Fearing hackers who leave no trace
An article by the New York Times highlighting countries and particular attack venues via software for 2010. Also outlined are concerns and fears from some of the world's most prominent software and hardware manufacturers.
The New York Times Jan 19, 2010
MOUNTAIN VIEW, Calif. — The crown jewels of Google, Cisco Systems or any other technology company are the millions of lines of programming instructions, known as source code, that make its products run.
If hackers could steal those key instructions and copy them, they could easily dull the company’s competitive edge in the marketplace. More insidiously, if attackers were able to make subtle, undetected changes to that code, they could essentially give themselves secret access to everything the company and its customers did with the software.