The Ethics of Publicly Naming Compromised Systems
I spend some time each week researching what Internet miscreants are doing. Because of this, I often encounter compromised systems before their owners know of the breach. As I write this, I currently have outstanding contact attempts for ten organizations with compromised websites - some with which you’re likely familiar.
Continue reading