{"id":7140,"date":"2010-01-17T00:33:02","date_gmt":"2010-01-16T23:33:02","guid":{"rendered":"https:\/\/www.tecnomagazine.it\/tech\/?p=7140"},"modified":"2010-01-25T18:54:43","modified_gmt":"2010-01-25T17:54:43","slug":"report-annuale-sul-malware-dei-laboratori-di-panda-security","status":"publish","type":"post","link":"https:\/\/www.tecnomagazine.it\/tech\/7140\/report-annuale-sul-malware-dei-laboratori-di-panda-security\/","title":{"rendered":"Report Annuale sul Malware dei Laboratori di Panda Security"},"content":{"rendered":"<div class=\"4032636bd480207a9641f06a0353772e\" data-index=\"1\" style=\"float: none; margin:10px 0 10px 0; text-align:center;\">\n<!--COOKIE_POLICY_BEGIN-->\r\n<script async src=\"\/\/pagead2.googlesyndication.com\/pagead\/js\/adsbygoogle.js\"><\/script>\r\n<!-- Tecnomagine Grande -->\r\n<ins class=\"adsbygoogle\"\r\n     style=\"display:block\"\r\n     data-ad-client=\"ca-pub-4884298544160548\"\r\n     data-ad-slot=\"6528327022\"\r\n     data-ad-format=\"auto\"><\/ins>\r\n<script>\r\n(adsbygoogle = window.adsbygoogle || []).push({});\r\n<\/script>\r\n<!--COOKIE_POLICY_END-->\n<\/div>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-3934 alignright\" src=\"https:\/\/www.tecnomagazine.it\/tech\/wp-content\/uploads\/2009\/01\/virus.jpg\" alt=\"virus\" width=\"246\" height=\"162\" srcset=\"https:\/\/www.tecnomagazine.it\/tech\/wp-content\/uploads\/2009\/01\/virus.jpg 350w, https:\/\/www.tecnomagazine.it\/tech\/wp-content\/uploads\/2009\/01\/virus-300x198.jpg 300w\" sizes=\"auto, (max-width: 246px) 100vw, 246px\" \/>\r\n<div class=\"4032636bd480207a9641f06a0353772e\" data-index=\"1\" style=\"float: none; margin:10px 0 10px 0; text-align:center;\">\n<!--COOKIE_POLICY_BEGIN-->\r\n<script async src=\"\/\/pagead2.googlesyndication.com\/pagead\/js\/adsbygoogle.js\"><\/script>\r\n<!-- Tecnomagine Grande -->\r\n<ins class=\"adsbygoogle\"\r\n     style=\"display:block\"\r\n     data-ad-client=\"ca-pub-4884298544160548\"\r\n     data-ad-slot=\"6528327022\"\r\n     data-ad-format=\"auto\"><\/ins>\r\n<script>\r\n(adsbygoogle = window.adsbygoogle || []).push({});\r\n<\/script>\r\n<!--COOKIE_POLICY_END-->\n<\/div>\n\r\nI <strong>Laboratori di Panda Security<\/strong> \u2013<em><strong> The Cloud Security Company<\/strong><\/em>\u2013 pubblica il suo<strong> report annuale consultabile su<\/strong>: <a href=\"http:\/\/www.pandasecurity.com\/img\/enc\/Annual_Report_PandaLabs_2009.pdf\" target=\"_blank\"><strong>http:\/\/www.pandasecurity.com\/img\/enc\/Annual_Report_PandaLabs_2009.pdf <\/strong><\/a><\/p>\n<p>Il <strong>dato pi\u00f9 eclatante<\/strong>, emerso dallo studio dell\u2019<strong>ultimo periodo<\/strong>, \u00e8 stato indubbiamente l\u2019<strong>incremento smodato del numero di malware<\/strong>: ben <strong>25 milioni di nuove forme sono state create in un solo anno<\/strong>, fatto ancor pi\u00f9 stupefacente se paragonato ai <strong>15 milioni rilevati in 20 anni di attivit\u00e0 della multinazionale<\/strong>. L\u2019<strong>archivio di Panda Security<\/strong> dispone ora di <strong>40 milioni di esemplari <\/strong>e nonostante ci\u00f2 <strong>se ne aggiungono in media 55.000 al giorno<\/strong>.<\/p>\n<p>I <strong>maggiori inconvenienti causati alla sicurezza IT durante tutto il 2009 <\/strong>sono stati analizzati singolarmente, particolare cura \u00e8 stata dedicata ai <strong>social network<\/strong>, considerati ancora oggi un mezzo efficientissimo per la diffusione dei codici maligni. Gli ultimi mesi sono stati poi testimoni della <strong>nascita di innumerevoli generi di Trojan bancari (oltre il 66%)<\/strong> e di una <strong>moltitudine di falsi antivirus (rogueware) <\/strong>con la <strong>sorpresa del ritorno dal passato di alcuni virus ormai classici<\/strong>, tra cui <strong>Conficker<\/strong>, <strong>Sality<\/strong> e il veterano della rete <strong>Virutas<\/strong>, <strong>precedentemente classificati come \u201cin via di estinzione\u201d<\/strong>.