Skip to content
HACKMAGEDDON
  • Donate
  • About
  • Timelines
  • Statistics
  • Cloud-Native Threats
  • Data Breaches
  • Leaky Buckets
  • Infographics
  • Submit
Menu Close
  • Donate
  • About
  • Timelines
  • Statistics
  • Cloud-Native Threats
  • Data Breaches
  • Leaky Buckets
  • Infographics
  • Submit
Read more about the article Worldwide Security Software Market Reached $21.4 Billion in 2014

Worldwide Security Software Market Reached $21.4 Billion in 2014

  • Post author:Paolo Passeri
  • Post last modified:June 4, 2015
  • Post category:Security
  • Post comments:1 Comment
  • Reading time:2 mins read
  • Post published:May 28, 2015

Worldwide security software revenue totaled $21.4 billion in 2014, showing a 5.3 percent increase from 2013 revenue of $20.3 billion,…

Continue ReadingWorldwide Security Software Market Reached $21.4 Billion in 2014

Browsing Security Predictions for 2012

  • Post author:Paolo Passeri
  • Post last modified:May 24, 2015
  • Post category:Security
  • Post comments:4 Comments
  • Reading time:5 mins read
  • Post published:January 8, 2012

Update 01/11/2012: Year-to-Tear comparison with 2011 Security Predictions The new year has just come, vacations are over, and, as usually…

Continue ReadingBrowsing Security Predictions for 2012

The Alphabet of Cyber Crime from APT to Zeus

  • Post author:Paolo Passeri
  • Post last modified:May 24, 2015
  • Post category:Security
  • Post comments:0 Comments
  • Reading time:9 mins read
  • Post published:February 24, 2012

If you need to know what Cyber Crime is but you are bored and fed up with the too many information security terms, loosing yourself among the acronyms, you have stumbled upon the correct place. I have just compiled a very special alphabet which collects the terms related to Cybercrime. Forgive me for some “poetic license” and enjoy this half-serious list.

A like APT

Yes, the Advanced Persistent Threats have been the undisputed  protagonists of 2011. An APT is essentially an attack carried on with different vectors, different stages and on a distributed time windows (yes, it Persistent). APT are behind the most remarkable events of 2011 such as the RSA Breach, Stuxnet, and so on…

B like Botnet

Botnet are networks of compromised machines that are used by cybercriminals to perpetrate their malicious action. Tipically a compromised machine becomes part of a botnet where the master distributes the commands from a C&C Server. Command may include the theft of information or the attack to other machines.

C like Crime-As-A-Service

The last frontier of Cybercrime: why developing costly malware if you can find a wide offer of customizable malware on the black market offering help desk and support services?

D like DLP

Data Leackage (or Lost) prevention is a suite of technologies that may help organization to counter the theft of information by preventing misuse or leak of data while they are in use at the endpoint (DIU), in transit on the network (DIM), or simply it is an aggregated Dark Matter on the corporate servers (DAR) that needs to be indexed and cataloged (and possibly classified and assessed).

(more…)

Like this:

Like Loading...

Continue ReadingThe Alphabet of Cyber Crime from APT to Zeus

Relazione Tavola Rotonda Mobile Security

  • Post author:
  • Post last modified:March 24, 2011
  • Post category:Mobile/Security
  • Post comments:0 Comments
  • Reading time:1 mins read
  • Post published:March 24, 2011

Ho pubblicato su Slideshare la relazione da me redatta della Tavola Rotonda "Mobile Security: Rischi, Tecnologie, Mercato" tenutasi il 14…

Continue ReadingRelazione Tavola Rotonda Mobile Security

Mobile Security: Impressioni a Caldo

  • Post author:
  • Post last modified:March 16, 2011
  • Post category:Mobile/Security
  • Post comments:4 Comments
  • Reading time:6 mins read
  • Post published:March 16, 2011

Fortunatamente il virus che mi ha colpito sta mitigando i suoi effetti, la mente è un po' più lucida e…

Continue ReadingMobile Security: Impressioni a Caldo

Parigi val bene una messa (In Sicurezza)

  • Post author:
  • Post last modified:March 9, 2011
  • Post category:Security
  • Post comments:0 Comments
  • Reading time:3 mins read
  • Post published:March 9, 2011

A conferma delle previsioni dei produttori di sicurezza sembra proprio che dovremo abituarci, nel corso di questo 2011, ad attacchi…

Continue ReadingParigi val bene una messa (In Sicurezza)

Lo Smartphone? Ha fatto il BOT!

  • Post author:
  • Post last modified:February 23, 2011
  • Post category:Security
  • Post comments:2 Comments
  • Reading time:7 mins read
  • Post published:February 23, 2011

E' stato appena pubblicato un interessante articolo di Georgia Weidman relativo al concept di una botnet di smartphone controllati tramite…

Continue ReadingLo Smartphone? Ha fatto il BOT!

L’Androide (Virtuale)? E’ Tutto Casa e Lavoro

  • Post author:
  • Post last modified:February 16, 2011
  • Post category:Security
  • Post comments:2 Comments
  • Reading time:6 mins read
  • Post published:February 16, 2011

In questi i giorni i fari multimediali del mondo sono puntati verso Barcellona, dove si sta svolgendo il Mobile World…

Continue ReadingL’Androide (Virtuale)? E’ Tutto Casa e Lavoro

Mali Di Stagione (Seconda Parte)

  • Post author:
  • Post last modified:February 2, 2011
  • Post category:Security
  • Post comments:5 Comments
  • Reading time:4 mins read
  • Post published:February 2, 2011

Assistendo in questi giorni alle continue scoperte di bachi nell'Androide non posso fare a meno di chiedermi se queste siano…

Continue ReadingMali Di Stagione (Seconda Parte)

Quando la NASA ha la testa per aria…

  • Post author:
  • Post last modified:December 11, 2010
  • Post category:Security
  • Post comments:0 Comments
  • Reading time:4 mins read
  • Post published:December 11, 2010

Accade che materiale informatico contenente informazioni classificate venga messo impunemente in vendita. Personalmente ritengo che quello del DLP, sia uno…

Continue ReadingQuando la NASA ha la testa per aria…
Copyright 2022 - HACKMAGEDDON.COM
 

Loading Comments...
 

    %d bloggers like this: