Friday, January 17, 2025

2FA ve Hesap Erişimi: En İyi Uygulamalar ve Yöntemler

 Kaybolan Cihazlarda 2FA ve Hesap Erişimi: En İyi Uygulamalar ve Yöntemler

Günümüzde çevrimiçi güvenlik için İki Faktörlü Kimlik Doğrulama (2FA) vazgeçilmez bir özellik haline gelmiştir. Ancak, 2FA ile korunan bir hesabınıza erişim sağlayan cihazların kaybolması durumunda, bilgilere erişim ve hesap kurtarma zorlaşabilir.  Örnekler incelemekte fayda var.

En İyi 2FA Uygulamaları

1. Authy

  • Avantajlar:

    • Bulut yedeklemesi ile cihaz kaybı durumunda yeni bir cihazdan kolayca kurtarma yapılabilir.

    • Birden fazla cihazla senkronizasyon sağlar (telefon, tablet, bilgisayar).

    • Yedek kod desteği bulunur ve kullanımı kolaydır.

  • Kimler için uygun:

    • Sık cihaz değiştiren veya birden fazla cihaz kullanan kullanıcılar.

2. Google Authenticator

  • Avantajlar:

    • Hızlı, basit ve ücretsizdir.

  • Dezavantajlar:

    • Bulut yedeklemesi yoktur; QR kodunu veya kurtarma anahtarını kaydetmediyseniz kurtarma mümkün değildir.

  • Kimler için uygun:

    • Cihaz kaybı riskinin düşük olduğu durumlar için ideal.

3. Microsoft Authenticator

  • Avantajlar:

    • Microsoft hesabı ile senkronizasyon sağlayan bulut yedekleme.

    • Parmak izi ve PIN koruması gibi gelişmiş güvenlik özellikleri.

  • Kimler için uygun:

    • Microsoft ürünlerini yoğun kullananlar.

4. Duo Mobile

  • Avantajlar:

    • Yedekleme desteği ve kullanış kolaylığı sunar.

    • Kurumsal çözümlerle uyumludur.

  • Kimler için uygun:

    • Kurumsal kullanımlar veya birden fazla hesaba erişim gereken durumlar.

5. 1Password + 2FA Entegrasyonu

  • Avantajlar:

    • Tüm hesap bilgileri ve yedek kodlar tek bir yerde şifreli olarak saklanabilir.

    • Güçlü yedekleme ve güvenlik entegrasyonu.

  • Kimler için uygun:

    • Tüm verilerini organize bir şekilde saklamak isteyen kullanıcılar.

Hesaplara Erişim ve Koruma Yöntemleri

1. Yedek Kodları Saklama

Birçok platform, 2FA kurulumunda yedek kodlar (backup codes) sunar. Bu kodları şu yöntemlerle saklayabilirsiniz:

  • Şifreli Notlar: Bitwarden, 1Password gibi şifreleme uygulamaları kullanın.

  • Fiziksel Depolama: Kodları bir kağıda yazıp güvenli bir yerde saklayın.

2. Birden Fazla Cihazda Yedekleme

  • Authy gibi uygulamaları birden fazla cihazda kullanarak alternatif erişim sağlayabilirsiniz.

  • Yeni bir cihazı yedek olarak eklemek, kurtarma sürecini hızlandırır.

3. E-posta ve Telefon Kurtarma Seçenekleri

  • Tüm hesaplarınızda alternatif kurtarma e-posta ve telefon numarası tanımlı olduğundan emin olun.

  • E-posta kurtarma özelliği olan platformlarda, tanımlı e-postaya kod göndererek hesabı kurtarabilirsiniz.

4. Cihaz Bağımsız Çözümler Kullanma

  • Bulut yedekleme destekleyen Authy gibi uygulamalar, cihaz kaybı riskini minimize eder.

  • YubiKey gibi fiziksel güvenlik anahtarları ek bir koruma sağlar.

Uzun Vadeli Güvenlik Önerileri

1. Yedek Kodları Saklama

  • Kodları hem dijital hem de fiziksel ortamda güvenli bir yerde tutun.

