Soumettre la recherche
Mettre en ligne
Noile Campuri De Lupta Ale Amenintarilor Informatice
•
Télécharger en tant que PPT, PDF
•
0 j'aime
•
292 vues
Bitdefender
Suivre
Technologie
Actualités & Politique
Signaler
Partager
Signaler
Partager
1 sur 12
Télécharger maintenant
Recommandé
Cyberthreats 2009
Cyberthreats 2009
Bitdefender
Invata cum sa-ti protejezei organizatia neguvernamentala in mediul online. Urmareste prezentarea sustinuta de Loredana Botezatu, Specialist Securitate IT in cadrul Bitdefender, in timpul webinarului ”Securitate in mediul online pentru ONG-uri”, organizat de TechSoup Romania.
Securitatea in mediul online pentru ONG-uri
Securitatea in mediul online pentru ONG-uri
Asociatia Techsoup Romania
Prezentarea susţinută de Cătălin Coşoi, Senior Researcher BitDefender România în cadrul evenimentului Ai-Mas Winter Olympics 2010
Catalin Cosoi la Olimpiada Inteligentei Artificiale
Catalin Cosoi la Olimpiada Inteligentei Artificiale
BitDefenderRo
Alexandru Catalin Cosoi
Alexandru Catalin Cosoi
princescorpio
Virusi
Virusi
liviupilot
E-Threat Landscape Report H1 2012
E-Threat Landscape Report H1 2012
Bitdefender
The first six months of 2011 have been placed under the sign of vulnerabilities and data breaches. While the malware landscape has witnessed little to no significant changes or epidemics, the numbers of data breaches and outages have increased considerably during the monitored period. IT security companies have been the primary targets of cybercriminals in an attempt to take them offline and, at the same time, to diminish their expertise in the eyes of their customers. Two of the most important IT security vendors that have been slammed with such attacks are HBGary and RSA, the security division of EMC. Another major data leak followed by almost one month of outage was the Sony PlayStation Network incident, which exposed credit card details of about two million PSN users. The data leak was disclosed with a significant delay. The damage inflicted to users is yet to be estimated. Significant outages have also happened in Egypt, following the massive wave of protests that took place on January 28. In order to prevent demonstrations and protests, the Egyptian government had all the local ISPs pull the plug on the Internet, thus rendering the bulk of electronic communications useless. The Internet blackout in Egypt has brought up endless debates on the importance of digital communications and the catastrophic results of outages. Social networks have played a key role in maintaining a climate of insecurity. Although the number of e-threats especially designed to infect social network users (such as the infamous Koobface and Boonana worms) has dramatically decreased, cyber-criminals have focused their efforts on pushing an unprecedented number of rogue applications. The purpose of these virally/spreading applications is two-fold: on the one side, they redirect the users to websites where they are forced to fill in surveys; on the other side, these applications collect exhaustive information about their victims and their friends, which are later used in targeted spam and phishing campaigns.
H1 2011 E-Threat Landscape Report
H1 2011 E-Threat Landscape Report
Bitdefender
Suita 2010 de solutii BitDefender
Suita 2010 de solutii BitDefender
Bitdefender
Recommandé
Cyberthreats 2009
Cyberthreats 2009
Bitdefender
Invata cum sa-ti protejezei organizatia neguvernamentala in mediul online. Urmareste prezentarea sustinuta de Loredana Botezatu, Specialist Securitate IT in cadrul Bitdefender, in timpul webinarului ”Securitate in mediul online pentru ONG-uri”, organizat de TechSoup Romania.
