PRO+ Premium Content/Information Security magazine

Thank you for joining!
Access your Pro+ Content below.
May 2007

Hacker demonstrates targeted attack

Determined attackers will go to great pains to exploit you and your applications. Unless you're locked in a room with some guy from a three-letter government agency, chances are that anything you've heard about a targeted attack on an organization is strictly hypothetical. Details are scarce and what you hear usually involves theories about a phishing scheme, zero-day exploits or crimeware. That's all well and good, but all of that is too far after the fact to really get a grip on the issue. The real insight comes when the topic turns to the reconnaissance cybercriminals conduct against a target. It's frightening the depths a cracker will descend and the time he'll invest to learn about your organization. And it's an equally scary proposition when you learn--often too late--what you've exposed about yourself online, or worse, what innocuous applications running on your machine leak to the world. Enter a hacker nicknamed rSnake. His real name is Robert Hansen and he's behind, a hacker site and self-professed ...

Access this PRO+ Content for Free!

By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.

You also agree that your personal information may be transferred and processed in the United States, and that you have read and agree to the Terms of Use and the Privacy Policy.

This Content Component encountered an error