2. Şifre Yöneticisi Kullanmaya Başlama

  • 1Password veya LastPass gibi şifre yöneticileri, 2FA yedek kodlarını organize bir şekilde saklar ve çalınmaya karşı şifreler.

3. Alternatif Cihazlar Ekleyin

  • 2FA uygulamalarını ikinci bir cihazda (tablet, yedek telefon) kurun.

4. Bulut Tabanlı Uygulamaları Tercih Edin

  • Authy veya Microsoft Authenticator gibi yedekleme destekleyen uygulamalar kullanın.


Kayıp durumunda 2FA ve hesap bilgilerine erişim, yukarıdaki yöntemler doğrultusunda hızlı ve güvenli bir şekilde sağlanabilir. Makalenin temel amacı, kaybolan cihazlara bağlı kalmadan alternatif yöntemlerle bilgilerinize erişim sağlama yollarını sunmaktı. Bilgilerinizin güvenliğini korumak için bu uygulama ve önerileri hayatınızın bir parçası haline getir....


Friday, June 08, 2018

Digital Soldiers are everywhere



Zaman ordularin ve savaslarin herseyin dijitallestigi ortamda sanallasmamasi imkansizdi ama artik is heryeri sardi.
Facebook un bu patenti kisaca fikir verecektir.


https://www.imdb.com/title/tt2085059/ Black mirror bu anlamda en sevdigim dizilerden biri...

https://canyoupwn.me/tr-gizlilik-rehberi-1/ Berk Imran in yazisida bircok fikir verecektir.




Saturday, June 02, 2018

the deep/dark web and access links




What is Deep/Dark Web?


Deep Web is defined as parts of the World Wide Web whose contents are not indexed by standard search engines for any reason.

Because the HTTP servers of the Deep Web and/or Dark Web tells the Search Engines (including Google (company)) to buzz off with a suitable robots.txtfile (see also robots.txt) and/or by recognizing their Web Crawlers and denying them access (must be fun to maintain that Blacklist). Think of it as a version of Search Engine Optimization with a different optimization than one usually expects.

Google quite reasonably respects the crawling permission limits found in websites' robots.txt files, per the relevant Web Standards.

The deep web is the unidex part of the web
And the Dark Web is just the small part this deep web.

In 2001 the term deep web was introduced by the computer scientist named Micheal Bergman.

He uses this term to explain the hidden part of the web which is hidden behind the Html forms and paywall.

The term, “Deep Web,” was coined in 2001 by BrightPlanet, an Internet search technology company that specializes in searching deep Web content.

Military origins of Deep Web – Like other areas of the Internet, the Deep Web began to grow with help from the U.S. military, which sought a way to communicate with intelligence assets and Americans stationed abroad without being detected. Paul Syverson, David Goldschlag and Michael Reed, mathematicians at the Naval Research Laboratory, began working on the concept of “onion routing” in 1995. Their research soon developed into The Onion Router project, better known as Tor, in 1997.

The U.S. Navy released the Tor code to the public in 2004, and in 2006 a group of developers formed the Tor Project and released the service currently in use. The content of the deep web can be assessed only with the help of the direct URL or ip address.

The websites of Dark web belongs to the .onion domain extension. As you are familiar with the .com, .net. .in. The dark web content use .onion sites.

On these places, you can access vendors and virtual markets that allow an individual to barter goods for goods, stolen or legit, or the sale and procure of drugs, weapons, and other illegal possessions.

https://danielmiessler.com/study/internet-deep-dark-web/


In the year 2000, Michale Bergman said how searching on the internet can be compared to dragging a net across the surface of the ocean: a great deal may be caught in the net, but there is a wealth of information that is deep and therefore missed. Most of the web's information is buried far down on sites, and standard search engines do not find it. Traditional search engines cannot see or retrieve content in the deep web. The portion of the web that is indexed by standard search engines is known as the surface web. As of 2001, the deep web was several orders of magnitude larger than the surface web. An analogy of an iceberg has been used to represent the division between surface web and deep web respectively.
Non-indexed content
Bergman, in a seminal paper on the deep Web published in The Journal of Electronic Publishing, mentioned that Jill Ellsworth used the term invisible Webin 1994 to refer to websites that were not registered with any search engine. Bergman cited a January 1996 article by Frank Garcia:

