Catch up on stories from the past week (and beyond) at the Slashdot story archive

 



Forgot your password?
typodupeerror
×
Security IT

Sophisticated, Targeted Breakins Uncovered 204

Ichabod writes "Sophisticated computer criminals stole data from Unisys, Booz Allen, L-3 Communications, Hewlett Packard, and Hughes Network Systems. It sounds like they used a combination of social hacking and undetected low-profile malware (reportedly NTOS.exe) to steal and encrypt sensitive data, and compromised Yahoo accounts to store and retrieve it. An international investigation appears imminent. And yes, unfortunately Reuters calls the criminals 'hackers,' further besmirching the once-revered title."
This discussion has been archived. No new comments can be posted.

Sophisticated, Targeted Breakins Uncovered

Comments Filter:
  • by Anonymous Coward on Tuesday July 17, 2007 @02:48PM (#19891059)
    Security is only as good as it's implementation. These articles seem to get the same responses everytime. I would love to see /. act like a think-tank sometime and really come up with some solutions.
    • by ringfinger ( 629332 ) * on Tuesday July 17, 2007 @02:56PM (#19891197) Homepage
      According to the article, they used social engineering by "seducing employees with fake job-listings". This is interesting because it targets those employees that are most disgruntled. Offer them a chance at another job and they'll give you a username/password that probably is the same one they're using to access the corporate account system.


      I agree, we should somehow pool our collective knowledge and accumulate it somewhere. There's an idea for /. to pull it back up on par with digg.

      • Re: (Score:3, Insightful)

        by prelelat ( 201821 )
        on par with Digg? I think Slashdot is still better than Digg. The articles aren't always some top ten games of all time, top ten country albums of all time. I think you can get allot more technical responses from Slashdot users on average, and you don't get as much "I'm l33tz ur 5ux0rz" I do see good comments at both places, and good stories at both, but if it's a slow news day at Digg you can expect to see allot more useless drivel then on Slashdot. At least if you filter out one particular editor...

        Ei
        • off topic but i agree. I get sick of the idiotic comments there and the low
          quality of the copy on submissions. It is like being inside a teenaged male's brain,
          not a good place to be.
      • The solution is to establish a pattern of what account at what workstation accesses what information from what servers at what times.

        Then any deviation from that pattern is flagged and investigated.

        Why is Alice in Accounts Receivable searching the HR server?
        Why is Alice logged into Bob's machine in HR?
        Why is Alice logging in at 1am?
        • The problem is that this, like most other effective security schemes, is expensive.

          Companies won't implement more security than is cost-effective. Their decision making process is going to be driven directly by the perceived odds of being broken-into, times the cost of a possible breakin. They're not going to spend more money than that.

          I doubt there are really going to be any serious (multi-million or -billion dollar) consequences for any of the companies involved. Maybe a few people will get fired and some new procedures will get written into some document that nobody reads, but there's not going to be a major bloodletting. (These companies run the government, in the most literal sense.)

          When you see a F500 company absolutely taken to the cleaners -- totally bankrupted -- due to an IT-security mishap, then you'll see real security implemented. But until then it's just going to be a lot of after-the-fact patching-up and good 'ol "security theater." And a lot of blaming the messenger. That's always cheap.
          • You're right, there won't be any serious consequences. There usually aren't.

            But the only problem with my proposal is that it takes THOUGHT and PLANNING. It cannot be retrofitted to an existing network. (unless you're really lucky)

            The networks have to be constructed so that each point can be monitored. Instead, most networks grow "organically". As connections are needed, they're added. Without any plan. Just get the connections in now.

            The same with servers. The last place I worked had a server in the DMZ cab
      • on par with digg? (Score:3, Insightful)

        by xzvf ( 924443 )
        Quality on par with digg? I don't even know how to respond. Maybe you wanted to Quantity on par with digg. The moderation and answers here are far more insightful and not nearly as biased as the ones on digg.
  • by i8myh8 ( 859764 ) on Tuesday July 17, 2007 @02:49PM (#19891077) Homepage
    ..is that they'd use Yahoo! Mail to retrieve the data. Gmail offers more space. Hrm. Poorly researched.
    • by jojoba_oil ( 1071932 ) on Tuesday July 17, 2007 @02:55PM (#19891183)
      Actually, the so-called hackers thought that "Do No Evil" was a command to those using Google's services. As such they went elsewhere.

