Skip to Content
1-12-2010 @ 9:22AM
I don't believe anyone has said that specific accounts are targeted and "hacked". So your challenge is moot. And a very attractive strawman.Account are compromised through relatively low effort activities such as the spread of keyloggers and phishing. There are other possible attack vectors, but I think they are all relatively low probability.Why should a miscreant go to the effort of trying to compromise your account when he can instead spread a keylogging trojan via BitTorrent and get other people's account information sent to him?
First time? A confirmation email will be sent to you after submitting.
Members enter your username and password.
Enter your AOL or AIM screenname and password.
Please keep your comments relevant to this blog entry. Email addresses are never displayed, but they are required to confirm your comments.
When you enter your name and email address, you'll be sent a link to confirm your comment, and a password. To leave another comment, just use that password.
To create a live link, simply type the URL (including http://) or email address and we will make it a live link for you. You can put up to 3 URLs in your comments. Line breaks and paragraphs are automatically converted — no need to use <p> or <br /> tags.