It would be a site that's possibly reasonably designed, but they didn't bother to register it with any of the search engines. So, no one can find them! You're hidden. I call that the invisible Web.
Another early use of the term Invisible Web was by Bruce Mount and Matthew B. Koll of Personal Library Software, in a description of the @1 deep Web tool found in a December 1996 press release.
The first use of the specific term Deep Web, now generally accepted, occurred in the aforementioned 2001 Bergman study.
Content types
Methods which prevent web pages from being indexed by traditional search engines may be categorized as one or more of the following:

Dynamic content: dynamic pages which are returned in response to a submitted query or accessed only through a form, especially if open-domain input elements (such as text fields) are used; such fields are hard to navigate without domain knowledge.
Unlinked content: pages which are not linked to by other pages, which may prevent web crawling programs from accessing the content. This content is referred to as pages without backlinks (also known as in links). Also, search engines do not always detect all backlinks from searched web pages.
Private Web: sites that require registration and login (password-protected resources).
Contextual Web: pages with content varying for different access contexts (e.g., ranges of client IP addresses or previous navigation sequence).
Limited access content: sites that limit access to their pages in a technical way (e.g., using the Robots Exclusion Standard or CAPTCHAs, or no-store directive which prohibit search engines from browsing them and creating cached copies).

Scripted content: pages that are only accessible through links produced by JavaScript as well as content dynamically downloaded from Web servers via Flash or Ajax solutions.
Non-HTML/text content: textual content encoded in multimedia (image or video) files or specific file formats not handled by search engines.
Software: certain content is intentionally hidden from the regular internet, accessible only with special software, such as Tor, I2P, or other darknet software. For example, Tor allows users to access websites using the .onion host suffix anonymously, hiding their IP address.
Web archives: Web archival services such as the Wayback Machine enable users to see archived versions of web pages across time, including websites which have become inaccessible, and are not indexed by search engines such as Google.



TOR(The Onion Router)
What Is Onion Sites?
Example of dark webs are: TOR, I2P, FreeNet



Example of Deep web link
http://am4wuhz3zifexz5u.onion
zqktlwi4fecvo6ri.onion

https://en.wikipedia.org/wiki/List_of_Internet_top-level_domains#Special-Use_Domains

One can open some deep web links only by appending ".to" after the original website address in regular browser.

For e.g. - http://kpvz7ki2v5agwt35.onion/wiki/index.php/Main_Page
becomes http://kpvz7ki2v5agwt35.onion.to/wiki/index.php/Main_Page


Youtube: https://youtu.be/7G1LjQSYM5Q

The dark web Marketplace Generate 500,000,000 $ per day … 
Expectations say that the deep Web consists of about 7,500 terabytes...



Safety precautions:
  1. Don't trust anyone out there in the deep web.
  2. COVER your webcam using tape.
  3. Never download any files or software from deep web.
  4. If you want some extra protection (or maybe) , type "about:config" in the address bar, scroll down to "Javascript_enabled" and change the value from "true" to "false"
  5. Don't use Utorrent or any other torrenting services while surfing on the deep web.
and
  1. Install VMware workstation in your PC/Laptop.
  2. Download Kali linux [Supported version for your system configurations].
  3. Install Kali linux as your host OS.
  4. Once you done with installation, Logon to you Kali OS and create a new user.
  5. Logon to new user account and download Tor browser for Kali linux. after downloading install the browser and connect to Internet.
  6. Once Tor broswer is opened, then on the homepage you will a tor search option.
  7. Search for "The hidden wiki"[Collection onion website,etc.,].
  8. You will get some crazy link, you will wonder after seeing the link.
  9. Once if you access the link. You will get some awesome website links there.
  10. Start browsing and Have fun[Facebook in recent years started their dark web version, you will also have Blackbook as an alternative, you will have some mail providing website. etc.,]

