PaulDotCom mailing list archives
Re: DEFCON paper accepted
From: Bruce Barnett <grymoire () gmail com>
Date: Thu, 5 May 2011 10:07:22 -0400
BTW I've been collection examples of deception used in data breaches. I'm always looking for more examples, such as Sony notes deception in their attack http://www.scmagazineuk.com/sony-blames-anonymous-for-playstation-hack-but-confirms-it-has-not-identified-those-responsible/article/202140/ Hirai went on to claim that the breach occurred at the same time as the DoS
attack, which was not immediately detected because of its ‘sheer sophistication' and because a ‘system software vulnerability' was exploited.
If you know of any, I would very much appreciate it. And be sure to say hello if you are going to DEFCON.
_______________________________________________ Pauldotcom mailing list Pauldotcom () mail pauldotcom com http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom Main Web Site: http://pauldotcom.com
Current thread:
- DEFCON paper accepted Bruce Barnett (May 04)
- Re: DEFCON paper accepted Ken Pryor (May 04)
- Re: DEFCON paper accepted Bruce Barnett (May 04)
- Re: DEFCON paper accepted Bruce Barnett (May 05)
- Re: DEFCON paper accepted Bruce Barnett (May 04)
- Re: DEFCON paper accepted Ken Pryor (May 04)