Access your Pro+ Content below.
Hacker demonstrates targeted attack
This article is part of the Information Security magazine issue of May 2007
Determined attackers will go to great pains to exploit you and your applications. Unless you're locked in a room with some guy from a three-letter government agency, chances are that anything you've heard about a targeted attack on an organization is strictly hypothetical. Details are scarce and what you hear usually involves theories about a phishing scheme, zero-day exploits or crimeware. That's all well and good, but all of that is too far after the fact to really get a grip on the issue. The real insight comes when the topic turns to the reconnaissance cybercriminals conduct against a target. It's frightening the depths a cracker will descend and the time he'll invest to learn about your organization. And it's an equally scary proposition when you learn--often too late--what you've exposed about yourself online, or worse, what innocuous applications running on your machine leak to the world. Enter a hacker nicknamed rSnake. His real name is Robert Hansen and he's behind ha.ckers.org, a hacker site and self-professed ...
Access this PRO+ Content for Free!
By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.