      In all seriousness, I'd be willing to bet that they used compromised Yahoo! accounts for a few reasons: yahoo users are generally less computer-savvy (read: easier to compromise), they probably use gmail accounts themselves so they didn't want to draw attention there, and google has been rumored before to keep e-mails even after being deleted from the account.
    • Put job ads in front of disgruntled employees and ask them to create accounts to apply -- then watch as they merrily type in their favorite usernames/passwords into your cracker system. Easy as pie...
    • Yahoo offers "unlimited" mail storage. Maybe not with new accounts, but several of mine do.
    • Plus gmail has mail content sensitive ads. So are they getting ads for credit card number websites and rootkits now?
  • frequency (Score:4, Insightful)

    by HomelessInLaJolla ( 1026842 ) * <sab93badger@yahoo.com> on Tuesday July 17, 2007 @02:50PM (#19891087) Homepage Journal
    The article is rather light on details. My first thought is to wonder how, after all this time, they finally managed to figure out that their systems were compromised.

    My second thought is to wonder if it's even true or if this is just spin-hype for Trend.

    My third thought is to objectively note that this is probably not an isolated incident. If this particular incident is this big then, in all likelihood, there are hundreds or even thousands of other compromised systems which haven't been diagnosed.

    My fourth thought is "Haha!"
    • Re:frequency (Score:5, Informative)

      by pegr ( 46683 ) on Tuesday July 17, 2007 @03:02PM (#19891273) Homepage Journal
      You want details? This trojan appears to be a variant of this nasty little bugger [securescience.net]. (Warning: pdf). The link is to a detailed technical report on how it works, what it does, and how to decrypt data it encrypted. It was authored by Secure Science Corporation back in November of 2006.
    • FTFA:

      Hackers only targeted a limited group of personal computers, which kept traffic down and allowed them to stay under the radar of security police who tend to identify threats when activity reaches a certain level.

      In this case, we are safe assuming "personal computers" == Windoze. Big dumb companies put that crap on people's deskstop.

      The lesson learned again is that corporate security is only as strong as it's weakest link. If you let Windoze retrieve your data you have no secrets.

  • Give it up (Score:4, Insightful)

    by IndustrialComplex ( 975015 ) on Tuesday July 17, 2007 @02:50PM (#19891095)
    I don't think you have to worry about the term 'hacker' being besmirched any more. It, like several other terms have entered the mainstream vernacular. If you really care about the terminology that much, invent a new term for what was the original 'hacking'. It is far too late to close the barn door on the hacker misconception.
    • Re: (Score:2, Funny)

      by morari ( 1080535 )
      And while we're at it: I'm not a Trekkie, I'm a Trekker! Geeze.
      • by elrous0 ( 869638 ) *
        The funny thing is when trekkies/trekkers/whatever are asked to explain the difference between the two terms, they always give either meaningless, nonsensical, or contradictory answers. It all boils down to a bunch of trekkies getting all pissed off back in the 70's/80's that the name had such a negative connotation and thinking that a few changed letters would hide the fact that they were still virgins wearing Starfleet uniforms.
    • by Jack Pallance ( 998237 ) on Tuesday July 17, 2007 @03:33PM (#19891651) Homepage Journal
      I guess you could say, this issue needs more than a "Band-Aid" for a solution.

      Get it?

      Band-Aid!!

      (OK, It was a term that used to be used exclusively to mean a specific brand, but has now changed its meaning over time to mean something broader. I don't know why I even try with you people...)

  • by dotpavan ( 829804 ) on Tuesday July 17, 2007 @02:51PM (#19891107) Homepage
    and "A Department of Transportation spokeswoman said the agency couldn't find any indication of a security breach." awesome!
    • Good one.

      But from reading TFA, you might think "*yawn*, some big companies got hacked, who cares."

      I don't know about DoT, but a lot of government services are being run by Booz Allen and other contractors. I called up some Federal agency hotline a while back and got a greeting like "Welcome to the US Dept. of XYZ hotline, run by Booz Allen. Please call back [during a time of day that is impossibly inconvenient in your time zone]." Think of them like Halliburton, only in Washington D.C. instead of Iraq.

      If
      • Welcome to America.

        By the time the general public catches on to how terribly and horribly bad this is, it'll be too late to do anything about it.

        There's been talk of selling or leasing our interstate highways to overseas investors as a source of tax money. I believe it's already been done in Illinois, and there are talks of doing the same for the NJ Turnpike.

