Atlas VPN blog
Your daily reads on everything digital
7 out of 10 consumers would give up personal details for a discount code
Online privacy has come into the spotlight in recent years like never before. As a result, tech corporations have to adjust to the changing digital marketing landscape as consumers want more and more personal data privacy online.
60 Worrying Cybercrime Statistics & Facts for H1 2022
Atlas VPN compiled their 2021-2022 cybercrime statistics to provide a clear look on the cyber-threat landscape.
US data compromises affected over 20 million people in Q1 2022
According to the data presented by the Atlas VPN team, publicly reported data compromises in the United States affected 20,773,963 million victims (approximately 230,822 a day) in the first quarter of 2022.
Only 4 of the 50 US states have enacted consumer data protection laws
Consumer data protection laws establish consumers' rights around access, deletion, and portability of personal information. Also, it provides the right to opt-out of targeted advertising and the sale of personal data.
Microsoft was the most impersonated brand in phishing attacks in 2021
Phishing actors frequently impersonate well-known brands, taking advantage of consumer trends to scam unsuspecting customers. Productivity tools, illegal streaming sites, retail sites, social media, finance, and many other services are often imitated brands.
Tech support scam losses double causing nearly $350 million in damages in 2021
Atlas VPN analysis reveals that tech support scam losses increased by 137% in 2021 and caused $347.66 million in damages to unwitting individuals globally.
Top 5 cybercrime statistics in the last year
In this article, Atlas VPN will shine a light on the most notable cybercrime statistics from the past year in regard to damages. Feel free to click on any of the sources to head over to an article that goes in-depth about that particular statistic.
Web threats increase by over 130% at the end of 2021
Web threats affect everyone and every device that is connected to the internet. Web threats enter users' networks without their awareness and can be activated by opening a spam email or clicking on an executable file attachment. Once they have compromised a system, web threats can travel through the network to infect other PCs.