LeftofLeft
Diamond Member
- Oct 18, 2011
- 23,108
- 13,478
You know nothing about Cybersecurity. You keep exposing yourself. Worse, you can't validate.
I don't have to know anything about cyber security. I can read and comprehend.
You must know that there are sophisticated hacking programs that imitate a common user and leave no unique footprint. It simply looks like someone allowed had used the system.
Comprehend this. I am in the Cybersecurity industry. The sophisticated hacking programs you refer to are polymorphic attacks architected at the lowest level in the stack to evade even the most defense in depth security infrastructures. Malware is being designed on the fly to go undetected to capture and disseminate information to the hackers. The State Department is not unlike organizations that have a sophisticated security infrastructure yet still could be vulnerable to unknown targeted malware. What was the Security Infrastructure like in the closet?
That said, just because you read what you want does not mean nothing was hacked.