zanek writes “An attacker on the other side of the planet finds and tries to tap an unlisted Midwestern test machine as an open proxy less than 24 hours after it’s switched on. That, in turn, triggers a hunt that bounces from Korea to Austin to China to San Francisco, picking up some tantalizing clues concerning the attackers’ ultimate goals.”
Link: emailbattles.com
Category:
- Security