1. This site uses cookies. By continuing to use this site, you are agreeing to our use of cookies. Learn More.

Where the monsters live

Discussion in 'Network World' started by RSS, Aug 23, 2016.

  1. RSS

    RSS New Member Member

    The monsters read your full network traffic flow if they have your keys or you used weak ones.

    The monsters are in the hidden partitions of USB flash drives left in parking lots and technical conferences.

    The monsters are in the weakened smartphone OS that most of your users own.

    The monsters are in the containers you used from that interesting GitHub pull.

    The monsters are in the Cisco router where the Zero Day lives waiting for the NSA.

    The monsters are in the fake certificates your user swallowed in their browsers.

    The monsters are 10,000 CVEs that you never, ever checked.

    The monsters live inside your kernel, watching for the network traffic that brings them alive from their zombie state.

    To read this article in full or to leave a comment, please click here

    Continue reading...

Share This Page