Archive for June 6, 2010

Looking at hacking and security from a different perspective

June 6, 2010 1 comment

From a hacker’s perspective, what we refer to as “security” is nothing more than a collection of technical obstacles that can be overcome by careful research and planning.  These obstacles can be overcome by attacking devices over the network, obtaining physical access to a device, or socially engineering users into taking actions that result in a compromise. Convincing users to open an email or attachment, go to a Website, insert a CD/DVD, install an application, attach a USB device, or divulge password information, are all proven means to compromise a system.  After a compromise is achieved, a hacker will attempt one or more of the following actions:

Read more…