Feds Targeted by Hackers as Windoze Luzers

From Internet Cloaking Emerges as New Web Security Threat:

Cloaking is just one means by which hostile intelligence organizations can exploit the ability of IP addresses to reveal the physical location—and frequently the organizational identity—of a user visiting a Web site. Another method Cottrell described was a case in which hackers set a number of criteria that they all shared using the Linux operating system and the Netscape browser, among other factors. When federal investigators using PCs running Windows and using Internet Explorer visited the hackers’ shared site, the hackers’ system immediately mounted a distributed denial-of-service attack against the federal system.

Sending federal investigators out into cyberspace using Windows is like sending troops out into a tank battle driving Ford Pintos.


Leave a Reply

Please log in using one of these methods to post your comment:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google+ photo

You are commenting using your Google+ account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )


Connecting to %s

%d bloggers like this: