The Arcive of Official vBulletin Modifications Site.It is not a VB3 engine, just a parsed copy! |
|
#111
|
||||
|
||||
Quote:
We have an idea how they may have got the details, and its not via anything vbulletin related. |
Благодарность от: | ||
#112
|
|||
|
|||
Quote:
http://arstechnica.com/security/2013...0-day-attacks/ |
#113
|
||||
|
||||
Arasetechia is mainstream tech media?
I still don't understand what additional information you want/need. I doubt they'll give you the exact method. |
#114
|
|||
|
|||
Why do people keep trying to find ways to give VB passes on this?
Needing to know if the hack was due to an exploit in VB itself is a hugely legitimate concern. Is Information Week mainstream tech enough for you? http://www.informationweek.com/secur...d/d-id/1112660 If not, how about PC World? http://www.pcworld.com/article/20644...ort-forum.html |
#116
|
|||
|
|||
No he doesn't - he says IB might have an idea of how the attacks may have been attempted.
|
#117
|
||||
|
||||
Do you only read what you think you see or what is actually there. "And its not anything vbulletin related."
|
#118
|
|||
|
|||
Quote:
Paul's post does not say that the hack wasn't caused by a vB exploit - it says IB may have an idea about something that might have caused the hack. It then says what they're looking into isn't a vB exploit. That isn't the same as saying the hack wasn't caused by a vB exploit. Unless Paul gives us more information, we don't really have any idea whether a new exploit was used. The level of communication from IB is so bad that not even media sources can get a straight answer on what's happening - are customers remotely valued by this company or have even the staff given up on the product? |
#119
|
||||
|
||||
Quote:
|
#120
|
||||
|
||||
Think this thread has runs it's course as it's turning in to bickering which clouds the facts.
|
|
|
X vBulletin 3.8.12 by vBS Debug Information | |
---|---|
|
|
More Information | |
Template Usage:
Phrase Groups Available:
|
Included Files:
Hooks Called:
|