7 sneak attacks used by today's most devious hackers

Discussion in 'other security issues & news' started by FreddyFreeloader, Dec 1, 2013.

Thread Status:
Not open for further replies.
  1. FreddyFreeloader

    FreddyFreeloader Registered Member

    Joined:
    Jul 23, 2013
    Posts:
    527
    Location:
    Tejas
    Read about the 7:
    http://features.techworld.com/security/3471214/7-sneak-attacks-used-by-todays-most-devious-hackers
     
  2. aztony

    aztony Registered Member

    Joined:
    Sep 9, 2012
    Posts:
    737
    Location:
    The Valley Arizona
    Interesting read, thanks for sharing.
     
  3. Mrkvonic

    Mrkvonic Linux Systems Expert

    Joined:
    May 9, 2005
    Posts:
    10,223
    If you know about their attacks, they are neither sneak nor devious.
    The article should be empty, hence devious.
    Mrk
     
  4. Mrkvonic

    Mrkvonic Linux Systems Expert

    Joined:
    May 9, 2005
    Posts:
    10,223
    There's one problem with almost all of the tactics mentioned.
    The vector of infection. Once you have a bad file on a machine ...
    Wait, how does a bad file get there. That's the big one.

    Not what you do once it's there.

    System path ... not a biggie, and how do you get a file to reside anywhere. Aha. Game over. What happens later is irrelevant.

    So not quite.

    Mrk
     
  5. FreddyFreeloader

    FreddyFreeloader Registered Member

    Joined:
    Jul 23, 2013
    Posts:
    527
    Location:
    Tejas
    Looks like some of those attacks fooled the experts at Microsoft, Google, Apple.
     
Thread Status:
Not open for further replies.
  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.