Tuesday, March 04, 2014

Refuse to Be a (Virtual) Victim

I just changed my email password because of some suspicious activity.  I checked my account and see some intruders want in:
I'd love a self-defense program capable of counterattack, the virtual equivalent of aiming a shotgun at the front door with a tripwire if it opens, something that would cause these bastards' machines to self-destruct.

Shatnerware.

1 comment:

Anonymous said...

While the wistful wishes for a booby-trapped computer were probably hyperbole, I'd like to point out that the dangerous "cybercrooks" never use their own hardware to conduct attacks. What usually happens is that some poor sap's computer is taken over by a more general attack (perhaps by an attack via malware placed via an insecure advertisement network), and then the sap's computer is used to launch attacks that "leave fingerprints". I assume that there may be government-sponsored criminal attackers, too, but I assume that would be the same as putting out nails in the Mafia's favorite parking spot...

-PeaceableGuy