If they use zero-day exploits then thats illegal. Secondly, are they using zero-day exploits post on public mailing lists or using their own home grown exploits that the bad guys and potentially the vendor doesn't know about?
On Mon, Dec 1, 2008 at 10:44 PM, Aaron Gray <[EMAIL PROTECTED]> wrote: > "proof", did you read the article ? > They are after your bad guys and probably using zero day exploits !? > On Mon, Dec 1, 2008 at 9:13 PM, n3td3v <[EMAIL PROTECTED]> wrote: >> >> http://news.bbc.co.uk/1/hi/technology/7758127.stm > _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
