a computer or counterfeiting software? And the list of questions could go on and on and on

About the author

Răzvan LIVINTZ

With a humanities passion and background (BA and MA in Comparative Literature at the Faculty of Letters, University of Bucharest) - complemented by an avid interest for the IT world and its stunning evolution, I joined in the autumn of 2003 the chief editors' team from Niculescu Publishing House, as IT&C Chief Editor, where (among many other things) I coordinated the Romanian version of the well-known SAMS Teach Yourself in 24 Hours series. In 2005 I accepted two new challenges and became Junior Lecturer at the Faculty of Letters (to quote U2 - "A Sort of Homecoming") and Lead Technical Writer at BluePhoenix Solutions.

After leaving from BluePhoenix in 2008, I rediscovered "all that technical jazz" with the E-Threat Analysis and Communication Team at BitDefender, the creator of one of the industry's fastest and most effective lines of internationally certified security software. Here I produce a wide range of IT&C security-related content, from malware, spam and phishing alerts to technical whitepapers and press releases. Every now and then, I enjoy scrutinizing the convolutions of e-criminals' "not-so-beautiful mind" and, in counterpart, the new defensive trends throughout posts on www.hotforsecurity.com.

Balancing the keen and until late in night (please read "early morning") reading (fiction and comparative literature studies mostly) with Internet "addiction", the genuine zeal for my bright and fervid students with the craze for the latest discoveries in science and technology, I also enjoy taking not very usual pictures (I'm not a pro, but if you want to see the world through my lenses, here are some samples http://martzipan.blogspot.com), messing around with DTP programs to put out some nifty book layouts and wacky t-shirts, roaming the world (I can hardly wait to come back in the Big Apple), and last but not least, driving my small Korean car throughout the intricacies of our metropolis's traffic.