• Phil Factor (2/25/2014)


    ...A lot of attacks seem to merely probes to determine weaknesses. Others, if successful, take effective control of the server, but in a way that is generally undetected, and this is only used later. Very few successful attacks result in your customer database being offered on a Russian website. You probably don't know when your network is successfully compromised...

    Sometimes our systems are just used as a launch pad for other attacks in order to preserve the attackers anonymity and provide an attack vector from a possibly legitimate source.

    Gaz

    -- Stop your grinnin' and drop your linen...they're everywhere!!!