ºÝºÝߣshows by User: stefant / http://www.slideshare.net/images/logo.gif ºÝºÝߣshows by User: stefant / Thu, 10 Jun 2010 07:13:02 GMT ºÝºÝߣShare feed for ºÝºÝߣshows by User: stefant Surviving Today's Targeted Attacks /slideshow/surviving-todays-targeted-attacks/4462645 stefantanasekasperskylabinternationalpresstourcyprusjune2010-ad-100610071306-phpapp01
]]>

]]>
Thu, 10 Jun 2010 07:13:02 GMT /slideshow/surviving-todays-targeted-attacks/4462645 stefant@slideshare.net(stefant) Surviving Today's Targeted Attacks stefant <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/stefantanasekasperskylabinternationalpresstourcyprusjune2010-ad-100610071306-phpapp01-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br>
Surviving Today's Targeted Attacks from Stefan Tanase
]]>
1720 13 https://cdn.slidesharecdn.com/ss_thumbnails/stefantanasekasperskylabinternationalpresstourcyprusjune2010-ad-100610071306-phpapp01-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Automated Targeted Attacks: The New Age of Cybercrime /slideshow/automated-targeted-attacks-the-new-age-of-cybercrime/3394888 sttargetedattacks-100311025713-phpapp02
]]>

]]>
Thu, 11 Mar 2010 02:57:06 GMT /slideshow/automated-targeted-attacks-the-new-age-of-cybercrime/3394888 stefant@slideshare.net(stefant) Automated Targeted Attacks: The New Age of Cybercrime stefant <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/sttargetedattacks-100311025713-phpapp02-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br>
Automated Targeted Attacks: The New Age of Cybercrime from Stefan Tanase
]]>
1274 6 https://cdn.slidesharecdn.com/ss_thumbnails/sttargetedattacks-100311025713-phpapp02-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
When web 2.0 sneezes, everyone gets sick /slideshow/when-web-20-sneezes-everyone-gets-sick/2064308 vb2009stefantanaseweb2-0-090925030343-phpapp01
Web 2.0 applications have become increasingly popular among Internet users in the past few years. This trend is very unlikely to come to an end soon. More and more 'classic' websites are shifting towards web 2.0 concepts, start-ups are all about web 2.0 and new users are adopting the web 2.0 lifestyle every day. This paper aims to address the following questions: What exactly is web 2.0? What are the concepts and technologies that make web 2.0 what it is? Why does web 2.0 attract malware authors? How did malware spread over the Internet before web 2.0? What are the new attack vectors created by web 2.0 technologies? What social engineering tactics emerge over the web 2.0 concepts? How dangerous is the combination of human & technological vulnerabilities? Are web 2.0 attacks more efficient? How difficult is it to protect ourselves? How are web 2.0 threats going to evolve? Web 2.0 applications are not only being used at home, but also in the corporate environment. The new attack vectors are raising the stakes, both for malware authors and security professionals. The user is somewhere in between the two sides, unwittingly helping the attackers while also suffering from the attacks.]]>

