UK leaps up hacking league table, finds NCC Group

The UK is in the top ten sources of cyber attacks for the first time this year, according to the latest Origin of Hacks report from NCC Group

The UK is in the top ten sources of cyber attacks for the first time this year, according to the latest Origin of Hacks report from IT assurance and security organisation, the NCC Group.

The study, which tracks global computer hacking for the first quarter of the year, also shows that the proportion of hacks coming from Russia and the Netherlands rose abruptly.

The UK has jumped 8 places in the league to seventh position, with 2.4% of the world’s hacking attempts originating there in the first quarter of 2012. This is up 100% from the second half of 2011.

China still tops the league, followed by the US. Russia is in third position with more than 12% of global hacks originating there, compared with just 3.5% in the previous six months.

There was also a significant rise in hacks from the Netherlands, up from 3.1% to over 11%, moving it into fourth place in the hacking chart.

Overall, the top ten has changed a great deal over just three months, with Italy, France and India all dropping out. Taking their places are Ukraine (fifth), UK and South Korea (ninth).

“Cyber crime is perpetually evolving - the dramatic increase of hacks from certain countries over a three-month period just goes to show the fluidity and quick-changing nature of the issue," said Rob Cotton, chief executive of the NCC Group.

“Because cyber crime develops and alters on a daily basis, so too must the counter-measures. We need greater agility and collaboration on an international scale," Cotton said.

CW+

Features

Enjoy the benefits of CW+ membership, learn more and join.

Read more on Hackers and cybercrime prevention

0 comments

Oldest 

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to:

-ADS BY GOOGLE

SearchCIO

SearchSecurity

  • Dissecting the Hack

    In this excerpt from chapter three of Dissecting the Hack: The V3RB0TEN Network, authors Jayson E. Street, Kristin Sims and Brian...

  • Digital Identity Management

    In this excerpt of Digital Identity Management, authors Maryline Laurent and Samia Bousefrane discuss principles of biometrics ...

  • Becoming a Global Chief Security Executive Officer

    In this excerpt of Becoming a Global Chief Security Executive Officer: A How to Guide for Next Generation Security Leaders, ...

SearchNetworking

SearchDataCenter

SearchDataManagement

Close