January 4, 2012
In Arseh Sevom's first ever newsletter (online here), we looked back at some of the highlights from the pages of our website. Those included:
They used both known hacker tools as well as software and scripts developed specifically for this task. Some of the software gives an amateurish impression, while some scripts, on the other hand, are very advanced. In at least one script, fingerprints from the hacker are left on purpose, which were also found in the Comodo breach investigation of March 2011.Read more