Summary
The Internet is where it’s easy to find things online because what you’re searching for is all in search engines.
The Deep Web is the part of the Internet that isn’t necessarily malicious, but is simply too large and/or obscure to be indexed due to the limitations of crawling and indexing software (like Google/Bing/Baidu).
The Dark Web is the part of the non-indexed part of the Internet (the Deep Web) that is used by those who are purposely trying to control access because they have a strong desire for privacy, or because what they’re doing is illegal.



References:







Saturday, March 18, 2017

Cyber Security is new a virtual WORLD


Cyber War means 3rd World War


Some Security Links for news and predictions ...


https://jigsaw.google.com/

https://www.reddit.com/r/technology/comments/5y0akr/vault_7_cia_hacking_tools_revealed/


http://www.digitalattackmap.com/#anim=1&color=0&country=ALL&list=0&time=17241&view=map

http://www.darkreading.com/perimeter/ethical-hacking-the-most-important-job-no-one-talks-about/a/d-id/1328400?

https://www.ibm.com/analytics/us/en/safer-planet/cyber-threat-analysis/

https://wikileaks.org/ciav7p1/files/org-chart.png


https://wikileaks.org/ciav7p1/#REDACT

https://threatpost.com/

http://thehackernews.com/

https://hacked.com/

https://themerkle.com/


http://cybersecurityventures.com/news/

https://nakedsecurity.sophos.com/

https://www.trendmicro.com/vinfo/us/security/news/cyber-attacks/a-rundown-of-the-biggest-cybersecurity-incidents-of-2016

http://www.networksasia.net/security

http://cybersecurityventures.com/


https://securityintelligence.com/category/industries/

http://www.govtech.com/blogs/lohrmann-on-cybersecurity/the-top-17-security-predictions-for-2017.html

http://resources.infosecinstitute.com/2017-cyber-security-predictions/

https://www2.fireeye.com/WBNR-2017-Cyber-Security-Predictions.html

https://www.anomali.com/blog/2017-cyber-security-predictions


http://blog.morphisec.com/cybersecurity-predictions-for-2017

https://www.beyondtrust.com/blog/ten-cyber-security-predictions-2017/

https://content.strozfriedberg.com/2017-stroz-friedberg-cybersecurity-predictions-report

https://www.finextra.com/blogposting/13808/seven-cyber-security-predictions-for-2017


https://www.securityworldhotel.com/int/News/Business-News/top-10-cyber-security-predictions-for-2017#.WM0oJxKGO-s

http://www.bankinfosecurity.com/interviews/2017-cybersecurity-predictions-aftermath-trump-election-i-3422


https://www.invincea.com/2017/01/top-10-rock-roll-cybersecurity-predictions-for-2017/

https://ww2.frost.com/files/4914/8891/2278/Cyber_Security_Predictions_for_2017.pdf

https://www.boozallen.com/content/dam/boozallen/documents/2016/12/foresights-cyber4sights-threat-intelligence-analysis-2017.pdf


http://www.metricstream.com/insights/cyber-security-predictions-2017.htm

https://www.billingtoncybersecurity.com/global-cybersecurity-confidence-falls-70-percent-c-overall-grade-2017/

https://www.thecyberwire.com/issues/issues2016/August/CyberWire_2016_08_25.html

Friday, August 14, 2009

how to protect your computer from trojan or virus for a long time

I always install my notebooks with minimum 3 solution from these list

  1. install internet security suite ( Avast, Eset nod32, if you are a home user)
  2. install Malwarebytes Anti-Malware
  3. install Spybot
  4. install Stopzilla
  5. install Ccleaner
  6. install Superantispyware
  7. install ThreatFire
  8. install Advanced SystemCare
  9. use these browsers, please...Mozilla Firefox or the Google Chrome, Opera, MetaMask
and the last important one...always update them.....

pls suggest yours...

https://canyoupwn.me/tr-gizlilik-rehberi-1/ OZet bilgi icerir.