<\/p>\n<p>Il grafico \u00e8 consultabile su: <a href=\"http:\/\/www.flickr.com\/photos\/panda_security\/4244341212\/\" target=\"_blank\"><strong>http:\/\/www.flickr.com\/photos\/panda_security\/4244341212\/<\/strong><\/a>.<\/p>\n<p><!--more-->Non ha mancato di essere protagonista anche l<strong>\u2019attivit\u00e0 di spamming<\/strong> che si \u00e8 dimostrata <strong>particolarmente vitale nel 2009<\/strong>: <strong>pi\u00f9 del 92% del traffico email \u00e8 stato identificato come \u201cjunk mail\u201d<\/strong>. Il <strong>tema<\/strong> utilizzato per raggirare le vittime nell\u2019apertura del messaggio di posta si \u00e8 <strong>focalizzato principalmente sui recenti accadimenti drammatici <\/strong>\u2013 <strong>tecnica sfruttata anche per gli attacchi ai SEO<\/strong>-. Allo stesso tempo \u00e8 stato per\u00f2 possibile osservare una <strong>vera ondata di mail spazzatura correlata agli scandali di celebrit\u00e0, video compromettenti di politici, morte di personaggi famosi (vera o falsa) e addirittura all\u2019influenza suina<\/strong>. I Laboratori si sono inoltre mossi anche nello studio del <strong>modo in cui lo spam si diffonde nei diversi settori industriali<\/strong>, rilevando che <strong>il settore automobilistico ed elettrico sono mediamente i pi\u00f9 colpiti<\/strong>, subito seguiti dagli <strong>istituti governativi<\/strong>.<\/p>\n<p>Tra i <strong>canali di diffusione dei malware<\/strong>, quelli che si sono maggiormente distinti sono stati i <strong>social network <\/strong>(principalmente <strong>Facebook, Twitter, Youtube e Digg<\/strong>) e <strong>i SEO col reindirizzamento a siti ricchi di minacce<\/strong>.<\/p>\n<p>Sembra che i cyber-criminali abbiano concentrato la loro attenzione principalmente su questi mezzi, incrementando notevolmente i loro guadagni.<\/p>\n<p>Il<strong> Report Annuale sui Malware<\/strong> ha inoltre esaminato la <strong>diffusione dei contagi in ogni singola nazione e regione del mondo sulla base dei dati raccolti attraverso lo scanning gratuito offerto da Panda ActiveScan (<a href=\"http:\/\/www.activescan.com\" target=\"_blank\">www.activescan.com<\/a>)<\/strong>. <strong>Taiwan svetta nella classifica<\/strong>, seguita a ruota da <strong>Russia, Polonia, Turchia, Colombia, Argentina e Spagna<\/strong>. <strong>L\u2019Italia \u00e8 al decimo posto dopo gli USA<\/strong>. I paesi che hanno fatto registrare il <strong>minor numero di contaminazioni in assoluto sono stati Portogallo e Svezia<\/strong>.<\/p>\n<p>Il grafico \u00e8 disponibile su: <a href=\"http:\/\/www.flickr.com\/photos\/panda_security\/4243568261\/\" target=\"_blank\"><strong>http:\/\/www.flickr.com\/photos\/panda_security\/4243568261\/<\/strong><\/a>.<\/p>\n<p>Il<strong> 2009 <\/strong>ha assistito inoltre alla crescita di un <strong>numero sempre pi\u00f9 rilevante dei cyber-attacchi connessi alla sfera politica<\/strong>, una realt\u00e0 ormai non pi\u00f9 legata al solo mondo dei film fantascientifici o alle teorie cospirative.<\/p>\n<p>Infine, come \u00e8 stato annunciato alcuni giorni orsono,<strong> i laboratori mettono in guardia tutti gli utenti fin da ora, \u00e8 infatti previsto che i malware aumenteranno con una costante progressione anche nel 2010<\/strong>.