• Gary Varga (2/25/2014)


    Phil Factor (2/25/2014)


    ...A lot of attacks seem to merely probes to determine weaknesses. Others, if successful, take effective control of the server, but in a way that is generally undetected, and this is only used later. Very few successful attacks result in your customer database being offered on a Russian website. You probably don't know when your network is successfully compromised...

    Sometimes our systems are just used as a launch pad for other attacks in order to preserve the attackers anonymity and provide an attack vector from a possibly legitimate source.

    Many websites simply do not have the economic benefit for the hacker. Hack SSC and you get some passwords that are hopefully not used on other sites. Hack Target and you get millions of credit cards.