|12-28-12, 10:50 AM||#1|
Join Date: Jun 2009
Looking back: the five most important security stories of 2012
Enlarge / An overview of a chosen-prefix collision. A similar technique was used by the Flame espionage malware that targeted Iran. The scientific novelty of the malware underscored the sophistication of malware sponsored by wealthy nation states.
The dance among blackhat, whitehat, and greyhat hackers grew ever more intricate in 2012, thanks to a steady stream of exploits, vulnerability discoveries, and data breaches. In-the-wild attacks against Internet Explorer, the Java software framework, and other perennial favorites continued, of course. They inflicted plenty of damage on end users, but given their familiarity, they hardly stood out.
What got our attention were attacks on entirely new classes of devices or victims, or in the case of passwords and cryptography, the culmination of new exploit techniques quickly eroding the protection we once took for granted.
From our perspective, here are the five biggest security stories this year.
Read 12 remaining paragraphs | Comments
|Thread||Thread Starter||Forum||Replies||Last Post|
|From Windows 8 to Raspberry Pi, we pick the top IT stories of 2012||News||Archived News Items||0||12-26-12 05:00 PM|
|The Magnificent And Important RPS Advent Calendar 2012!||News||Archived News Items||0||12-01-12 09:10 AM|
|Saturday Crapshoot: Yoda Stories||News||Archived News Items||0||09-22-12 02:00 PM|
|First look: Windows Server 2012 brings the cloud down to earth||News||Archived News Items||0||09-04-12 05:50 PM|
|Video: Cyber Security Defense Using HPC||News||Archived News Items||0||05-07-12 05:00 PM|