{"id":6864,"date":"2018-08-22T23:14:00","date_gmt":"2018-08-22T23:14:00","guid":{"rendered":"https:\/\/www.ikusi.com\/the-cybercrime-threat-scenario-in-2017\/"},"modified":"2018-08-22T23:14:00","modified_gmt":"2018-08-22T23:14:00","slug":"the-cybercrime-threat-scenario-in-2017","status":"publish","type":"post","link":"https:\/\/www.ikusi.com\/en\/blog\/the-cybercrime-threat-scenario-in-2017\/","title":{"rendered":"The cybercrime threat scenario in 2017"},"content":{"rendered":"\n<p>A variety of <a href=\"https:\/\/www.ikusiredes.com\/en\/infraestructura\/deception-based-security\/\" target=\"_blank\" rel=\"noreferrer noopener\">cybersecurity threats<\/a> are appearing and increasing considerably the percentage of digital attacks each year. Currently, <strong>cryptocurrency mining<\/strong>, which constitutes an alternative source of income for cybercriminals, has been increasing unexpectedly.<\/p>\n\n\n\n<p><strong>Cybercriminals<\/strong> are acquiring new skills to discover new ways to affect companies by methods harder to be tracked; among these, there are <strong>attacks on mobile devices<\/strong>, which represent an increasingly striking target and which can be more easily affected as long as operating systems are not updated. In the following infographic we indicate the most relevant attacks occurred during 2017, as well as the solutions that exist to eradicate them.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/www.ikusiredes.com\/uploads\/2020\/08\/infografia_cibercrimenes_en-982x1024.png\" alt=\"\" class=\"wp-image-1506\" \/><\/figure>\n","protected":false},"excerpt":{"rendered":"<p>A variety of cybersecurity threats are appearing and increasing considerably the percentage of digital attacks each year. Currently, cryptocurrency mining, [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":20825,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[300],"tags":[],"temas":[303],"class_list":["post-6864","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news","temas-cybersecurity"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>The cybercrime threat scenario in 2017 - Ikusi<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.ikusi.com\/en\/blog\/the-cybercrime-threat-scenario-in-2017\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The cybercrime threat scenario in 2017 - Ikusi\" \/>\n<meta property=\"og:description\" content=\"A variety of cybersecurity threats are appearing and increasing considerably the percentage of digital attacks each year. Currently, cryptocurrency mining, [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.ikusi.com\/en\/blog\/the-cybercrime-threat-scenario-in-2017\/\" \/>\n<meta property=\"og:site_name\" content=\"Ikusi\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/IkusiVelatia\" \/>\n<meta property=\"article:published_time\" content=\"2018-08-22T23:14:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.ikusi.com\/wp-content\/uploads\/2025\/07\/22agoo2018_cibercrimenes-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"675\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Ikusi\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@ikusi_espana\" \/>\n<meta name=\"twitter:site\" content=\"@ikusi_espana\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Ikusi\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.ikusi.com\/en\/blog\/the-cybercrime-threat-scenario-in-2017\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.ikusi.com\/en\/blog\/the-cybercrime-threat-scenario-in-2017\/\"},\"author\":{\"name\":\"Ikusi\",\"@id\":\"https:\/\/www.ikusi.com\/en\/#\/schema\/person\/03048d7aa5bdf92bd917cd51d825682a\"},\"headline\":\"The cybercrime threat scenario in 2017\",\"datePublished\":\"2018-08-22T23:14:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.ikusi.com\/en\/blog\/the-cybercrime-threat-scenario-in-2017\/\"},\"wordCount\":107,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.ikusi.com\/en\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.ikusi.com\/en\/blog\/the-cybercrime-threat-scenario-in-2017\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.ikusi.com\/wp-content\/uploads\/2025\/07\/22agoo2018_cibercrimenes-1.jpg\",\"articleSection\":[\"News\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.ikusi.com\/en\/blog\/the-cybercrime-threat-scenario-in-2017\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.ikusi.com\/en\/blog\/the-cybercrime-threat-scenario-in-2017\/\",\"url\":\"https:\/\/www.ikusi.com\/en\/blog\/the-cybercrime-threat-scenario-in-2017\/\",\"name\":\"The