Sunday, February 17, 2008

Yerli Malware

Gecen hafta Halil Öztürkci nin verdiği CHFI eğitimi vardi.

türkiyede bu işe yeni saran o kadar cok kişi var ki,
örneğin temizsurucu.com eğitim aldığım gun bulasan malware....

Friday, February 01, 2008

Software Security Product

www.pro-g.com.tr şirketinin Türkiye temsilcisi olduğu http://www.fortifysoftware.com ürün adı ile fortify'i şiddetle incelemenizi öneririm.

http://www.fortifysoftware.com/products/sca/features.jsp özellikleri inanılmaz, her yazılım şirketi alan veya satan , uygulama geliştirenlere lazım...

Thursday, February 01, 2007

Security Statistics

Security statistics

$1.7 trillion of assets stored with online brokerages
$12 bln worth of security software to sell in 2010
$4 bln spent globally on antivirus in 2005
1 mln zombie PCs on the Internet
1 out of every 600 social network profile pages hosts some malware
11% of Americans received a notice that their private data had been compromised
1142 phishing Web sites in October 2004
120 mln credit cards compromised in 2004
13% of companies monitor employee IM activity
15 mln fingerprint readers to ship in 2006
175% more bots in 2005
18 mln phishing attempts recorded, viruses on decline
20% of Dell support calls are spyware-related
22 atacks on P2P networks in October 2005
22% of mobile device owners have lost a device in 2005
23% of corporate networks rely on users applying security patches themselves
27% of movie industry professionals claim to have lost revenues to piracy
28% of women would read boyfriend's/husband's e-mails
3.4% had their personal data compromised
30% of Japanese companies monitor employee PC usage
30% of users are not concerned with security threats
30.67% of companies had virus infections, 90% ran antivirus software
30000 Internet-connected zombie networks in 2004
31% of all infections belonged to Sasser virus
32% of malicious Web sites install trojans and unwanted toolbars
32% of phishing sites are hosted in the US
34% of companies do not forbid personal apps on corporate PCs
36% of Asia-Pacific businesses have disaster recovery measures
39% of companies who use remote access, use SSL VPN
39% of corporate employees believe IT departments can prevent spyware and phishing
4% of Brits quit online banking because of security concerns
4% of IT budgets will be spent on security
4% of IT managers do not use anti-virus
40% of US consumers confident medical organizations can provide adequate security for healthcare records
41 mln US households have had an Internet security problem
44% of consumers do not want to share personal info
44% of IT decision makers name consumer data theft their top priority
44% of online banking users choose the same password for multiple accounts
44% of online banking users choose the same password for multiple accounts
46% are better prepared to access critical data during disaster
49% of companies have no policy regarding instant messaging and peer-to-peer
50% of corporate networks have been compromised
50% of organizations to deploy email security at gateway
50% of the companies have had a data loss in the past 12 months
51% of online Americans aware of the link between the browser and PC security
51% of security officers secure their networks at the edge only
55% of online users have been infected with spyware
56% of small businesses have had a security incident within the past 12 months
58% of IT executives measure security through manual reporting
6,191 keylogging applications published in 2005
6,200 keyloggers out there
62% of PC users run antispyware, only 44% have updated antivirus
62% of PCs scanned by Microsoft had at least one trojan
63% of companies need at least one day to implement a new patch
63% of consumers would pay for biometrics if it provided additional security
64% of IT professionals have end-point security solutions in place
65% of businesses to spend money on anti-spyware
68% of Brits think national ID would relieve identity theft problem
70% of network pros satisfied by network security
70% of online buyers don't think the merchants are protecting identity information
70% of security dealer revenues currently come from security systems
70% of Web users use an anti-spyware tool
71% support tougher laws to make Internet safer
75% of security spending is going into compliance
