Men fall harder than women for Internet fraud, study finds
Increase your gullibility size!
Data compiled from more than 206,000 complaints received last year by the U.S. Internet Crime Complaint Center (IC3) shows that men lost $1.67 to every $1 lost by women in online fraud.
The IC3 is the clearinghouse for online crime complaints in the U.S., and its database is used by regulators and law enforcement to get a picture of criminal trends and, in some cases, help hunt down the criminals. It is a joint effort run by the FBI and the National White Collar Crime Center.
The organization says that buying patterns and human nature play into the findings.
"Historically men were more apt to purchase large ticket item like electronics ... that could explain a lot of it," said John Kane, the IC3 research manager who wrote the report.
But with women now spending more online, the difference is also due to the fact that certain types of schemes seem to suck men in. "Men tend to fall victim ... to business investment schemes and some other schemes that have a higher dollar loss," Kane said.
Investment fraud complaints, where the average loss is more than $3,500, were overwhelmingly submitted by men, Kane said. Compare that to something like auction fraud, where both men and women are frequently victimized. The average loss there is just over $480.
Men also tend to be the victims of check fraud (average loss: $3,000) and Nigerian letter fraud scams ($2,000), Kane said.
Overall, Internet crime is netting the bad guys more money than ever.
Total losses from 2007 complaints came to $239 million, up $40 million from 2006.
The 2007 data, released Thursday, shows that the total number of complaints received by the group was actually down for the second year in a row. In 2007 the IC3 Web site logged just under 207,000 complaints. In 2005 that number was over 231,000.
Kane credited the drop in complaints to increased consumer awareness, but according to Gary Warner, director of research in computer forensics with the University of Alabama at Birmingham, there may be another explanation.
Warner spends a lot of time studying the criminals and said that in recent months, researchers have noticed that credit card numbers have often been stolen and then not used. "One theory is that nobody wants to go to jail for stealing $40," he said. "So when they get access to these accounts, they're using only the ones that they can get the most value from."
Often, criminals will do a balance check and then sell only the cards with the highest balances. "I think there's a little bit of filtering on the criminal side that's at play here," he said.
There was another interesting finding in the 2007 data. The IC3 found that many countries that were commonly linked with cybercrime were the sources of the incidents it tracked, but it did not list China as a top source of perpetrators. China has been named as the source of many online attacks over the past year, but it didn't make IC3's list of top 10 countries by perpetrators.
Leading the list were the U.S., the United Kingdom and Nigeria.
- The Truth About Cloud Security "Security" is the number one issue holding business leaders back from the cloud. But does the reality match the perception?
- Enable secure remote access to 3D data without sacrificing visual perfomance Design and manufacturing companies must adapt quickly to the demands of an increasingly global and competitive economy. To speed time to market for...
- Virtually Delivered High Performance 3D Graphics "A picture is worth a thousand words." That old phrase is as true today as it ever was. Pictures (i.e., those with heavy...
- Best Practices for Securing Hadoop Historically, Apache Hadoop has provided limited security capabilities. To protect sensitive data being stored and analyzed in Hadoop, security architects should use a...
- What should I look for in a Next Generation Firewall? SANS Provides Guidance With so many vendors claiming to have a Next Generation Firewall (NGFW), it can be difficult to tell what makes each one different....
- Responding to New SSL Cybersecurity Threat The featured Gartner research examines current strategies to address new SSL cybersecurity threats and vulnerabilities. All Security White Papers | Webcasts
Our new bimonthly Internet of Things newsletter helps you keep pace with the rapidly evolving technologies, trends and developments related to the IoT. Subscribe now and stay up to date!