Details Of China's hacking of Google
http://www.nytimes.com/2010/04/20/technology/20google.html?src=busln
"the losses included one of Google’s crown jewels, a password system that controls access by millions of users worldwide to almost all of the company’s Web services, including e-mail and business applications"
"more than two dozen other companies that were compromised, the vast majority of which have not acknowledged the attacks."
" having access to the original programmer’s instructions, or source code, could also provide technically skilled hackers with knowledge about subtle security vulnerabilities in the Gaia code that may have eluded Google’s engineers."
" Understanding the algorithms on which the software is based might be of great value to an attacker looking for weak points in the system, he said."
"At one high-profile Silicon Valley company, investigators found evidence of intrusions going back more than two years,"
"the losses included one of Google’s crown jewels, a password system that controls access by millions of users worldwide to almost all of the company’s Web services, including e-mail and business applications"
"more than two dozen other companies that were compromised, the vast majority of which have not acknowledged the attacks."
" having access to the original programmer’s instructions, or source code, could also provide technically skilled hackers with knowledge about subtle security vulnerabilities in the Gaia code that may have eluded Google’s engineers."
" Understanding the algorithms on which the software is based might be of great value to an attacker looking for weak points in the system, he said."
"At one high-profile Silicon Valley company, investigators found evidence of intrusions going back more than two years,"
0 Comments:
Post a Comment
Subscribe to Post Comments [Atom]
<< Home