75% run anti-spyware tools, 80% suffered from spyware attack
77% of US consumers willing to change banks for better protection policy
78% of Linux users have never had their machines hacked
80% of companies will have IP VPNs by year-end 2005
80% of corporate PCs are infected with adware/spyware
80% of Internet users worried about identity theft
80% of network intrusions go unreported
80% of SMBs are using VPN, 80% think SSL-VPN is too expensive
81% of companies have a cyber security plan
81% of Internet users stopped opening unknown attachments
82% of companies deployed IP VPN
83% of UK companies have been violated online
84% people had their PCs infected with spyware in 2004
86% of insider attacks against the companies come from employees in technical positions
88% of federal government employees received computer security training
88% of PCs have spyware, CoolWebSearch most prevalent
9 bln CDs, DVDs and VHS tapes have Macrovision protection
90% of parents believe they are responsible for ensuring online safety for their children
90% of UK users try to protect themselves from online threats
90% of Web apps are vulnerable
92% of end-user software companies had security issues
92% of online Americans feel confident about handling credit card fraud
93% of corporate users will install a non-sanctioned app within the next 6 months
94% of US adults think Internet is dangerous for children
Adware is a $3 bln industry
Almost 75% of worms in the first half of 2005 exposed confidential information
Antivirus market up 39.7% in 2004
Asia-Pacific Internet security market to generate $2.4 bln in 2008
Asian Internet security solutions market to generate $4.9 bln in 2008
Average PC is home to 28 spyware programs
Between January and June 2005 63% more machines got infected with spyware
Biometric products market to grow 40x by 2010
Business cyberattacks
Chinese IT security market up 31.2% in 2004
Chinese piracy cost US companies $2.4 bln in 2005
Compliance infrastructure to generate $21 bln by 2010
Consumers would shop more at online retailer with better security
Cyberattack damages average $290,000
Demand for IT security professionals to grow at 13.7% a year
Design-to-manufacturing currently generates $350-400 mln
Digital rights management revenues to grow by 28% in 2005
DRM market to generate $274 mln by 2008
E-mail security boundary market generated $660 mln in 2005
Electronic document discovery market generated $1.3 bln in 2004
EMEA security software market to generate $4.2 bln by 2010
Enterprises will spend 12% of IT budgets on security
European IP VPN market to generate 8.56 bln euros in 2008
European managed IP VPN market generated $4.3 bln in 2004
European security appliance market generated $183 mln in Q4 2004
European security appliance market up 54% in Q3 2004
European security market generated $2.5 bln in 2003
Executives worry about security (26%) and costs (23%)
Firewall and VPN market to reach $6 bln in 2007
Firewall market to grow 25% by 2005
Firewall/VPN security appliance market up 27% in 2003
For 52% of the networks the perimeter is the only defense
For 75% of businesses the number of online transactions grew in 2005
Gartner: Security transactions far from paperless
German medium businesses sent $390 mln on anti-virus and anti-spam in 2004
Global IT security services spending to reach $24.6 bln by 2009
Global security appliance and software revenues up 30% in 2004
Global VPN and firewall market up 13% in 2003
Global VPN services revenues to reach $29.8 bln by 2009
Gulf state security software spending to rise 27% in 2004
IDC: IT security spending up in Asia
IDC: Spending on security to grow fast
IM attacks up 25% in April 2006
In 2004 an average of 2,500 Web servers were hacked daily
In 2008 spyware removal will be $305 mln industry
In 23% of companies the employees intentionally downloaded spyware and viruses
Information breaches cost US companies $182 per record
Instant messaging attacks up 400% in Q2 2005
Instant messaging security threats doubling every 6 months
Instant messaging viruses and worms up 271% in Q1 2005
Instant messaging viruses grow at 50% a month
Integrated security appliances to generate $3.3 bln by 2009
Internet security vulnerabilities up 11% in Q2 2005
Intrusion detection systems and intrusion prevention systems will generate $1.4 bln by 2008
