Once upon a time, only the black hats (often called hackers) and a few self-described white hats (often called security experts) had easy access to security vulnerability information. The black hats could use their knowledge to break into computers at will. . . .
Once upon a time, only the black hats (often called hackers) and a few self-described white hats (often called security experts) had easy access to security vulnerability information. The black hats could use their knowledge to break into computers at will. Systems were rarely patched to fix these problems because most system administrators remained unaware of the issues, and the good-guy insiders were unwilling to share this information. Things have changed, however.

I'll take a look at how things were before full disclosure, as well as what was posted on that extraordinary day in August.

The link for this article located at Network Magazine is no longer available.