The Pros and Cons of Posting Vulnerabilities
Source: Network Magazine - Posted by Dave Wreski   
Hacks/Cracks Once upon a time, only the black hats (often called hackers) and a few self-described white hats (often called security experts) had easy access to security vulnerability information. The black hats could use their knowledge to break into computers at will. . . . Once upon a time, only the black hats (often called hackers) and a few self-described white hats (often called security experts) had easy access to security vulnerability information. The black hats could use their knowledge to break into computers at will. Systems were rarely patched to fix these problems because most system administrators remained unaware of the issues, and the good-guy insiders were unwilling to share this information. Things have changed, however.

I'll take a look at how things were before full disclosure, as well as what was posted on that extraordinary day in August.

Read this full article at Network Magazine

Only registered users can write comments.
Please login or register.

Powered by AkoComment!