
30 Jul
2005
30 Jul
'05
10:38 a.m.
Stephen Fulton wrote:
That assumes that the worm must "discover" exploitable hosts. What if those hosts have already been identified through other means previously? A nation, terrorist or criminal with the means could very well compile a relatively accurate database and use such a worm to attack specific targets, and those attacks need not be destructive/disruptive.
Sure, most of the people on this list would make very smart and skilled criminals if they would choose to pursue that path. Pete