If you're going to read this:
http://labs.bitdefender.com/2012/06/flame-the-story-of-leaked-data-carried-by-human-vector/
(which you should) then you have to read it listening to this
<http://www.youtube.com/watch?v=PVi8bJFIac8> or this
<http://www.youtube.com/watch?v=z5X5zh00rdg>. That plus the
crypto-windows-update technique makes it a work of art.

The take-away is that controlling the emergent behavior of your
opponent's information infrastructure with replicant techniques is ...
effective <http://www.youtube.com/watch?v=eFVi-j-yIr0>.

-dave


-- 
INFILTRATE - the world's best offensive information security conference.
April 2013 in Miami Beach
www.infiltratecon.com

Attachment: signature.asc
Description: OpenPGP digital signature

_______________________________________________
Dailydave mailing list
[email protected]
https://lists.immunityinc.com/mailman/listinfo/dailydave

Reply via email to