Juniper Research provides actionable insights and expert strategic assessment of critical threats from cybercrime, outlining important remedial steps for companies.
This incisive report on the current and future cybercrime landscape provides an in-depth analysis of the current threats posed to a variety of vital digital commerce and connected device markets, as well as roadmapping their future evolution.
- Investigates the threats posed to key eCommerce and mCommerce sectors, including payments, money transfer, retail and banking.
- Analysis of developments in the cybercrime ecosystem and what they imply for the future direction of malware for devices, from smartphones to wearables and the Internet of Things.
- Typology of cybercrime threats, with key features and protective strategies included alongside the likely evolution of cybercrime.
- Juniper Threat Landscape Assessment and future projections for the level of threat and its probable impact on each sector.
- Projections of the scale and cost of data breaches at a global and regional level from 2015 to 2020.
- 1. What are the key cybercrime threats that businesses and consumers need to defend against?
- 2. What is the likely impact of different kinds of cybercrime on key financial and device market sectors?
- 3. How will cybercrime threats evolve in the future?
- 4. What malware threats will the IoT face?
- 5. What is the cost of criminal data breaches and how will this change in future?
Mentioned: Apple, Forbes, Google, Home Depot, IBM, ITRC (Identity Theft Resource Centre), JPMorgan Chase, Kaspersky Lab, Kindsight, Kmart, Microsoft, Neustar, Palo Alto Networks, RAND, Target, Venafi Labs, Verizon.
Data & Interactive Forecast
Juniper Research's highly granular interactive Excels enable clients to manipulate Juniper's forecast data and charts to test their own assumptions by performing what-if analysis, and compare select markets and sectors side by side in customised charts and tables. IFxls greatly increase clients' ability to both understand a particular market and to integrate their own views into the model.
Forecast suite includes:
- Data breach forecast splits for 8 key regions.
- What-If Analysis tool allowing user the ability to manipulate Juniper's data for 4 different metrics.
- Access to the full set of forecast data of 7 tables and 378 data points.
Table of Contents
1. Executive Summary
- 1.1. Introduction
- 1.2. Definitions
- 1.3. Trends in Cybercrime
- Table 1.1: Cybercrime Trends
- 1.4. Financial Cybercrime Trends & Threats
- 1.5. Device-based Cybercrime Trends & Threats
- 1.6. The Cost of Cybercrime
- Figure & Table 1.2: Total Criminal Data Breaches per annum 2015-2020, Split by 8 Key Regions
- Figure & Table 1.3: Cost of Criminal Data Breaches per annum ($m) 2015-2020, Split by 8 Key Regions
- 1.7. Recommendations
2. Introduction to Cybercrime
- 2.1. Introduction
- 2.2. Definitions
- 2.3. Trends in Cybercrime
- 2.3.1. Cybercriminal Business Models Mature
- Table 2.1: Goods and Services on the Cybercriminal Black Market
- 2.3.2. Retail Becomes a Target
- 2.3.3. Cybercrime Goes Global
- 2.3.4. Hacktivism Goes Pro
- Figure 2.2: Known Cyberattack Motivations 2012-2014
- 2.4. The Cost of Cybercrime
- 2.4.1. Variations by industry
- Figure 2.3: Distribution of Records Exposed per Breach as a Proportion of the Total Data Breaches per Industry (%)
- Table 2.4: Distribution of Breach Sizes as a Proportion of the Total Data Breaches per Industry (%)
- 2.4.2. Forecast Methodology
- Figure 2.5: Criminal Data Breach Forecast Methodology
- 2.4.3. Forecast Assumptions and Limitations of Analysis
- 2.4.4. Data Breach Forecasts
- i. Number of Cybercrime-related Data Breaches
- Figure & Table 2.6: Total Criminal Data Breaches per annum 2015-2020, Split
8. Key Regions
- ii. Cost of Cybercrime-related Data Breaches
- Figure & Table 2.7: Cost of Criminal Data Breaches per annum ($m) 2015-2020, Split by 8 Key Regions
3. Financial Cybercrime Trends and Threats
- 3.1. Introduction
- 3.2. Cybercrime and the Finance Industry
- 3.2.1. The Importance of Social Engineering
- 3.2.2. Financial Cybercrime Typology
- Figure 3.1: Bankun Phishing App Update Screen
- Figure 3.2: Timeline of Zeus Malware Evolution
- Figure 3.3: GOZ/CryptoLocker Scope
- 3.2.3. Juniper's Financial Threat Assessments
- i. Banking
- Figure 3.4: Juniper Research Banking Cybercrime Threat Landscape Assessment
- Figure 3.5: Juniper Banking Cybercrime Threat Landscape Forecast
- ii. Payments and Money Transfer
- Figure 3.6: Juniper Payments and Money Transfer Cybercrime Threat Landscape Assessment
- Figure 3.7: Juniper Payments and Money Transfer Cybercrime Threat Landscape Forecast
- iii. Mobile Wallets
- Figure 3.8: Juniper Mobile Wallets Cybercrime Threat Landscape Assessment
- Figure 3.9: Juniper Mobile Wallets Cybercrime Threat Landscape Forecast
- 3.2.4. Key Takeaways
4. Device-based Cybercrime Trends and Threats
- 4.1. Introduction
- 4.2. Mobile Malware is Miniscule
- 4.2.1. Device Cybercrime Typology
- Figure & Table 4.1: Android Versions in Use (%) April 2015
- Table 4.2: Selection of App Developers Using the Same Certificates
- 4.2.2. Juniper's Device Threat Assessment
- i. Smartphones
- Figure 4.3: Juniper Smartphones Cybercrime Threat Landscape Assessment
- Figure 4.4: Juniper Smartphones Cybercrime Threat Landscape Forecast
- ii. Wearables & IoT
- Figure 4.5: Juniper Wearables/IoT Cybercrime Threat Landscape Forecast
- 4.2.3. Key Takeaways