<\/p>\n<p><strong>Windows 7 sar\u00e0 indubbiamente il bersaglio principale degli hacker, allo stesso tempo \u00e8 possibile ipotizzare che le minacce si concentreranno anche sul mondo Mac, mentre non reputiamo che sia giunta l\u2019era dei virus per i cellulari<\/strong>.<\/p>\n<p>Da <a href=\"http:\/\/www.fullpress.it\" target=\"_blank\"><em><strong>FullPress.it<\/strong><\/em><\/a><\/p>\n\n<div style=\"font-size: 0px; height: 0px; line-height: 0px; margin: 0; padding: 0; clear: both;\"><\/div>","protected":false},"excerpt":{"rendered":"<p>I Laboratori di Panda Security \u2013 The Cloud Security Company\u2013<\/p>\n","protected":false},"author":16,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[50,268],"tags":[2170,4664,4663],"class_list":["post-7140","post","type-post","status-publish","format-standard","hentry","category-web","category-sicurezza","tag-panda-security","tag-report-2009-malware","tag-report-annuale-sul-malware"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Report Annuale sul Malware dei Laboratori di Panda Security - TecnoMagazine<\/title>\n<meta name=\"description\" content=\"I Laboratori di Panda Security \u2013 The Cloud Security Company\u2013 pubblica il suo report annuale consultabile su:\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.tecnomagazine.it\/tech\/7140\/report-annuale-sul-malware-dei-laboratori-di-panda-security\/\" \/>\n<meta property=\"og:locale\" content=\"it_IT\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Report Annuale sul Malware dei Laboratori di Panda Security - TecnoMagazine\" \/>\n<meta property=\"og:description\" content=\"I Laboratori di Panda Security \u2013 The Cloud Security Company\u2013 pubblica il suo report annuale consultabile su:\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.tecnomagazine.it\/tech\/7140\/report-annuale-sul-malware-dei-laboratori-di-panda-security\/\" \/>\n<meta property=\"og:site_name\" content=\"TecnoMagazine\" \/>\n<meta property=\"article:published_time\" content=\"2010-01-16T23:33:02+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2010-01-25T17:54:43+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.tecnomagazine.it\/tech\/wp-content\/uploads\/2009\/01\/virus.jpg\" \/>\n<meta name=\"author\" content=\"Ambra\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@tecnomagazineit\" \/>\n<meta name=\"twitter:site\" content=\"@tecnomagazineit\" \/>\n<meta name=\"twitter:label1\" content=\"Scritto da\" \/>\n\t<meta name=\"twitter:data1\" content=\"Ambra\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tempo di lettura stimato\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minuti\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.tecnomagazine.it\\\/tech\\\/7140\\\/report-annuale-sul-malware-dei-laboratori-di-panda-security\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.tecnomagazine.it\\\/tech\\\/7140\\\/report-annuale-sul-malware-dei-laboratori-di-panda-security\\\/\"},\"author\":{\"name\":\"Ambra\",\"@id\":\"https:\\\/\\\/www.tecnomagazine.it\\\/tech\\\/#\\\/schema\\\/person\\\/cc264ed84688e010b17b72f0a5fd43ef\"},\"headline\":\"Report Annuale sul Malware dei Laboratori di Panda Security\",\"datePublished\":\"2010-01-16T23:33:02+00:00\",\"dateModified\":\"2010-01-25T17:54:43+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.tecnomagazine.it\\\/tech\\\/7140\\\/report-annuale-sul-malware-dei-laboratori-di-panda-security\\\/\"},\"wordCount\":569,\"commentCount\":0,\"image\":{\"@id\":\"https:\\\/\\\/www.tecnomagazine.it\\\/tech\\\/7140\\\/report-annuale-sul-malware-dei-laboratori-di-panda-security\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.tecnomagazine.it\\\/tech\\\/wp-content\\\/uploads\\\/2009\\\/01\\\/virus.jpg\",\"keywords\":[\"Panda