The technicians of the corporation in California have spread the network of honeypots are computers, servers, applications, document repositories and various programs potentially interesting for criminals electronic but totally bogus.
The traps were deployed in hundreds in more than 40 different countries: their monitoring allows experts to Norse to intercept real-time large-scale attacks.

 

The results of this hunt electronics are located on a map updated in real time and available on the Internet.
The application, as well as see what is going on on the net to Norse, allows you to identify the type of attack and the target, the country of origin and destination.

Just look at the map for a few hours to realize how some lines are more busy than others. In general cyber attacks appear to move from east to west and in particular from China to the United States.
Actually determine the exact origin of these activities is often difficult if not impossible: electronic criminals are in fact skilled at hiding their tracks bouncing from one node to another network through special software can bring up IP addresses and countries of origin different from the real ones.

We can defend ourselves?
The rules are always the same: do not visit sites of questionable legality, do not open emails or links offering deals too good to be true (it's probably a scam) and keep update firewall and antivirus.

From Focus (ita)