For regular updates from SANS on each of these types of attacks, read NewsBites and visit the Internet Storm Center update section. ... De-Anonymization, and Correlation. In the past, we battled attackers who were trying to get access to our machines to steal data for criminal use. Now the battle is shifting from hacking machines to hacking ...
