![]() ![]() Fuzz those apps and we might find another worm for home systems.ģ. What ports do people open on firewalls? BitTorrent and P2P. None of them are done yet, and I think 2007 will see a lot more activity and revelations from all four. That foursome and their lesser-known buddies and pals are the nucleus of active white hat hacking and disclosure. The first two are pushing fuzzing the latter two are abusing web attacks. HDM, LMH, Jeremiah Grossman, and RSnake are the memorable names. Several people made headlines this year, and maybe you could say they broke out. As phones and VoIP converge and cross international lines, so to will we start to feel the return of phone scams and telemarketers as call prices plummet and laws are unable to cross borders.Ģ. If there are some out there still untapped as a technological attack, they will start getting tapped. Think of all the scams and attacks that have been performed for decades (plagiarism, fraud, identity theft, data theft, credit card skimming, phone phreaking, spam/junk mail, music/movie bootlegging/copying…). Efficiency is the name of the game with technology, not only in business but in criminality as well. And no, I’ll refrain from the obvious and take some more ballsy moves.ġ. But I thought I would spit out what’s on my mind. I’m not one for predictions, mostly because everyone else does them and I’m not necessarily an analyst. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |