It is a CSWW goal to promote and provide as much awareness and information as possible regarding the global cyber complexities and challenges. In an effort to reach that goal, CSWW asks that Cyber Professionals and Experts tell our readers a little bit about themselves and their sites in the comments section below.
Thank you.
(CSWW reserves the right to accept, reject, or edit any comments or feedback for inappropriate material, for brevity, for clarity, or other reasons deemed to be the best interest of our readers)
The Cyber Short List
January 21, 2009 by Greg Garcia
It is by now a well known symbol of war – the Trojan Horse – in which Greek soldiers hid themselves while Trojan soldiers wheeled the horse in a victorious march back to Troy, exposing themselves within their own walls to ambush by the disgorged Greeks. Fast forwarding almost 3200 years, we now conventionally know the new meaning of the Trojan Horse as stealthy malicious software code that hides within our computers and networks, programmed to launch and execute crippling instructions that slow or crash our computers, and steal or alter the data stored or transmitted on them. Continue reading…
LikeLiked by 1 person