In 2003 and beyond, hackers will employ new methodologies and schemes to bring users indirectly to the hacker's...
By submitting your email address, you agree to receive emails regarding relevant topic offers from TechTarget and its partners. You can withdraw your consent at any time. Contact TechTarget at 275 Grove Street, Newton, MA.
attacks as opposed to bringing the attacks to network or remote users. Hackers will utilize new techniques and compromise Web sites (banks, universities, businesses, etc.) and transparently recruit users to involuntarily assist in a widespread attack against the compromised Web sites.
The viable venue for a hacker's paradise will continue to be any application resident in memory on a server or host (with a port to spare) outside or behind a firewall. Hackers have written their thesis statement to the industry that no servers nor firewalls nor desktops are out of their reach. They will continue to control the landscape that is the network that controls you.
The new security frontier will continue as an undeveloped field exposed to the dark forces of hackers and their clan. Network administrators will be left behind in the dust as they race on the road to recovery from another attack, this time caused by oblivious users visiting Web sites.
Hackers will continue to operate under the guise of normalcy to recruit hosts and gain an involuntarily start from users in developing their attacks. Another hacker will cross the bridge and surrender his identity to authorities and ask for redemption in an attempt to confound the wise.