Securitatea in mediul online pentru ONG-uri
Securitatea in mediul online pentru ONG-uri
Asociatia Techsoup Romania
Prezentarea susţinută de Cătălin Coşoi, Senior Researcher BitDefender România în cadrul evenimentului Ai-Mas Winter Olympics 2010
Catalin Cosoi la Olimpiada Inteligentei Artificiale
Catalin Cosoi la Olimpiada Inteligentei Artificiale
BitDefenderRo
Alexandru Catalin Cosoi
Alexandru Catalin Cosoi
princescorpio
Virusi
Virusi
liviupilot
E-Threat Landscape Report H1 2012
E-Threat Landscape Report H1 2012
Bitdefender
The first six months of 2011 have been placed under the sign of vulnerabilities and data breaches. While the malware landscape has witnessed little to no significant changes or epidemics, the numbers of data breaches and outages have increased considerably during the monitored period. IT security companies have been the primary targets of cybercriminals in an attempt to take them offline and, at the same time, to diminish their expertise in the eyes of their customers. Two of the most important IT security vendors that have been slammed with such attacks are HBGary and RSA, the security division of EMC. Another major data leak followed by almost one month of outage was the Sony PlayStation Network incident, which exposed credit card details of about two million PSN users. The data leak was disclosed with a significant delay. The damage inflicted to users is yet to be estimated. Significant outages have also happened in Egypt, following the massive wave of protests that took place on January 28. In order to prevent demonstrations and protests, the Egyptian government had all the local ISPs pull the plug on the Internet, thus rendering the bulk of electronic communications useless. The Internet blackout in Egypt has brought up endless debates on the importance of digital communications and the catastrophic results of outages. Social networks have played a key role in maintaining a climate of insecurity. Although the number of e-threats especially designed to infect social network users (such as the infamous Koobface and Boonana worms) has dramatically decreased, cyber-criminals have focused their efforts on pushing an unprecedented number of rogue applications. The purpose of these virally/spreading applications is two-fold: on the one side, they redirect the users to websites where they are forced to fill in surveys; on the other side, these applications collect exhaustive information about their victims and their friends, which are later used in targeted spam and phishing campaigns.
H1 2011 E-Threat Landscape Report
H1 2011 E-Threat Landscape Report
Bitdefender
Suita 2010 de solutii BitDefender
Suita 2010 de solutii BitDefender
Bitdefender
H1 2009 Malware And Spam Review1
H1 2009 Malware And Spam Review1
Bitdefender
Conferinta Securitate Web 2.0
Conferinta Securitate Web 2.0
Bitdefender
Atacurile de phishing in Romania si in strainatate
Atacurile de phishing in Romania si in strainatate
Bitdefender
Gama De Produse BitDefender 2009
Gama De Produse BitDefender 2009
Bitdefender
Spam Clustering
Spam Clustering
Bitdefender
Do Humans Beat Computers At Pattern Recognition
Do Humans Beat Computers At Pattern Recognition
Bitdefender
Phishing101
Phishing101
Bitdefender
Contenu connexe
Plus de Bitdefender
H1 2009 Malware And Spam Review1
H1 2009 Malware And Spam Review1
Bitdefender
Conferinta Securitate Web 2.0
Conferinta Securitate Web 2.0
Bitdefender
Atacurile de phishing in Romania si in strainatate
Atacurile de phishing in Romania si in strainatate
Bitdefender
Gama De Produse BitDefender 2009
Gama De Produse BitDefender 2009
Bitdefender
Spam Clustering
Spam Clustering
Bitdefender
Do Humans Beat Computers At Pattern Recognition
Do Humans Beat Computers At Pattern Recognition
Bitdefender
Phishing101
Phishing101
Bitdefender
Plus de Bitdefender
(7)
H1 2009 Malware And Spam Review1
H1 2009 Malware And Spam Review1
Conferinta Securitate Web 2.0
Conferinta Securitate Web 2.0
Atacurile de phishing in Romania si in strainatate
Atacurile de phishing in Romania si in strainatate
Gama De Produse BitDefender 2009
Gama De Produse BitDefender 2009
Spam Clustering
Spam Clustering
Do Humans Beat Computers At Pattern Recognition
Do Humans Beat Computers At Pattern Recognition
Phishing101
Phishing101
Noile Campuri De Lupta Ale Amenintarilor Informatice
1.
Noile campuri de
lupta ale amenintarilor informatice George Petre Threat Intelligence Team Leader
2.
3.
Marketing vs Spam
4.
Business 2.0
5.
Ce se poate
fura in Web 2.0 Identitatea Reputatia Date confidentiale Resurse financiare
6.
7.
Phishing vs Comert
Electronic
8.
Utilizatorul social
9.
10.
11.
12.
Télécharger maintenant