In its most recent report, McAfee takes a look at the evolution of cybercrime in the last ten years, lists the greatest scams and exploits and predicts the future.
According to McAfee, in its latest report “A Good Decade for Cybercrime”, the rise of cybercrime is on par with the rise of the internet over the last ten years. As the internet grew, from 361 million users in 2000 to almost two billion in 2010, so did cybercrime.
“Ten years ago, cybercrime was a completely different business,” says Michael Sentonas, McAfee CTO for APAC, in the report.
“Over the last decade, cybercriminals and their tactics have grown in complexity and sophistication. Attacks have become more targeted and users more vulnerable as more sensitive and personal information is stored on the internet.”
Top 3 Internet Exploits
So, what were the top scams and exploits of the last decade?
Conficker’s Stealthy Destruction
This worm took cybercrime to a whole new level in 2007 as it allowed hackers to take control of the infected computers and to retrieve sensible information. For that, it scores third place in McAfee’s index, causing $9.1 billion in estimated damage.
‘I Love You’ Virus
In second place comes the “I love you” worm, which arrived by mail and invited users to read a love letter written especially for them. Instead of love notes, users downloaded a virus. Damages caused have been estimated to exceed $15 billion.
MyDoom’s mass infection
In first place comes the MyDoom’s mass infection. Damage caused by this worm is estimated to have exceeded $38 billion. Designed to send spam mails through infected computers, its first attack took place in 2004. It sent so much spam from computers worldwide that it slowed down the internet by 10%.
Top 3 Cybercrime Scams
Cybercriminals also attracted an infamous reputation in the last decade, namely for these three scams.
Phoney websites
In third place comes phoney websites. These scams lead the user to replica sites where they are expected to introduce sensible information. Cybercriminals can use this information in many ways, from identity theft to bank fraud. These are often related to phishing scams.
Phishing scams
Phishing scams come in second place. These scams try to induce the user to share personal information by pretending to be a legitimate organisation, a friend over Facebook and even through instant messaging. In the end of 2009, more than 49,000 phishing sites were detected.
Fake antivirus software
First place honours go to what is often referred to as the ‘Scareware’ scam, whereby cybercriminals try to sell fake antivirus software by flashing warning signs of infection on an internet user’s computer screen leading users to believe that the computer is infected. Then, they urge the user to buy an antivirus, providing the cybercriminals with money and credit card information.
The future of cybercrime
Looking at the future, McAfee Labs predicts that the rise of social networking scams, like fake friend requests over Facebook and fake links over Twitter’s hot topics, are likely to become burdensome and sometimes costly risks for internet users.
McAfee also believes that mobile phones and apps will become hot areas for cybercriminal activity, as cybercriminals attempt to exploit such devices to access users’ personal information.
So, how many of these scams caught you out in the last decade? And what devious directions do you think cybercrime will take in the next?



![Five essential things to get right if you want to raise capital, with Bryan Vadas [FREE CHEAT SHEET]](https://anthillonline.com/wp-content/uploads/2015/08/vadas-3d-cover-01--300x194.png)
![Want more credibility and influence? Unlock the 12 principles of persuasion checklist [FREE DOWNLOAD]](https://anthillonline.com/wp-content/uploads/2016/03/james-persuasion-and-influence-nfsu-02.pdf-Box-2016-03-24-15-09-44-100x75.png)
![The Alchemy of Negotiation with Matt Lohmeyer [FREE REPORT]](https://anthillonline.com/wp-content/uploads/2015/07/Capture-100x75.jpg)
![Learn how to devise winning business ideas in four steps with Martin Martinez [CHEAT SHEET]](https://anthillonline.com/wp-content/uploads/2015/07/Screen-Shot-2015-11-26-at-13.44.27-100x75.png)
![How to confidently raise venture capital… with Jack Delosa [CHEAT SHEET]](https://anthillonline.com/wp-content/uploads/2016/04/jack-de-losa-confidently-raising-venture-NFSU-rebrand-01.pdf-Box-2016-04-19-12-37-42-100x75.png)
![How to market your business when you don’t have a business yet [CHEAT SHEET]](https://anthillonline.com/wp-content/uploads/2016/01/oli-gardner-memes-02-100x75.jpg)
![The world just can’t get enough of this Aussie grandpa’s invention [VIDEO]](https://anthillonline.com/wp-content/uploads/2016/02/John-Sanders-CEO-of-HydroKleen-Australia-300x350.jpg)
![This inspiring Guy has been named the 2015 Young New Zealander of the Year [VIDEO]](https://anthillonline.com/wp-content/uploads/2015/03/Guy-Ryan-founder-Inspiring-Stories-300x350.jpg)
![It’s a magical, morphing touch screen keypad that you won’t quite believe [VIDEO]](https://anthillonline.com/wp-content/uploads/2015/02/phorm-300x350.jpg)
![Learn how to devise winning business ideas in four steps with Martin Martinez [CHEAT SHEET]](https://anthillonline.com/wp-content/uploads/2015/07/Screen-Shot-2015-11-26-at-13.44.27-300x194.png)
![The Ultimate Social Media Almanac with James Tuckerman [Cheat Sheet]](https://anthillonline.com/wp-content/uploads/2015/11/Screen-Shot-2015-11-26-at-11.24.55-100x75.png)
![Five ways to manage your time by managing yourself, with Helen Ebdon [CHEAT SHEET]](https://anthillonline.com/wp-content/uploads/2015/07/ebdon-3d-cover-01--100x75.png)
![How to price your product or service in 8 steps with Steve Major [FREE INFOGRAPHIC]](https://anthillonline.com/wp-content/uploads/2015/07/Screen-Shot-2015-11-26-at-11.40.10-100x75.png)
![Need more leads? Here are five strategies [FREE DOWNLOAD]](https://anthillonline.com/wp-content/uploads/2016/04/james-FIVE-SIMPLE-STRATEGIES-TO-GET-MORE-LEADS-01-06.pdf-Box-2016-05-13-15-49-32-100x75.png)
![New Zealand’s Xero eyes US IPO, further disruption as subscribers increase [INFOGRAPHIC]](https://anthillonline.com/wp-content/uploads/2014/07/sruuuuujana-212x194.png)
![Ever wonder if your ‘content marketing’ is really just crap? You gotta see this! [INFOGRAPHIC]](https://anthillonline.com/wp-content/uploads/2014/08/content-100x75.jpg)
![7 Business Lessons From Game of Thrones [INFOGRAPHIC]](https://anthillonline.com/wp-content/uploads/2014/10/infographic-games-of-thrones-041-100x75.jpg)
![How to build your own Media Empire… In seven steps with Nathan Chan [INFOGRAPHIC]](https://anthillonline.com/wp-content/uploads/2014/10/Nathan-Chan-Infographic-e1413419529176-100x75.jpg)
![5 Business Lessons From Tinder [INFOGRAPHIC]](https://anthillonline.com/wp-content/uploads/2014/10/Tinder-Elegant-Infographic-100x75.jpg)



