{"id":81030,"date":"2013-04-17T12:29:31","date_gmt":"2013-04-17T12:29:31","guid":{"rendered":"https:\/\/bm.dev.synology.me\/?p=81030"},"modified":"2026-04-03T11:56:07","modified_gmt":"2026-04-03T11:56:07","slug":"numarul-atacurilor-cibernetice-a-crescut-care-sunt-tintele","status":"publish","type":"post","link":"https:\/\/bm.dev.synology.me\/?p=81030","title":{"rendered":"Num\u0103rul ATACURILOR CIBERNETICE a crescut. Care sunt \u0163intele"},"content":{"rendered":"<p>\n&nbsp;&#8220;Concepute pentru furturi de proprietate intelectual\u0103, aceste atacuri de spionaj cibernetic afecteaz\u0103 tot mai mult sectorul industrial, precum \u015fi IMM-urile care au sub 250 de salaria\u0163i \u015fi care reprezint\u0103 obiectul a 31% dintre aceste atacuri&#8221;, \u00een compara\u0163ie cu 18% \u00een 2011, noteaz\u0103 raportul publicat mar\u0163i.<\/p>\n<p>\n&#8220;IMM-urile se simt adeseori la ad\u0103post de aceste atacuri, \u00eens\u0103 infractorii informatici sunt atra\u015fi de coordonatele lor bancare, datele lor comerciale \u015fi proprietatea intelectual\u0103. Infrastructura \u015fi practicile lor de securitate sunt adesea inadecvate&#8221;, precizeaz\u0103 Symantec.<\/p>\n<p>\nOdat\u0103 ce website-urile acestor companii sunt compromise, acestea &#8220;sunt apoi utilizate \u00een atacuri cibernetice de amploare \u015fi atacuri de tip \u00abWatering Hole\u00bb&#8221;, explic\u0103 grupul.<\/p>\n<p>\n<a href=\"http:\/\/www.mediafax.ro\/economic\/numarul-atacurilor-cibernetice-a-crescut-care-sunt-tintele-10756674\">Cititi mai multe pe<\/a> www.mediafax.ro<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Num\u0103rul atacurilor cibernetice a crescut cu 42% \u00een 2012 \u00een \u00eentreaga lume, IMM-urile \u015fi subcontractan\u0163ii acestora fiind \u0163intele preferate ale infractorilor, potrivit raportului anual al companiei americane de securitate informatic\u0103 Symantec.<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[510],"tags":[21816,363,32507,272,15437,32946,246,20510,9018,10652,16943,12061,7176,219],"class_list":["post-81030","post","type-post","status-publish","format-standard","hentry","category-actualitate","tag-americane","tag-atacuri","tag-cibernetic","tag-companie","tag-comparatie","tag-concepere","tag-crestere","tag-furturi","tag-imm","tag-informatica","tag-infractori","tag-proprietate","tag-raport","tag-securitate"],"_links":{"self":[{"href":"https:\/\/bm.dev.synology.me\/index.php?rest_route=\/wp\/v2\/posts\/81030","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/bm.dev.synology.me\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/bm.dev.synology.me\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/bm.dev.synology.me\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/bm.dev.synology.me\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=81030"}],"version-history":[{"count":1,"href":"https:\/\/bm.dev.synology.me\/index.php?rest_route=\/wp\/v2\/posts\/81030\/revisions"}],"predecessor-version":[{"id":94072,"href":"https:\/\/bm.dev.synology.me\/index.php?rest_route=\/wp\/v2\/posts\/81030\/revisions\/94072"}],"wp:attachment":[{"href":"https:\/\/bm.dev.synology.me\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=81030"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/bm.dev.synology.me\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=81030"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/bm.dev.synology.me\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=81030"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}