12 febbraio 2012

Tools, Techniques, Procedures of the RSA Hackers Revealed

Tools, Techniques, Procedures of the RSA Hackers Revealed: An anonymous reader writes "Details of the tools, techniques and procedures used by the hackers behind the RSA security breach have been revealed in a research paper (PDF) published by Australian IT security company Command Five. The paper also, for the first time, explains links between the RSA hack and other major targeted attacks. This paper is a vendor-neutral must-read for any network defenders concerned by the hype surrounding 'Advanced Persistent Threats.'"

ndr: ciumbia !!!


Nessun commento:

Posta un commento