Security\",\"report 2009 malware\",\"Report Annuale sul Malware\"],\"articleSection\":[\"Dal web\",\"Sicurezza\"],\"inLanguage\":\"it-IT\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.tecnomagazine.it\\\/tech\\\/7140\\\/report-annuale-sul-malware-dei-laboratori-di-panda-security\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.tecnomagazine.it\\\/tech\\\/7140\\\/report-annuale-sul-malware-dei-laboratori-di-panda-security\\\/\",\"url\":\"https:\\\/\\\/www.tecnomagazine.it\\\/tech\\\/7140\\\/report-annuale-sul-malware-dei-laboratori-di-panda-security\\\/\",\"name\":\"Report Annuale sul Malware dei Laboratori di Panda Security - TecnoMagazine\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.tecnomagazine.it\\\/tech\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.tecnomagazine.it\\\/tech\\\/7140\\\/report-annuale-sul-malware-dei-laboratori-di-panda-security\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.tecnomagazine.it\\\/tech\\\/7140\\\/report-annuale-sul-malware-dei-laboratori-di-panda-security\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.tecnomagazine.it\\\/tech\\\/wp-content\\\/uploads\\\/2009\\\/01\\\/virus.jpg\",\"datePublished\":\"2010-01-16T23:33:02+00:00\",\"dateModified\":\"2010-01-25T17:54:43+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/www.tecnomagazine.it\\\/tech\\\/#\\\/schema\\\/person\\\/cc264ed84688e010b17b72f0a5fd43ef\"},\"description\":\"I Laboratori di Panda Security \u2013 The Cloud Security Company\u2013 pubblica il suo report annuale consultabile su:\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.tecnomagazine.it\\\/tech\\\/7140\\\/report-annuale-sul-malware-dei-laboratori-di-panda-security\\\/#breadcrumb\"},\"inLanguage\":\"it-IT\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.tecnomagazine.it\\\/tech\\\/7140\\\/report-annuale-sul-malware-dei-laboratori-di-panda-security\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"it-IT\",\"@id\":\"https:\\\/\\\/www.tecnomagazine.it\\\/tech\\\/7140\\\/report-annuale-sul-malware-dei-laboratori-di-panda-security\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.tecnomagazine.it\\\/tech\\\/wp-content\\\/uploads\\\/2009\\\/01\\\/virus.jpg\",\"contentUrl\":\"https:\\\/\\\/www.tecnomagazine.it\\\/tech\\\/wp-content\\\/uploads\\\/2009\\\/01\\\/virus.jpg\",\"width\":\"350\",\"height\":\"231\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.tecnomagazine.it\\\/tech\\\/7140\\\/report-annuale-sul-malware-dei-laboratori-di-panda-security\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.tecnomagazine.it\\\/tech\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Report Annuale sul Malware dei Laboratori di Panda Security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.tecnomagazine.it\\\/tech\\\/#website\",\"url\":\"https:\\\/\\\/www.tecnomagazine.it\\\/tech\\\/\",\"name\":\"TecnoMagazine\",\"description\":\"Approfondimenti, Tendenze e Innovazioni nel Vasto Universo dell&#039;Informatica e della