Thursday, August 15, 2013

I'm so happy someone else wonders about these things, too

It's occurred to me on multiple occasions that if a hacker or agent can spoof software update processes, they can easily gain complete control of an end user system. So far, no such exploits have been seen to my knowledge, though.

Anyway, here's a serious yet ultimately humorous discussion of potential software update system exploitation - and how it might perceptually relate to cloud computing.

No comments:

Post a Comment