Follow the topics in this podcast

Set during an intense heatwave summer of - although transmitted in April the action centres upon an apartment book where Sandy and Derek Marshall reside.

Sandy played by the striking Carroll Baker is temporarily confined to a wheelchair following an horrific car accident while Derek is a high profile businessman who specialises in the insurance industry. Against this backdrop is a serial strangler whom we see ending the lives of a number of unfortunate ladies.

The Next Victim

To complete the sense of unease, the janitor in the Marshall's building is the disturbing Bartlett who comes complete with a mother and baby fixation. Derek is called away one bank holiday to a meeting with a Lebonese client while Sandy is left alone in the apartment.

She invites a neighbour, Betty, down for a drink but when the latter fails to show, Sandy becomes anxious and fears the worst. Help seems to be at hand when kindly tenant, Tom Packer steps in The final quarter is very tense as Sandy realises the danger she is in.

You are here

However the closing scene is somewhat perplexing and feels somewhat unfinished. Enjoy a night in with these popular movies available to stream now with Prime Video. Start your free trial.


  • "Thriller" The Next Victim (TV Episode ) - IMDb?
  • Carpeta de la OIM.
  • Don't allow your business to be the next victim of cyber crime - Certus.
  • Who Is the Next Victim? Vulnerability of Young Romanian Women to Trafficking in Human Beings?
  • 15 ways you could be the next victim of cybercrime | Europol.
  • Who Is the Next Victim? Vulnerability of Young Romanian Women to Trafficking in Human Beings.

Find showtimes, watch trailers, browse photos, track your Watchlist and rate your favorite movies and TV shows on your phone or tablet! You must be a registered user to use the IMDb rating plugin.

15 ways you could be the next victim of cybercrime | Europol

Edit Cast Episode cast overview, first billed only: Derek Marshall Max Mason Tom Packer Ian Gelder Betty Tyler Martin Benson Spiros Lemke Margo Reid Laura Lemke Anita Sharp-Bolster Janet Cunningham Martin Fisk Edit Storyline A woman confined to a wheelchair is terrorized by a sadistic killer. Add the first question. Was this review helpful to you? Yes No Report this. The GDPR legislation requires breaches to be reported within 72 hours. Criminals may try to extort breached organisations.

While this is not new, it is possible that hacked companies will prefer to pay a smaller ransom to a hacker for non-disclosure than the steep fine that might be imposed by the authorities. The motive behind network intrusions is the illegal acquisition of data , for a variety of purposes, including phishing or payment fraud. DDoS attacks continue to grow and tools to launch them are easily available as a service, allowing unskilled individuals to launch significant DDoS attacks.

Continued growth in the volume of social engineering attacks is expected, but as a key component of more complex cyber-attacks.

15 ways you could be the next victim of cybercrime

West African fraudsters are likely to have a more significant role within the EU in the future, as Africa continues to have the fastest growing internet usage globally. Criminals will continue to abuse cryptocurrencies. Cyber-attacks which historically targeted traditional financial instruments are now targeting businesses and users of cryptocurrencies. Cryptomining has been exploited by financially motivated cybercriminals, who for instance hack legitimate websites to cryptojack 2 users visiting those sites.

Promoted Content

Such attacks are much more appealing to cybercriminals wishing to keep a low profile, requiring little or no victim engagement and, at least currently, minimal law enforcement attention with browser-based mining not actually being illegal. We anticipate a more pronounced shift towards more privacy-oriented currencies.

The Next Victim Trailer 1974

An increase in extortion demands and ransomware in these currencies will exemplify this shift. Online child sexual exploitation continues to be the most disturbing aspect of cybercrime with volumes of material that were unimaginable ten years ago, partly because of the growing number of young children with access to internet-enabled devices and social media.