It wasn’t all that long ago that I first heard the phrase “supply chain attack.” I think the phrase “supply chain” more commonly refers to manufactured goods — a supply chain analysis of a manufactured product would involve questions like: What parts are used to make this product, and from where are they imported? [...]
Archive for February, 2006
I have an idea about how to solve the phishing problem. Although proposals to solve phishing are not yet as common as proposals to solve spam, there certainly have been quite a few of them, so you would be right to wonder what makes this proposal any different or any more likely to work.