Intruders are Prepared and Organized
Their ability to effectively network and share vulnerability and attack methodologies outpaces our ability to share protection strategies and information
- telephone & voice message systems
- electronic mail
- intruder/hacker web sites
- anonymous FTP services
- internet relay chat (IRC) & other chat services
- strong encryption
- conference (DEF CON)
- publications (2600)