7 sneak attacks used by today's most devious hackers

Discussion in 'other security issues & news' started by FreddyFreeloader, Dec 1, 2013.

Thread Status:
Not open for further replies.
  1. FreddyFreeloader

    FreddyFreeloader Registered Member

    Joined:
    Jul 23, 2013
    Posts:
    527
    Location:
    Tejas
    Read about the 7:
    http://features.techworld.com/security/3471214/7-sneak-attacks-used-by-todays-most-devious-hackers
     
  2. aztony

    aztony Registered Member

    Joined:
    Sep 9, 2012
    Posts:
    547
    Location:
    USA Southwest
    Interesting read, thanks for sharing.
     
  3. Mrkvonic

    Mrkvonic Linux Systems Expert

    Joined:
    May 9, 2005
    Posts:
    8,695
    If you know about their attacks, they are neither sneak nor devious.
    The article should be empty, hence devious.
    Mrk
     
  4. Mrkvonic

    Mrkvonic Linux Systems Expert

    Joined:
    May 9, 2005
    Posts:
    8,695
    There's one problem with almost all of the tactics mentioned.
    The vector of infection. Once you have a bad file on a machine ...
    Wait, how does a bad file get there. That's the big one.

    Not what you do once it's there.

    System path ... not a biggie, and how do you get a file to reside anywhere. Aha. Game over. What happens later is irrelevant.

    So not quite.

    Mrk
     
  5. FreddyFreeloader

    FreddyFreeloader Registered Member

    Joined:
    Jul 23, 2013
    Posts:
    527
    Location:
    Tejas
    Looks like some of those attacks fooled the experts at Microsoft, Google, Apple.
     
Loading...
Thread Status:
Not open for further replies.