Tecnologia\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.tecnomagazine.it\\\/tech\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"it-IT\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.tecnomagazine.it\\\/tech\\\/#\\\/schema\\\/person\\\/cc264ed84688e010b17b72f0a5fd43ef\",\"name\":\"Ambra\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"it-IT\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/b67f75302a24e0a13a9126168729f57f232f4a44fc224f190021c6009c9e41f6?s=96&d=blank&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/b67f75302a24e0a13a9126168729f57f232f4a44fc224f190021c6009c9e41f6?s=96&d=blank&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/b67f75302a24e0a13a9126168729f57f232f4a44fc224f190021c6009c9e41f6?s=96&d=blank&r=g\",\"caption\":\"Ambra\"},\"url\":\"https:\\\/\\\/www.tecnomagazine.it\\\/tech\\\/author\\\/ambra\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Report Annuale sul Malware dei Laboratori di Panda Security - TecnoMagazine","description":"I Laboratori di Panda Security \u2013 The Cloud Security Company\u2013 pubblica il suo report annuale consultabile su:","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.tecnomagazine.it\/tech\/7140\/report-annuale-sul-malware-dei-laboratori-di-panda-security\/","og_locale":"it_IT","og_type":"article","og_title":"Report Annuale sul Malware dei Laboratori di Panda Security - TecnoMagazine","og_description":"I Laboratori di Panda Security \u2013 The Cloud Security Company\u2013 pubblica il suo report annuale consultabile su:","og_url":"https:\/\/www.tecnomagazine.it\/tech\/7140\/report-annuale-sul-malware-dei-laboratori-di-panda-security\/","og_site_name":"TecnoMagazine","article_published_time":"2010-01-16T23:33:02+00:00","article_modified_time":"2010-01-25T17:54:43+00:00","og_image":[{"url":"https:\/\/www.tecnomagazine.it\/tech\/wp-content\/uploads\/2009\/01\/virus.jpg","type":"","width":"","height":""}],"author":"Ambra","twitter_card":"summary_large_image","twitter_creator":"@tecnomagazineit","twitter_site":"@tecnomagazineit","twitter_misc":{"Scritto da":"Ambra","Tempo di lettura stimato":"3 minuti"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.tecnomagazine.it\/tech\/7140\/report-annuale-sul-malware-dei-laboratori-di-panda-security\/#article","isPartOf":{"@id":"https:\/\/www.tecnomagazine.it\/tech\/7140\/report-annuale-sul-malware-dei-laboratori-di-panda-security\/"},"author":{"name":"Ambra","@id":"https:\/\/www.tecnomagazine.it\/tech\/#\/schema\/person\/cc264ed84688e010b17b72f0a5fd43ef"},"headline":"Report Annuale sul Malware dei Laboratori di Panda Security","datePublished":"2010-01-16T23:33:02+00:00","dateModified":"2010-01-25T17:54:43+00:00","mainEntityOfPage":{"@id":"https:\/\/www.tecnomagazine.it\/tech\/7140\/report-annuale-sul-malware-dei-laboratori-di-panda-security\/"},"wordCount":569,"commentCount":0,"image":{"@id":"https:\/\/www.tecnomagazine.it\/tech\/7140\/report-annuale-sul-malware-dei-laboratori-di-panda-security\/#primaryimage"},"thumbnailUrl":"https:\/\/www.tecnomagazine.it\/tech\/wp-content\/uploads\/2009\/01\/virus.jpg","keywords":["Panda Security","report 2009 malware","Report Annuale sul Malware"],"articleSection":["Dal web","Sicurezza"],"inLanguage":"it-IT","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.tecnomagazine.it\/tech\/7140\/report-annuale-sul-malware-dei-laboratori-di-panda-security\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.tecnomagazine.it\/tech\/7140\/report-annuale-sul-malware-dei-laboratori-di-panda-security\/","url":"https:\/\/www.tecnomagazine.it\/tech\/7140\/report-annuale-sul-malware-dei-laboratori-di-panda-security\/","name":"Report Annuale sul Malware dei Laboratori di Panda Security - TecnoMagazine","isPartOf":{"@id":"https:\/\/www.tecnomagazine.it\/tech\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.tecnomagazine.it\/tech\/7140\/report-annuale-sul-malware-dei-laboratori-di-panda-security\/#primaryimage"},"image":{"@id":"https:\/\/www.tecnomagazine.it\/tech\/7140\/report-annuale-sul-malware-dei-laboratori-di-panda-security\/#primaryimage"},"thumbnailUrl":"https:\/\/www.tecnomagazine.it\/tech\/wp-content\/uploads\/2009\/01\/virus.jpg","datePublished":"2010-01-16T23:33:02+00:00","dateModified":"2010-01-25T17:54:43+00:00","author":{"@id":"https:\/\/www.tecnomagazine.it\/tech\/#\/schema\/person\/cc264ed84688e010b17b72f0a5fd43ef"},"description":"I Laboratori di Panda Security \u2013 The Cloud Security Company\u2013 pubblica il suo report annuale consultabile su:","breadcrumb":{"@id":"https:\/\/www.tecnomagazine.it\/tech\/7140\/report-annuale-sul-malware-dei-laboratori-di-panda-security\/#breadcrumb"},"inLanguage":"it-IT","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.tecnomagazine.it\/tech\/7140\/report-annuale-sul-malware-dei-laboratori-di-panda-security\/"]}]},{"@type":"ImageObject","inLanguage":"it-IT","@id":"https:\/\/www.tecnomagazine.it\/tech\/7140\/report-annuale-sul-malware-dei-laboratori-di-panda-security\/#primaryimage","url":"https:\/\/www.tecnomagazine.it\/tech\/wp-content\/uploads\/2009\/01\/virus.jpg","contentUrl":"https:\/\/www.tecnomagazine.it\/tech\/wp-content\/uploads\/2009\/01\/virus.jpg","width":"350","height":"231"},{"@type":"BreadcrumbList","@id":"https:\/\/www.tecnomagazine.it\/tech\/7140\/report-annuale-sul-malware-dei-laboratori-di-panda-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.tecnomagazine.it\/tech\/"},{"@type":"ListItem","position":2,"name":"Report Annuale sul Malware dei Laboratori di Panda Security"}]},{"@type":"WebSite","@id":"https:\/\/www.tecnomagazine.it\/tech\/#website","url":"https:\/\/www.tecnomagazine.it\/tech\/","name":"TecnoMagazine","description":"Approfondimenti, Tendenze e Innovazioni nel Vasto Universo dell&#039;Informatica e della Tecnologia","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.tecnomagazine.it\/tech\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"it-IT"},{"@type":"Person","@id":"https:\/\/www.tecnomagazine.it\/tech\/#\/schema\/person\/cc264ed84688e010b17b72f0a5fd43ef","name":"Ambra","image":{"@type":"ImageObject","inLanguage":"it-IT","@id":"https:\/\/secure.gravatar.com\/avatar\/b67f75302a24e0a13a9126168729f57f232f4a44fc224f190021c6009c9e41f6?s=96&d=blank&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/b67f75302a24e0a13a9126168729f57f232f4a44fc224f190021c6009c9e41f6?s=96&d=blank&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/b67f75302a24e0a13a9126168729f57f232f4a44fc224f190021c6009c9e41f6?s=96&d=blank&r=g","caption":"Ambra"},"url":"https:\/\/www.tecnomagazine.it\/tech\/author\/ambra\/"}]}},"_links":{"self":[{"href":"https:\/\/www.tecnomagazine.it\/tech\/wp-json\/wp\/v2\/posts\/7140","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.tecnomagazine.it\/tech\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.tecnomagazine.it\/tech\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.tecnomagazine.it\/tech\/wp-json\/wp\/v2\/users\/16"}],"replies":[{"embeddable":true,"href":"https:\/\/www.tecnomagazine.it\/tech\/wp-json\/wp\/v2\/comments?post=7140"}],"version-history":[{"count":0,"href":"https:\/\/www.tecnomagazine.it\/tech\/wp-json\/wp\/v2\/posts\/7140\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.tecnomagazine.it\/tech\/wp-json\/wp\/v2\/media?parent=7140"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.tecnomagazine.it\/tech\/wp-json\/wp\/v2\/categories?post=7140"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.tecnomagazine.it\/tech\/wp-json\/wp\/v2\/tags?post=7140"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}