Skip to content
HACKMAGEDDON
  • Donate
  • About
  • Timelines
  • Statistics
  • Cloud-Native Threats
  • Data Breaches
  • Leaky Buckets
  • Infographics
  • Submit
Menu Close
  • Donate
  • About
  • Timelines
  • Statistics
  • Cloud-Native Threats
  • Data Breaches
  • Leaky Buckets
  • Infographics
  • Submit

The Alphabet of Cyber Crime from APT to Zeus

  • Post author:Paolo Passeri
  • Post last modified:May 24, 2015
  • Post category:Security
  • Post comments:0 Comments
  • Reading time:9 mins read
  • Post published:February 24, 2012

If you need to know what Cyber Crime is but you are bored and fed up with the too many information security terms, loosing yourself among the acronyms, you have stumbled upon the correct place. I have just compiled a very special alphabet which collects the terms related to Cybercrime. Forgive me for some “poetic license” and enjoy this half-serious list.

A like APT

Yes, the Advanced Persistent Threats have been the undisputed  protagonists of 2011. An APT is essentially an attack carried on with different vectors, different stages and on a distributed time windows (yes, it Persistent). APT are behind the most remarkable events of 2011 such as the RSA Breach, Stuxnet, and so on…

B like Botnet

Botnet are networks of compromised machines that are used by cybercriminals to perpetrate their malicious action. Tipically a compromised machine becomes part of a botnet where the master distributes the commands from a C&C Server. Command may include the theft of information or the attack to other machines.

C like Crime-As-A-Service

The last frontier of Cybercrime: why developing costly malware if you can find a wide offer of customizable malware on the black market offering help desk and support services?

D like DLP

Data Leackage (or Lost) prevention is a suite of technologies that may help organization to counter the theft of information by preventing misuse or leak of data while they are in use at the endpoint (DIU), in transit on the network (DIM), or simply it is an aggregated Dark Matter on the corporate servers (DAR) that needs to be indexed and cataloged (and possibly classified and assessed).

(more…)

Like this:

Like Loading...

Continue ReadingThe Alphabet of Cyber Crime from APT to Zeus

Beware Of The Red Dragon

  • Post author:
  • Post last modified:December 7, 2011
  • Post category:Cyberwar/Security
  • Post comments:0 Comments
  • Reading time:5 mins read
  • Post published:December 7, 2011

I have dedicated several posts to NG-IPS, the next step of the evolution in network security (or better to say…

Continue ReadingBeware Of The Red Dragon

Moving Security Model From Content To Context

  • Post author:
  • Post last modified:November 27, 2011
  • Post category:Security
  • Post comments:1 Comment
  • Reading time:1 mins read
  • Post published:November 27, 2011

In these days I visited several customers to talk about technology trends for 2012. With the occasion I decided to…

Continue ReadingMoving Security Model From Content To Context

Advanced Persistent Threats and Human Errors

  • Post author:
  • Post last modified:November 20, 2011
  • Post category:Security
  • Post comments:1 Comment
  • Reading time:4 mins read
  • Post published:November 20, 2011

In these days many people are asking me what they can do to stop an Advanced Persistent Threat. Although security…

Continue ReadingAdvanced Persistent Threats and Human Errors

Are You Ready For The Next Generation IPS?

  • Post author:
  • Post last modified:October 27, 2011
  • Post category:Security
  • Post comments:1 Comment
  • Reading time:4 mins read
  • Post published:October 27, 2011

Advanced Persistent Threats are changing the information security paradigm and Next Generation IPS will probably be, together with SIEM, the…

Continue ReadingAre You Ready For The Next Generation IPS?
Copyright 2022 - HACKMAGEDDON.COM
 

Loading Comments...
 

    %d bloggers like this: