Skip to content
  • About
  • Submit An Attack
  • Cyber Attacks Timeline
    • 2011 Cyber Attacks Timeline Master Index
    • 2012 Cyber Attacks Timeline Master Index
    • 2013 Cyber Attacks Timeline Master Index
    • 2014 Cyber Attacks Timeline Master Index
    • 2015 Cyber Attacks Timelines Master Index
    • 2017 Master Table
    • 2018 Master Table
  • Cyber Attacks Statistics
Menu Close
  • About
  • Submit An Attack
  • Cyber Attacks Timeline
    • 2011 Cyber Attacks Timeline Master Index
    • 2012 Cyber Attacks Timeline Master Index
    • 2013 Cyber Attacks Timeline Master Index
    • 2014 Cyber Attacks Timeline Master Index
    • 2015 Cyber Attacks Timelines Master Index
    • 2017 Master Table
    • 2018 Master Table
  • Cyber Attacks Statistics
HACKMAGEDDON

Information Security Timelines and Statistics

A 0-Day Attack Lasts On Average 10 Months

  • Post author:Paolo Passeri
  • Post published:October 19, 2012
  • Post category:Security
  • Post comments:0 Comments
  • Reading time:2 mins read

(But in some cases may remain unknown for up to 2.5 years). A couple of days ago, two Symantec Researchers have published an interesting article ("Before We Knew It: An…

Continue Reading A 0-Day Attack Lasts On Average 10 Months

Oops, They Did it Again! New Vulnerability Discovered in Just-Patched Java

  • Post author:Paolo Passeri
  • Post published:September 1, 2012
  • Post category:Security
  • Post comments:7 Comments
  • Reading time:2 mins read

Did you update your Java Plug-in with the Update 7 after the critical vulnerability discovered last week? You'd better wait! Adam Gowdiak, CEO of Security Exploration, the Polish startup that…

Continue Reading Oops, They Did it Again! New Vulnerability Discovered in Just-Patched Java

The Alphabet of Cyber Crime from APT to Zeus

  • Post author:Paolo Passeri
  • Post published:February 24, 2012
  • Post category:Security
  • Post comments:0 Comments
  • Reading time:7 mins read

If you need to know what Cyber Crime is but you are bored and fed up with the too many information security terms, loosing yourself among the acronyms, you have stumbled upon the correct place. I have just compiled a very special alphabet which collects the terms related to Cybercrime. Forgive me for some “poetic license” and enjoy this half-serious list.

A like APT

Yes, the Advanced Persistent Threats have been the undisputed  protagonists of 2011. An APT is essentially an attack carried on with different vectors, different stages and on a distributed time windows (yes, it Persistent). APT are behind the most remarkable events of 2011 such as the RSA Breach, Stuxnet, and so on…

B like Botnet

Botnet are networks of compromised machines that are used by cybercriminals to perpetrate their malicious action. Tipically a compromised machine becomes part of a botnet where the master distributes the commands from a C&C Server. Command may include the theft of information or the attack to other machines.

C like Crime-As-A-Service

The last frontier of Cybercrime: why developing costly malware if you can find a wide offer of customizable malware on the black market offering help desk and support services?

D like DLP

Data Leackage (or Lost) prevention is a suite of technologies that may help organization to counter the theft of information by preventing misuse or leak of data while they are in use at the endpoint (DIU), in transit on the network (DIM), or simply it is an aggregated Dark Matter on the corporate servers (DAR) that needs to be indexed and cataloged (and possibly classified and assessed).

(more…)

Continue Reading The Alphabet of Cyber Crime from APT to Zeus
Copyright - OceanWP Theme by Nick
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.Ok