Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
DEAL: For $25 - Add A Second Phone Number To Your Smartphone for life! Use promo code SLASHDOT25. Also, Slashdot's Facebook page has a chat bot now. Message it for stories and more. Check out the new SourceForge HTML5 internet speed test! ×
Security

Submission + - Tools, Techniques, Procedures of the RSA hackers revealed

An anonymous reader writes: Details of the tools, techniques and procedures used by the hackers behind the RSA security breach have been revealed in a research paper published by Australian IT security company Command Five. The paper also, for the first time, explains links between the RSA hack and other major targeted attacks. This paper is a vendor-neutral must-read for any network defenders concerned by the hype surrounding "Advanced Persistent Threats".
This discussion was created for logged-in users only, but now has been archived. No new comments can be posted.

Tools, Techniques, Procedures of the RSA hackers revealed

Comments Filter:

Talent does what it can. Genius does what it must. You do what you get paid to do.

Working...