cybercrime threat scenario in 2017 - Ikusi\",\"isPartOf\":{\"@id\":\"https:\/\/www.ikusi.com\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.ikusi.com\/en\/blog\/the-cybercrime-threat-scenario-in-2017\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.ikusi.com\/en\/blog\/the-cybercrime-threat-scenario-in-2017\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.ikusi.com\/wp-content\/uploads\/2025\/07\/22agoo2018_cibercrimenes-1.jpg\",\"datePublished\":\"2018-08-22T23:14:00+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.ikusi.com\/en\/blog\/the-cybercrime-threat-scenario-in-2017\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.ikusi.com\/en\/blog\/the-cybercrime-threat-scenario-in-2017\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.ikusi.com\/en\/blog\/the-cybercrime-threat-scenario-in-2017\/#primaryimage\",\"url\":\"https:\/\/www.ikusi.com\/wp-content\/uploads\/2025\/07\/22agoo2018_cibercrimenes-1.jpg\",\"contentUrl\":\"https:\/\/www.ikusi.com\/wp-content\/uploads\/2025\/07\/22agoo2018_cibercrimenes-1.jpg\",\"width\":1200,\"height\":675},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.ikusi.com\/en\/blog\/the-cybercrime-threat-scenario-in-2017\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\/\/www.ikusi.com\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"The cybercrime threat scenario in 2017\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.ikusi.com\/en\/#website\",\"url\":\"https:\/\/www.ikusi.com\/en\/\",\"name\":\"Ikusi - Servicios de Digitalizaci\u00f3n y Ciberseguridad\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.ikusi.com\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.ikusi.com\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.ikusi.com\/en\/#organization\",\"name\":\"Ikusi\",\"url\":\"https:\/\/www.ikusi.com\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.ikusi.com\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.ikusi.com\/wp-content\/uploads\/2025\/06\/logo-ikusi.svg\",\"contentUrl\":\"https:\/\/www.ikusi.com\/wp-content\/uploads\/2025\/06\/logo-ikusi.svg\",\"width\":1,\"height\":1,\"caption\":\"Ikusi\"},\"image\":{\"@id\":\"https:\/\/www.ikusi.com\/en\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/IkusiVelatia\",\"https:\/\/x.com\/ikusi_espana\",\"https:\/\/www.instagram.com\/ikusi.velatia\/\",\"https:\/\/www.linkedin.com\/company\/ikusi\/\",\"https:\/\/www.youtube.com\/user\/IkusiGroup\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.ikusi.com\/en\/#\/schema\/person\/03048d7aa5bdf92bd917cd51d825682a\",\"name\":\"Ikusi\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.ikusi.com\/en\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/?s=96&d=mm&r=g\",\"caption\":\"Ikusi\"},\"url\":\"https:\/\/www.ikusi.com\/en\/author\/ikusi\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"The cybercrime threat scenario in 2017 - Ikusi","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.ikusi.com\/en\/blog\/the-cybercrime-threat-scenario-in-2017\/","og_locale":"en_US","og_type":"article","og_title":"The cybercrime threat scenario in 2017 - Ikusi","og_description":"A variety of cybersecurity threats are appearing and increasing considerably the percentage of digital attacks each year. Currently, cryptocurrency mining, [&hellip;]","og_url":"https:\/\/www.ikusi.com\/en\/blog\/the-cybercrime-threat-scenario-in-2017\/","og_site_name":"Ikusi","article_publisher":"https:\/\/www.facebook.com\/IkusiVelatia","article_published_time":"2018-08-22T23:14:00+00:00","og_image":[{"width":1200,"height":675,"url":"https:\/\/www.ikusi.com\/wp-content\/uploads\/2025\/07\/22agoo2018_cibercrimenes-1.jpg","type":"image\/jpeg"}],"author":"Ikusi","twitter_card":"summary_large_image","twitter_creator":"@ikusi_espana","twitter_site":"@ikusi_espana","twitter_misc":{"Written by":"Ikusi","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.ikusi.com\/en\/blog\/the-cybercrime-threat-scenario-in-2017\/#article","isPartOf":{"@id":"https:\/\/www.ikusi.com\/en\/blog\/the-cybercrime-threat-scenario-in-2017\/"},"author":{"name":"Ikusi","@id":"https:\/\/www.ikusi.com\/en\/#\/schema\/person\/03048d7aa5bdf92bd917cd51d825682a"},"headline":"The cybercrime threat scenario in 