…deed, their favored tools, as exposed by Vickery, could be used by virtually any committed spammer. While some of RCM’s exploits may have involved the illegal hijacking of IP addresses to launder their emails as legitimate, the majority of its contacts were likely acquired through partnerships and arrangements with net marketing firms, which in turn were acquired from internet users often unknowingly granting the use of their personal information by advertising affiliates.
… transom of a firewall, if it is impossible to even determine where your information exists online. A better concept must be adopted — that of digital resilience, a regime of monitoring, visibility, and swift ability to respond to threats, capable of keeping up with the digital dangers of today.
ugh deep web searches — to see…as longtime internet spammers, needn’t have worried; no hackers had breached their systems. Rather, through negligence on their part, they had already exposed their server backups for weeks, allowing Vickery — and any more nefarious figures hunting for information through deep web searches — to see the inner workings of a potentially criminal cyber network.