With the term software piracy is referred the illegal distribution or reproduction of software for business or personal use. Whether software piracy is deliberate or not, it is still illegal and punishable by law.
We distinguish several type of software privacy:
Emerging markets contribute for a quote of $32 billion and the main reason is that around 50% of the overall of personal personal in the world went to emerging markets.
What is worrysome is the a few percentage (around 20%) of that has installed unlicensed software. Central/Eastern Europe, Asia-Pacific region and Latin America had the highest piracy rates meanwhile North America had the lowest piracy rate.
In Europe the situation is not so good. rance had the highest rate of financial impact from software piracy, with $2.6 Billion, followed by Germany with $2.1 Billion, Italy with $1.9 Billion, and the United Kingdom with $1.8 Billion in losses.
Why distribute piracy software?
Basically the studies have identified 3 main categories of crimes:
The phenomenon is of great concern on the security front. For if the end user is encouraged to use piracy software to save license costs and to be able to test any other kind of application it is exposed to the risk of being victim of such malware with dangerous consequences. Software obtained through illegal channels has a good chance of being faulty, impossible to register and so not upgradable and infected with malwares.
And if I were the victim of an attack of madness and I inconceivable another bad event. If behind the phenomenon of piracy for some applications there were real cyber warfare operations? Distributing pirated copies a government could inject malware or can project a botnet creation plan with the intent to attack specific targets. Pirated software may be a vector privileged, out of control, and well established in many contexts. Consider that with the distrubution of a cracked operating system we now can control a PC but also a mobile device. Through a jailbreak so I could spy on a user who is willing to sacrifice their privacy for installing any application or fashion new features not available in official versions of the software.
As usual … meditate.
Pierluigi Paganini
References
http://portal.bsa.org/piracyimpact2010/studies/piracyimpactstudy2010.pdf
Security Affairs Malware newsletter includes a collection of the best articles and research on malware…
A new round of the weekly Security Affairs newsletter has arrived! Every week, the best…
Fintech firm Figure confirmed a data breach after hackers used social engineering to trick an…
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds a flaw in BeyondTrust RS and…
A new alleged Russia-linked APT group targeted Ukrainian defense, government, and energy groups, with CANFAIL…
A new threat actor, UAT-9921, uses the modular VoidLink framework to target technology and financial…
This website uses cookies.