        The incident a year or so ago about port security being run by an overseas corporation also didn't sit well with me at all. I'm all for international
  • by InvisblePinkUnicorn ( 1126837 ) on Tuesday July 17, 2007 @02:51PM (#19891109)
    See, hackers get a bad rap. These folks were kind enough to encrypt the sensitive data they found, so that no outside parties could get a look at personal records.
  • by Henry V .009 ( 518000 ) on Tuesday July 17, 2007 @02:51PM (#19891111) Journal
    "further besmirching the once-revered title"
    Revisionist history a little?
    • by sconeu ( 64226 ) on Tuesday July 17, 2007 @02:59PM (#19891219) Homepage Journal
      Yes. See the Jargon file. The term "hacker" has a long and distinguished history, before it was hijacked by the asshats who are "crackers".
      • by u-bend ( 1095729 )

        Yes. See the Jargon file. The term "hacker" has a long and distinguished history, before it was hijacked by the asshats who are "crackers".
        Yes, but therein lies the problem I've always seen with the term that the tech community would prefer people use, i.e. that "cracker" already has a slang definition, and most people in the world will have reactions ranging from confusion to effrontery at the notion that their computer system was compromised by a bunch of rednecks.
        • Re: (Score:3, Funny)

          by It'sYerMam ( 762418 )
          Or that their system was compromised by a thin, crispy biscuit.
        • Yes, but therein lies the problem I've always seen with the term that the tech community would prefer people use, i.e. that "cracker" already has a slang definition, and most people in the world will have reactions ranging from confusion to effrontery at the notion that their computer system was compromised by a bunch of rednecks.

          I don't think there's much of a chance people confuse someone who's proficient with something like a computer and a white Southerner or redneck. Hack also has another meaning,

      • Re: (Score:2, Insightful)

        by wamatt ( 782485 ) *
        Perhaps its irrelevant what it once was. A hacker now is a bad guy. Trying to re-educate the massive public mindset for the sake of some historical correctness, seems like a futile experience. Eventually 99% of the population won't know or care the origin.

        It's like complaining about the word "gay" being used by teenagers and not referring to a homosexual or when people say "Mac O.S.X" instead of Mac OS Ten
        • Re: (Score:2, Funny)

          by Anonymous Coward
          You do know that OSX was programmed entirely in roman numerals, right?

      • Re: (Score:3, Funny)

        by fenodyree ( 802102 )
        Asshats!

        Now there is a title. Hackers gone, White Hat never made it. Enter Asshat.
        Today I asshatted a Big Corp's main server, so I emailed their admin to fix the hole. I am such an Asshat.
      • Re: (Score:3, Funny)

        by Penguinshit ( 591885 )
        I prefer the term "honky", thankyouverymuch...
      • by Stormie ( 708 )

        Yes. See the Jargon file. The term "hacker" has a long and distinguished history...
        ...and the Jargon File has a lot and distinguished history of passing off the vernacular of Eric S. Raymond and his circle of friends as some sort of universal language used by All True Computer Hackers everywhere.
    • by Himring ( 646324 )
      No, no. They meant "rappers."

    • It's not revisionist. The term "hacker" has a history going back more than 50 years at MIT. Although its use has changed over the years, it definitely carried a connotation of using skill, imagination, and wits [mit.edu].
    • Revisionist history a little?
      I'm curious - did you first become aware of the term "hacker" after watching WarGames [imdb.com] or Hackers [imdb.com]?
    • Revisionist history a little?

      There is no revision of history when someone points out hackers ARE NOT criminals nor that they intentionally damage systems. The first tyme "hacker" was used derogatorily was in the 1980s, before then Hacker [fiu.edu] meant "simply referred to a person who was capable of creating hacks, or elegant, unusual, and unexpected uses of technology."