2017","datePublished":"2018-08-22T23:14:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.ikusi.com\/en\/blog\/the-cybercrime-threat-scenario-in-2017\/"},"wordCount":107,"commentCount":0,"publisher":{"@id":"https:\/\/www.ikusi.com\/en\/#organization"},"image":{"@id":"https:\/\/www.ikusi.com\/en\/blog\/the-cybercrime-threat-scenario-in-2017\/#primaryimage"},"thumbnailUrl":"https:\/\/www.ikusi.com\/wp-content\/uploads\/2025\/07\/22agoo2018_cibercrimenes-1.jpg","articleSection":["News"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.ikusi.com\/en\/blog\/the-cybercrime-threat-scenario-in-2017\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.ikusi.com\/en\/blog\/the-cybercrime-threat-scenario-in-2017\/","url":"https:\/\/www.ikusi.com\/en\/blog\/the-cybercrime-threat-scenario-in-2017\/","name":"The cybercrime threat scenario in 2017 - Ikusi","isPartOf":{"@id":"https:\/\/www.ikusi.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.ikusi.com\/en\/blog\/the-cybercrime-threat-scenario-in-2017\/#primaryimage"},"image":{"@id":"https:\/\/www.ikusi.com\/en\/blog\/the-cybercrime-threat-scenario-in-2017\/#primaryimage"},"thumbnailUrl":"https:\/\/www.ikusi.com\/wp-content\/uploads\/2025\/07\/22agoo2018_cibercrimenes-1.jpg","datePublished":"2018-08-22T23:14:00+00:00","breadcrumb":{"@id":"https:\/\/www.ikusi.com\/en\/blog\/the-cybercrime-threat-scenario-in-2017\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.ikusi.com\/en\/blog\/the-cybercrime-threat-scenario-in-2017\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.ikusi.com\/en\/blog\/the-cybercrime-threat-scenario-in-2017\/#primaryimage","url":"https:\/\/www.ikusi.com\/wp-content\/uploads\/2025\/07\/22agoo2018_cibercrimenes-1.jpg","contentUrl":"https:\/\/www.ikusi.com\/wp-content\/uploads\/2025\/07\/22agoo2018_cibercrimenes-1.jpg","width":1200,"height":675},{"@type":"BreadcrumbList","@id":"https:\/\/www.ikusi.com\/en\/blog\/the-cybercrime-threat-scenario-in-2017\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/www.ikusi.com\/en\/"},{"@type":"ListItem","position":2,"name":"The cybercrime threat scenario in 2017"}]},{"@type":"WebSite","@id":"https:\/\/www.ikusi.com\/en\/#website","url":"https:\/\/www.ikusi.com\/en\/","name":"Ikusi - Servicios de Digitalizaci\u00f3n y Ciberseguridad","description":"","publisher":{"@id":"https:\/\/www.ikusi.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.ikusi.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.ikusi.com\/en\/#organization","name":"Ikusi","url":"https:\/\/www.ikusi.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.ikusi.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.ikusi.com\/wp-content\/uploads\/2025\/06\/logo-ikusi.svg","contentUrl":"https:\/\/www.ikusi.com\/wp-content\/uploads\/2025\/06\/logo-ikusi.svg","width":1,"height":1,"caption":"Ikusi"},"image":{"@id":"https:\/\/www.ikusi.com\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/IkusiVelatia","https:\/\/x.com\/ikusi_espana","https:\/\/www.instagram.com\/ikusi.velatia\/","https:\/\/www.linkedin.com\/company\/ikusi\/","https:\/\/www.youtube.com\/user\/IkusiGroup"]},{"@type":"Person","@id":"https:\/\/www.ikusi.com\/en\/#\/schema\/person\/03048d7aa5bdf92bd917cd51d825682a","name":"Ikusi","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.ikusi.com\/en\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/?s=96&d=mm&r=g","caption":"Ikusi"},"url":"https:\/\/www.ikusi.com\/en\/author\/ikusi\/"}]}},"_links":{"self":[{"href":"https:\/\/www.ikusi.com\/en\/wp-json\/wp\/v2\/posts\/6864","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.ikusi.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.ikusi.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.ikusi.com\/en\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.ikusi.com\/en\/wp-json\/wp\/v2\/comments?post=6864"}],"version-history":[{"count":0,"href":"https:\/\/www.ikusi.com\/en\/wp-json\/wp\/v2\/posts\/6864\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.ikusi.com\/en\/wp-json\/wp\/v2\/media\/20825"}],"wp:attachment":[{"href":"https:\/\/www.ikusi.com\/en\/wp-json\/wp\/v2\/media?parent=6864"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.ikusi.com\/en\/wp-json\/wp\/v2\/categories?post=6864"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.ikusi.com\/en\/wp-json\/wp\/v2\/tags?post=6864"},{"taxonomy":"temas","embeddable":true,"href":"https:\/\/www.ikusi.com\/en\/wp-json\/wp\/v2\/temas?post=6864"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}