![]() ![]() ![]() Tech companies sometimes scrambled to fix problems - often after hackers or academic researchers revealed them publicly - but few companies were willing to undertake the costly overhauls necessary to make their systems significantly more secure against future attacks. They exploited computer bugs for profit or other gain while continually looking for new vulnerabilities. This software, which required access to the core functions of each user’s computer, also gave hackers new opportunities to manipulate machines from afar.īreaking into networked computers became so easy that the Internet, long the realm of idealistic scientists and hobbyists, gradually grew infested with the most pragmatic of professionals: crooks, scam artists, spies and cyberwarriors. L0pht, born of the bustling hacker scene in the Boston area, rose to prominence as a flood of new software was introducing such wonders as sound, animation and interactive games to the Web. “We have the same security problems,” said Space Rogue, whose real name is Cris Thomas. ![]() Even today, many serious online intrusions exploit flaws in software first built in that era, such as Adobe Flash, Oracle’s Java and Microsoft’s Internet Explorer. Officials in Washington and throughout the world failed to forcefully address these problems as trouble spread across cyberspace, a vast new frontier of opportunity and lawlessness. ![]()
0 Comments
Leave a Reply. |