PaulDotCom mailing list archives

Re: DEFCON paper accepted


From: Bruce Barnett <grymoire () gmail com>
Date: Thu, 5 May 2011 10:07:22 -0400

BTW I've been collection examples of deception used in data breaches. I'm
always looking for more examples, such as

Sony notes deception in their attack
http://www.scmagazineuk.com/sony-blames-anonymous-for-playstation-hack-but-confirms-it-has-not-identified-those-responsible/article/202140/

Hirai went on to claim that the breach occurred at the same time as the DoS
attack, which was not immediately detected because of its ‘sheer
sophistication' and because a ‘system software vulnerability' was exploited.


If you know of any, I would very much appreciate it. And be sure to say
hello if you are going to DEFCON.
_______________________________________________
Pauldotcom mailing list
Pauldotcom () mail pauldotcom com
http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom
Main Web Site: http://pauldotcom.com

Current thread: