A combination of a social engineering con and a zero-day attack was used to steal critical RSA information.
Source:
http://bits.blogs.nytimes.com/2011/04/02/the-rsa-hack-how-they-did-it/
A combination of a social engineering con and a zero-day attack was used to steal critical RSA information.
Source:
http://bits.blogs.nytimes.com/2011/04/02/the-rsa-hack-how-they-did-it/
No comments:
Post a Comment