Victimize one to victimize another is one interesting characteristic of cyber-crime over physical world crime. There is the victim of the crime (i.e. the one who lost the money) and the victim who unknowingly gets used to execute the crime. These unknowing victims range from home computers which have been botted, to Service Provider’s whose Read More
Month: January 2008
“Security” is not a Big Bet, it is a fundelmental technology ….”
In other word, I feel no security pain. If I feel no pain, then security is not a top priority for me. But if I let my investors and customers know that I’m not putting security at the top of my list, they will think badly of me. It is the essential security trap – Read More