Top 5 Countries where Cyber Attacks Originate

Page 2 of 1

Top 5 Countries Where Cyber Attacks Originate

Cyber attacks have been around as far back as the internet itself. Most countries have fallen victims to the traditional style of cyber attacks originating from other countries and with the rate of information growing exponentially in value and in volume, cyber risks have started to pose serious threats to governments, businesses and economies around the world. It is possible the continuous growth in cyber attacks could result in man-made disasters around the world.

2016 saw some of the most destructive cyber attacks since the dawn of the internet. Looking at the recent trends of the past, we can expect the this pattern to not only continue, but increase in severity.

What are the sources of these cyber attacks?

Most attacks are hatched by unidentified hackers working in groups or individually. The list below identifies the countries in which some of the biggest attacks were sourced from.

China

China continues to wage forward in cyber attacks, stealing intellectual property in the process despite political pressures by the US government. Also, China's cyber espionage campaigns appear to be more streamlined. The purpose of these attacks is to mostly hack the networks of US government and its allies. As per a research, 27.24% of cyber attacks are initiated by China. And according to various estimates, 41% of the world’s cyber attacks trace their genesis back to China.

Last year, ABC news reported that Chinese spies have reportedly stepped up their cyber attacks on networks belonging to Australian government and individuals in Australia. Hundreds of cyber attacks are now carried out every month. Aussies need to be aware of these hacking attempts and must use an Australia VPN to stay anonymous.

United States

While speaking at a press conference in G20 summit in China, the former President Barack Obama said “the nation he leads has the world's foremost cyber arsenal in the world.” This might be actually true given the sophistication of cyber attacks allegedly carried out by the US. In fact, 17.12% of cyber attacks are initiated by the US. As per various estimates, the US accounts for nearly 10% of the world’s malicious digital traffic. It is home to many famous and infamous hackers.

Turkey

In the global cyber attack traffic, Turkey has a share of 4.7% and as per estimates, 10.24% cyber attacks are carried out by Turkish hackers. Also, they have increased their activities in the last decade or so.

Brazil

It was last year’s hacking attempt at the Rio Olympics that brought Brazilian hackers into the limelight. In fact, Brazil has the highest cyber attack traffic not only in South-America but the entire southern hemisphere. Approximately, 8.60%of cyber attacks are initiated by Brazilians. The reason behind the growing numbers of cyber criminals in Brazil is the cashless nature of its economy.

Russia

Nearly 4.3% of all the global attack traffic is generated from Russia. The last year's DNC hack has placed Russia on our list. Russian hackers are famous worldwide and have a knack for cracking the most secure of networks. A total of 5.14% of cyber attacks are initiated by the Russians.

About the Author

Anas Baig is a Security Journalist covers most of the Cyber Security & Tech news. He is a security professional and writer specializing in Science and Technology, with a passion for dinosaurs, archaeology, robots, cars and animals great and small.

Featured

  • Maximizing Your Security Budget This Year

    The Importance of Proactive Security Measures: 4 Stories of Regret

    We all want to believe that crime won’t happen to us. So, some business owners hope for the best and put proactive security measures on the back burner, because other things like growth, attracting new customers, and meeting deadlines all seem more pressing. Read Now

  • Today's Enterprise

    Protecting servers and data has evolved rapidly over the past 15-plus years. Early on, concerns centered around the environmental conditions of where servers were housed within a building and the effects of humidity, temperature and air quality on their performance. This led to a better understanding of the need for a controlled environment to maximize equipment lifespan and capacity. It was also a driving force behind consolidating servers in a common space, i.e., the data center. Read Now

  • Study Proves It: Security Awareness Training Reduces Phishing Attacks

    Attackers are increasingly targeting human-based vulnerabilities to infiltrate organizations. Humans have direct access to insider systems and data – any threat actor can easily phish users, steal their credentials and secure keys to the kingdom without having to fight advanced cybersecurity defenses. Studies show social engineering attacks and human errors are behind 68% of all breaches.  Read Now

  • Security Questions Persist After Attempted Assassination Attempt of Donald Trump

Featured Cybersecurity

Webinars

New Products

  • Mobile Safe Shield

    Mobile Safe Shield

    SafeWood Designs, Inc., a manufacturer of patented bullet resistant products, is excited to announce the launch of the Mobile Safe Shield. The Mobile Safe Shield is a moveable bullet resistant shield that provides protection in the event of an assailant and supplies cover in the event of an active shooter. With a heavy-duty steel frame, quality castor wheels, and bullet resistant core, the Mobile Safe Shield is a perfect addition to any guard station, security desks, courthouses, police stations, schools, office spaces and more. The Mobile Safe Shield is incredibly customizable. Bullet resistant materials are available in UL 752 Levels 1 through 8 and include glass, white board, tack board, veneer, and plastic laminate. Flexibility in bullet resistant materials allows for the Mobile Safe Shield to blend more with current interior décor for a seamless design aesthetic. Optional custom paint colors are also available for the steel frame. 3

  • AC Nio

    AC Nio

    Aiphone, a leading international manufacturer of intercom, access control, and emergency communication products, has introduced the AC Nio, its access control management software, an important addition to its new line of access control solutions. 3

  • Camden CM-221 Series Switches

    Camden CM-221 Series Switches

    Camden Door Controls is pleased to announce that, in response to soaring customer demand, it has expanded its range of ValueWave™ no-touch switches to include a narrow (slimline) version with manual override. This override button is designed to provide additional assurance that the request to exit switch will open a door, even if the no-touch sensor fails to operate. This new slimline switch also features a heavy gauge stainless steel faceplate, a red/green illuminated light ring, and is IP65 rated, making it ideal for indoor or outdoor use as part of an automatic door or access control system. ValueWave™ no-touch switches are designed for easy installation and trouble-free service in high traffic applications. In addition to this narrow version, the CM-221 & CM-222 Series switches are available in a range of other models with single and double gang heavy-gauge stainless steel faceplates and include illuminated light rings. 3