Portfolio
- Identities • logotype • icons
- HTML email signatures
- Occasions • Cards & invitations
- Posters & Banners
- Adverts • Newspaper, Magazine
- Leaflets • flyers • publicity post
- Packaging
- Brochure • magazine
- MORE Graphic Design
Categories
Contact
- Deirdre ní Dhubhghaill
2D Graphic Design
Bád Aeir
Tincone Lane
Ferrybank
Wexford
County Wexford
Ireland
Phone +353 539 122 355
Skype: twodtypog - info@2dgraphicd.com
- Google+
- Linked In
What do spammers/ hackers get out of it?
For years I’ve asked what do spammers & hackers get out of? The only answer I’ve ever received they practice their programming skills, their innovation. Finally I’ve received an answer I understand. ‘Sorry sweetie’ spammers are making money & here’s how. The short list
.
- They’re selling advertising (viagra & co, software, fake products, medical remedies)
- They’re selling compromised emails
- They’re selling credit card numbers
- They’re selling spamming software
- They’re selling ‘eyes’ cracking captchas (very little money in this one)
The video below is 1 hour & 18 minutes but very interesting.
.
.
“Keynote Address given by Stefan Savage, Director of the Collaborative Center for Internet Epidemiology and Defenses (CCIED) and Associate Professor at the University of California, San Diego.
Talk given at the 2011 USENIX Federated Conferences Week, which took place June 14-17, 2011, in Portland, OR.
Abstract:
Computer security is a field that is fundamentally co-dependent—driven to respond by the actions of adversaries. This dance fuels both the research community and a multi-billion-dollar computer security industry. However, to date most efforts have focused on the technical components of this battle: identifying new vulnerabilities, exploits, and attacks, building and deploying new defenses, and so on.In this talk, I will argue for a complementary research agenda based on understanding the business models that drive today’s Internet attacks, deconstructing the underlying value chain for attackers and ultimately using this information to better focus on security interventions. I will provide a rough sketch of the modern cyber-criminal ecosystem, describe its dependencies, and highlight some of the key open questions that motivate our focus. Using a range of activities, including our own completed studies, work in progress, and work in development, I’ll illustrate how many of these questions can be tackled empirically.
Along the way, I’ll discuss the real and significant challenges in conducting this sort of research and how we address these issues in practice. Finally, I’ll play pundit and predict where the greatest opportunities for impact are likely to be found.”