      The concept of hacking [berkeley.edu] entered the computer culture at the Massachusetts Institute of Technology in the 1960s...
      But there are standards fo

  • by pembo13 ( 770295 ) on Tuesday July 17, 2007 @02:52PM (#19891119) Homepage
    contact the editors [reuters.com] about it politely.
    • From Webster (Score:5, Insightful)

      by Shihar ( 153932 ) on Tuesday July 17, 2007 @03:11PM (#19891387)
      Main Entry: hacker
      Pronunciation: 'ha-k&r
      Function: noun
      1 : one that hacks
      2 : a person who is inexperienced or unskilled at a particular activity
      3 : an expert at programming and solving problems with a computer
      4 : a person who illegally gains access to and sometimes tampers with information in a computer system

      I am pretty damn sure that the thieves in question meet both #3 and #4, hence they are 'hackers'. I probably would not waste time bothering Reuters to complaining that not all hackers are evil. They used the word correctly.
    • Re: (Score:3, Insightful)

      by Waffle Iron ( 339739 )
      I would only have a problem with the term "hacker" if my mind were too feeble to grasp the concept of a homonym.
  • Social engineering (Score:4, Informative)

    by athloi ( 1075845 ) on Tuesday July 17, 2007 @02:53PM (#19891139) Homepage Journal
    At least in the old days [textfiles.com], we used to call it "social engineering" and hacking meant any kind of programming outside the obvious. That included getting machines to fork over security credentials, but that meaning was a subset of the broader term, which meant both a cheesy quick fix ("what a hack!") and a dancelike circumnavigation of inherent limitations to produce a semi-elegant but sturdy fix ("kernel hackers drink coffee black").
  • by wiredog ( 43288 ) on Tuesday July 17, 2007 @02:54PM (#19891161) Journal
    The Security Fix Blog [washingtonpost.com]
    • Re: (Score:3, Interesting)

      by BobMcD ( 601576 )

      You'd think so, yeah, and I was going to mod you up for it, but some one here has their wires crossed...

      Reuters story: Hackers steal data, moving it in encrypted form to their own servers.

      A Department of Transportation spokeswoman said the agency couldn't find any indication of a security breach

      WaPo/Kaspersky story: Hackers sew up customer data in encryption, leaving behind a ransom note asking $300 for the key.

      Those are similar, down even to the list of companies. But I wonder, if all the DoT's data is encrypted, and there's a ransom note, how they failed to detect that?

      In seriousness, I wonder what the truth

  • by LWATCDR ( 28044 ) on Tuesday July 17, 2007 @02:59PM (#19891221) Homepage Journal
    I know the pro windows crowd will jump up and down but I hope they will hear me out.
    1. Windows is the most popular OS on the planet. Just for shear number of systems it is most hacked.
    2. Windows is harder to lock down than most other OSs. That is often because software expects to be running with admin rights.

    I am trying to figure out how no one noticed these programs trying to make connections to the outside world. My guess is that they where not expecting a Trojan. Heck we got hit by a worm at my office. It didn't get through our firewall at all. Somebody brought a notebook in and connected it to our network.
    It only infected three machines but it was a good cheap lesson for us.
    • by BobMcD ( 601576 )
      My guess is that they where not expecting a Trojan ...especially coming from their own, presumably patched and up-to-date, boxes.

      Don't rule out the social engineering aspect here. They sought out security employees that wanted to leave the company.

      Genius, really.
    • wow (Score:2, Funny)

      by nomadic ( 141991 )
      I know the pro windows crowd will jump up and down but I hope they will hear me out.

      Uh....the huge pro windows crowd on slashdot?
      • by rbanffy ( 584143 )
        Don't forget /. is getting increasingly digg-ish.

        Expect a huge amount of Windows vict^H^H^H^Husers here.
        • Re:wow (Score:4, Insightful)

          by cecille ( 583022 ) on Tuesday July 17, 2007 @04:44PM (#19892709)
          Gah, not to get into a huge flame war here, but I seriously don't understand why there's this association of liking/using windows and being some kind of computer moron.

          Let me put it right out in the open here - I like and use Windows. In fact, I'd wager that a large number of /. people do, and either downplay it or deny it. Now I'm not saying that unix type OS's don't have their place - I use solaris and linux at work for coding and my servers generally run openBSD. BUT I want my personal box to be as easy and hassle free as possible so I run windows and only windows. I don't consider myself to be a windows victim and it's not a choice I made just because that's what came with the box. Say what you want about bloatware, but it's nice to buy a piece of hardware and have it just work. It's nice to install a program without having to recompile the kernel. It's nice to have a box I can actually buy decent games for. And no...I haven't reinstalled every two weeks since I bought it and yes, it is still working and not overflowing with disease and spyware.

          Look, I'm not trying to defend every aspect of the OS - clearly there are some issues. But as I get older and more impatient, I'm starting to see windows as the more attractive option simply because there are some things that they got very, very right. Namely the fact that they put so much emphasis on usability.