IP VPN equipment to generate $658 mln in 2009
IP VPN market to flatten by 2007, but grew 107% in Western Europe
IP VPN services revenues reached $2.9 bln in 2004
IP VPN spending to reach $6.1 bln by 2009
IP VPN to grow in Australia
Malware cost estimated at $169-204 bln for 2004
Malware damage for February estimated at $50 bln
Messaging security appliances to generate $400 mln in Western Europe by 2009
mi2g estimated spyware and virus damage at $290 per PC
More than 50% of companies do not have a written security policy
Most popular adware apps: Claria, CoolWWW
Most popular IT services among small businesses
Most prevalent spyware in May 2006: DesktopScam, SpyFalcon, 180SearchAssistant
Most zombies are AOLers
Network security appliance and software market generated $3.7 bln in 2004
Network security appliance market up 4% in Q2 2005
Network security appliances sales surge
Nordic IT security market generated 610 mln euros in 2004
Number of shredding companies doubled within 3 years
On average company lost $526,000 after a security breach in 2005
Only 14% of business users use a different password for each site
Only 20% of companies view information security as CEO-level priority
Only 26% of companies have IT continuity plans
Only 37% of IT professionals think their company can detect data breaches
Only 38% of organizations run scans to detect rogue WLANs
Only 4% of government wiretaps are electronic and PC-based
Only 7% of businesses encrypt their backups
Outbound content compliance will generate $1.9 bln by 2009
Personal firewall software market to grow 21.7% annually
Sales of IP VPN equipment reached $267 mln in 2003
Secure content management to reach $7.5 bln in 2008
Security appliance market grows 57% in Q2 2004
Security appliances to generate over $1.4 bln in Western Europe by 2009
Security breaches cost UK businesses $18 bln a year
Security information software market up 32.2% in 2005
Security remains top concern for wireless deployments
Security software in Asia-Pacific generated $805 mln in 2005
Security software in Asia-Pacific market to generate $1.7 bln in 2010
Security software market generated $7.4 bln in 2005
Security software sales to reach $9.6 bln in 2004
Security software spending to reach $808 mln in 2008
Security software to generate $111 mln in Gulf states in 2006
Security specialists in high demand
Security spending in UK and Ireland to more than double
Security spending in Western Europe to grow at 15.2% a year
Security spending was $42 bln in 2003, just below printers
Small businesses: 73% in Spain, 51% in Germany and 39% in UK update virus definitions once a week
Software developers rank Linux security higher than Windows
Spyware to reach 25% of business PCs
SSL VPN revenues to grow 33% in 2006
Third-party cookie blocking up 4x in 2005
Top privacy policies: Intel, Expedia, e-Loan
Top reason for identity theft: stolen wallet
Top spyware applications
UK businesses spent $17,000 on their worst security incident in 2004
Ukrainian businesses lost 95 mln euros to viruses in 2004
US consumers make 285 mln visits to hostile sites monthly
US mobile security market will reach $415.9 bln in 2006
US movie piracy costs $1.3 bln
Viruses and outside hacking top the IT security priority list
Vulnerability-related downtime to triple by 2008
Web cams with embedded servers to account for 20% of European surveillance market
Western European IT security spending to reach $7.5 bln in 2009
Western European security appliance market up 27% in Q2 2005
Western European security software to reach $6 bln by 2009
Wireless security to becom a $4.4 bln industry by 2010
Wireless security to bring in $8.4 bln by 2008
Wiretapping up 19% in 2004
Worldwide network security appliance market up 1% in Q3 2005
Worldwide network security market up 5% in Q1 2005
Worldwide security appliance revenues up 16.6% in Q2 2005
Worldwide security software support to reach $2.13 bln in 2010
Worms responsible for only 12% of attacks in the second half of 2004
Zombie rankings for second half 2004: UK - 25.2%, USA - 24.6%, China - 7.8%

Source; http://www.itfacts.biz/index.php?id=P722

2FA ve Hesap Erişimi: En İyi Uygulamalar ve Yöntemler

  Kaybolan Cihazlarda 2FA ve Hesap Erişimi: En İyi Uygulamalar ve Yöntemler Günümüzde çevrimiçi güvenlik için İki Faktörlü Kimlik Doğrulama ...