First page Back Continue Last page Summary Graphics
Conclusions
- Attacks like these are publicly available
- Attackers can use automated tools
- easily available on the Internet
- weve only shown a few
- We have to understand the technical aspects to combat the threat
- We need tools to fight back
-