Web 2.0 applications have become increasingly popular among Internet users in the past few years. This trend is very unlikely to come to an end soon. More and more 'classic' websites are shifting towards web 2.0 concepts, start-ups are all about web 2.0 and new users are adopting the web 2.0 lifestyle every day. This paper aims to address the following questions: What exactly is web 2.0? What are the concepts and technologies that make web 2.0 what it is? Why does web 2.0 attract malware authors? How did malware spread over the Internet before web 2.0? What are the new attack vectors created by web 2.0 technologies? What social engineering tactics emerge over the web 2.0 concepts? How dangerous is the combination of human & technological vulnerabilities? Are web 2.0 attacks more efficient? How difficult is it to protect ourselves? How are web 2.0 threats going to evolve? Web 2.0 applications are not only being used at home, but also in the corporate environment. The new attack vectors are raising the stakes, both for malware authors and security professionals. The user is somewhere in between the two sides, unwittingly helping the attackers while also suffering from the attacks.]]>
Fri, 25 Sep 2009 03:03:35 GMT /slideshow/when-web-20-sneezes-everyone-gets-sick/2064308 stefant@slideshare.net(stefant) When web 2.0 sneezes, everyone gets sick stefant Web 2.0 applications have become increasingly popular among Internet users in the past few years. This trend is very unlikely to come to an end soon. More and more 'classic' websites are shifting towards web 2.0 concepts, start-ups are all about web 2.0 and new users are adopting the web 2.0 lifestyle every day. This paper aims to address the following questions: What exactly is web 2.0? What are the concepts and technologies that make web 2.0 what it is? Why does web 2.0 attract malware authors? How did malware spread over the Internet before web 2.0? What are the new attack vectors created by web 2.0 technologies? What social engineering tactics emerge over the web 2.0 concepts? How dangerous is the combination of human & technological vulnerabilities? Are web 2.0 attacks more efficient? How difficult is it to protect ourselves? How are web 2.0 threats going to evolve? Web 2.0 applications are not only being used at home, but also in the corporate environment. The new attack vectors are raising the stakes, both for malware authors and security professionals. The user is somewhere in between the two sides, unwittingly helping the attackers while also suffering from the attacks. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/vb2009stefantanaseweb2-0-090925030343-phpapp01-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Web 2.0 applications have become increasingly popular among Internet users in the past few years. This trend is very unlikely to come to an end soon. More and more &#39;classic&#39; websites are shifting towards web 2.0 concepts, start-ups are all about web 2.0 and new users are adopting the web 2.0 lifestyle every day. This paper aims to address the following questions: What exactly is web 2.0? What are the concepts and technologies that make web 2.0 what it is? Why does web 2.0 attract malware authors? How did malware spread over the Internet before web 2.0? What are the new attack vectors created by web 2.0 technologies? What social engineering tactics emerge over the web 2.0 concepts? How dangerous is the combination of human &amp; technological vulnerabilities? Are web 2.0 attacks more efficient? How difficult is it to protect ourselves? How are web 2.0 threats going to evolve? Web 2.0 applications are not only being used at home, but also in the corporate environment. The new attack vectors are raising the stakes, both for malware authors and security professionals. The user is somewhere in between the two sides, unwittingly helping the attackers while also suffering from the attacks.
When web 2.0 sneezes, everyone gets sick from Stefan Tanase
]]>
808 7 https://cdn.slidesharecdn.com/ss_thumbnails/vb2009stefantanaseweb2-0-090925030343-phpapp01-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Today’s hidden dangers: Social networks under attack /slideshow/todays-hidden-dangers-social-networks-under-attack/2026891 stefantanase-090920131842-phpapp01
A timeline of security incidents on social networks in 2009.]]>

A timeline of security incidents on social networks in 2009.]]>
Sun, 20 Sep 2009 13:18:26 GMT /slideshow/todays-hidden-dangers-social-networks-under-attack/2026891 stefant@slideshare.net(stefant) Today’s hidden dangers: Social networks under attack stefant A timeline of security incidents on social networks in 2009. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/stefantanase-090920131842-phpapp01-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> A timeline of security incidents on social networks in 2009.
Today’s hidden dangers: Social networks under attack from Stefan Tanase
]]>
5670 9 https://cdn.slidesharecdn.com/ss_thumbnails/stefantanase-090920131842-phpapp01-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
https://cdn.slidesharecdn.com/profile-photo-stefant-48x48.jpg?cb=1522856100 Around the clock, around the world. stefant.ro https://cdn.slidesharecdn.com/ss_thumbnails/stefantanasekasperskylabinternationalpresstourcyprusjune2010-ad-100610071306-phpapp01-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/surviving-todays-targeted-attacks/4462645 Surviving Today&#39;s Targ... https://cdn.slidesharecdn.com/ss_thumbnails/sttargetedattacks-100311025713-phpapp02-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/automated-targeted-attacks-the-new-age-of-cybercrime/3394888 Automated Targeted Att... https://cdn.slidesharecdn.com/ss_thumbnails/vb2009stefantanaseweb2-0-090925030343-phpapp01-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/when-web-20-sneezes-everyone-gets-sick/2064308 When web 2.0 sneezes, ...