          Anyway, my long winded point is that not all windows users are stupid or just stumbled upon windows by accident. I know it's fun to bash things senselessly, but let's grab a little perspective here. Windows is not the devil, it's just not perfect. Nothing is.
          • I want my personal box to be as easy and hassle free as possible so I run windows and only windows.

            Sounds like you want a Mac.

            Say what you want about bloatware, but it's nice to buy a piece of hardware and have it just work.

            I've bought 4 new PCs for myself running some version of Windows, two were from Gateway, one from HP, and the other one is from Microway [microway.com]. The one from Microway is the only one of the four that I did not have trouble with either the hardware or the OS, which is NT4.0. One of the

          • Anyway, my long winded point is that not all windows users are stupid or just stumbled upon windows by accident. I know it's fun to bash things senselessly, but let's grab a little perspective here. Windows is not the devil, it's just not perfect. Nothing is.

            The "problem" is that the vast majority of Windows users are stupid and they are using Windows simply because it came with their box.

            Of the hundreds of millions of Windows users, maybe 0.5% are actually computer savvy and chose to use Windows. Of

    • Re: (Score:3, Informative)

      ...Or you can use the NSA's Security Guide to provide a standard model of security. Sounds like you need to look at the configuration guides for router's switches and Operating Systems. http://www.nsa.gov/snac/downloads_all.cfm [nsa.gov]
    • 1. Windows is the most popular OS on the planet. Just for shear number of systems it is most hacked.

      Yea, I went into a Mac store, not an Apple store, and asked about antivirus and firewall programs and the worker I talked to said Macs don't get infected and don't get broken into. I tried to tell him the only reason is because the people who do such things target OSes with big market shares and that when Macs get big enough a share they will be targetted. He just kept saying OSX is immune.

      While I like

  • by N8F8 ( 4562 ) on Tuesday July 17, 2007 @03:01PM (#19891251)
    Using their evil databases to identify trends and patterns.
  • more data please (Score:2, Interesting)

    by scolbert ( 1122737 )
    Wouldn't it be nice if we could get more data on these security breeches? The articles are so lite weight. What technique? What data? I think the more we learn about these problems, the more bullet proof we can make our systems. We are at a disadvantage in that the criminal understands the vulnerability and can exploit it over and over again.

    Sammy at IT/Personafile [personafile.com]
  • by neoshroom ( 324937 ) on Tuesday July 17, 2007 @03:08PM (#19891353)
    "What is most worrying is that this particular sample of malware wasn't recognized by existing antivirus software. It was able to slip through enterprise defenses," said Yankee Group security analyst Andrew Jaquith, who learned of the breach from Morris. "This is a serious threat. It shows how sophisticated hackers have become," Haro said.

    This is not sophistication.

    1. Take any virus/trojan that is recognized by antivirus software.
    2. Put it through an executable compression package [wikipedia.org] to make its code vary from what it used to be on the hard drive or in memory.
    3. Viola! Your malware is now stealthed from any antivirus program.

    Either that was rather simple or I am a seriously dangerous hacker.
    • At least in the olden (DOS) days, when McAfee came upon a pklite'd executable, it would unpack and scan the unpacked executable. I would hope that current antivirus programs would do the same.
      • At least in the olden (DOS) days, when McAfee came upon a pklite'd executable, it would unpack and scan the unpacked executable. I would hope that current antivirus programs would do the same.

        Even if the virus scanner scans for pklite'd executables, you can always write your own unique executable compressor or modify an existing one until your executable is non-detectable.

        Virus scanners are like front door locks. Any serious cat burglar is just going to grappling hook to the roof and cut a hole through str
        • Virus scanners are like front door locks. Any serious cat burglar is just going to grappling hook to the roof and cut a hole through strait into the attic bypassing the door lock entirely.

          That has to be the worst analogy I've ever heard. Cutting a hole in the roof is akin to having a virus that displays a giant message on the screen saying "I'm a virus, delete me". Do you think nobody is going to notice you throwing a grappling hook and climbing onto someone's roof? Or are the people in the house not g

    • by BobMcD ( 601576 )

      I believe the sophistication is question is the combination of the targets, the undetectible malware, and the delivery method. Not the malware itself.

      This was a concentrated attack "seducing employees with fake job-listings on ads and e-mail" and was only directed at specific targets, rather that the entire world at once.

      Likewise they used a website that was unlikely to be blocked to warehouse the data, instead of somewhere in Russia, etc.

      No, this seems a bit above the bar to me.
      • I believe the sophistication is question is the combination of the targets, the undetectible malware, and the delivery method. Not the malware itself.

        So the sophistication was the delivery method -- email! Now my Grandma is a hacker too!
    • I have watched both BitDefender and Kaspersky open those executable compression packages. I don't have BitDefender in front of me, but during scans it logs the quantity of "packed" files that it has unpacked. It seems reasonable to assume that most of the rest of the AV companies do the same.

      It's arguable that the AV products are always able to open up every variation of these things, but it's incorrect to say that simply enclosing your malware inside one automatically makes it undetectable.
      • what happens if I send a 100k worth of gzipped zeros through your scanner? Will it open up the whole thing? Feel free to substitute an appropriate quantity of gzipped zeroes.
    • Re: (Score:2, Informative)

      by icydog ( 923695 )
      How did you get modded +5 Insightful? From the link you posted:

      Also, some older virus scanners simply report all compressed executables as viruses because the decompressor stubs share some characteristics with those. Most modern virus scanners can unpack several different executable compression layers to check the actual executable inside.
      • What is not insightful is pointing out that modern virus scanners can unpack some forms of executable compression. I promise, there are easily made custom forms of compression they are not familiar with unpacking, which is the whole point -- only takes one hole to sink the ship and only takes a person with a blunt instrument to make a hole.
  • by ingo23 ( 848315 ) on Tuesday July 17, 2007 @03:14PM (#19891427)
    From the article:

    A Department of Transportation spokeswoman said the agency couldn't find any indication of a security breach.

    See, it's a win-win situation - the criminals did everything smoothly without leaving a trace, and at DoT it looks like nothing happened!

  • Use of "hacker" (Score:5, Insightful)

    by Matt Perry ( 793115 ) <perry.matt54@ya[ ].com ['hoo' in gap]> on Tuesday July 17, 2007 @03:14PM (#19891431)

    Reuters calls the criminals 'hackers,' further besmirching the once-revered title.
    Get over it. Seriously. This romanticism for some obscure meaning of a word being understood by the general public is really getting tiresome. Words can have multiple meanings depending on the context and hacker is no different. We just have to live with it. There's no way to change the meaning of the word in the public consciousness without some type of huge marketing campaign. Saying you are a Perl hacker is going to be interpreted the way you want by the audience you are targeting with that phrase. If someone thinks you are breaking the security of Perl then they probably don't know what Perl is and aren't the audience for your use of that word. Likewise, when I talk about forking and killing children I'm not talking about murdering babies (contrary to what the marketing woman thought, whose office was near my cube, when she reported me and my co-worker to HR 10 years ago).
    • true enough. We should just come up with a new word that means the old thing. Hack is a type of saw, and I can see some 'hacks' that could be accomplished by it. However, much cooler 'hacks' could be made with a chain saw. So I now consider myself to be a chainer. Then there would be no confusion when talking about unorthodox modifications to subprocess prior to termination, or colloquially, After the children have been forked, you have to chain them before you kill them. Duh.
  • by Pluvius ( 734915 ) <pluvius3&gmail,com> on Tuesday July 17, 2007 @03:18PM (#19891471) Journal
    I didn't think it could get more sophisticated than the classic Breakin 2.0: Electric Boogaloo. Bravo, hackers!

    What's with the whining about the word "hacker," anyway? Talk about beating a dead horse.

    Rob
  • by Cytlid ( 95255 )
    I have the solution to all of our security concerns.

      There are two types of people in the world:

      - those who care about computers
      - those who don't

    Chances are the first group are experts (of varying degrees). The second group are most likely the "vulnerable" ones (in terms of social engineering).

    My solution -- never let group #2 touch a computer again. Ever.
    • Re: (Score:2, Funny)

      by Chineseyes ( 691744 )
      My solution -- never let group #2 touch a computer again. Ever.


      Congratulations you just put group #1 out of work.
  • hacker : criminal :: freedomfighter : __________
  • "Internet security firms began to release patches to fight the malicious software on Monday night."

    "Hey, dammit, don't close that barn door now, we're trying to put the horses away!"

  • by Eil ( 82413 )
    And yes, unfortunately Reuters calls the criminals 'hackers,' further besmirching the once-revered title."

    You mean after they've been doing this for 20 years, there's still somebody left who cares about it?

"Protozoa are small, and bacteria are small, but viruses are smaller than the both put together."

Working...