<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
		<id>https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Andy+Giannini</id>
		<title>OWASP - User contributions [en]</title>
		<link rel="self" type="application/atom+xml" href="https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Andy+Giannini"/>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php/Special:Contributions/Andy_Giannini"/>
		<updated>2026-04-26T00:13:50Z</updated>
		<subtitle>User contributions</subtitle>
		<generator>MediaWiki 1.27.2</generator>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Logic/time_bomb&amp;diff=141347</id>
		<title>Logic/time bomb</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Logic/time_bomb&amp;diff=141347"/>
				<updated>2012-12-20T04:21:59Z</updated>
		
		<summary type="html">&lt;p&gt;Andy Giannini: adding some content&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Template:Threat}}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
[[Category:OWASP ASDR Project]]&lt;br /&gt;
&lt;br /&gt;
Last revision (mm/dd/yy): '''{{REVISIONMONTH}}/{{REVISIONDAY}}/{{REVISIONYEAR}}'''&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
&lt;br /&gt;
A logic bomb is a piece of malicious code that executes when specific trigger conditions are met. A typical example would be a program that monitors a company's payroll system, and attacks the company if a specific employee is terminated. A time bomb is a type of logic bomb that uses a date and time as its trigger condition. They are differentiated from software &amp;quot;easter eggs&amp;quot; by their malicious nature.&lt;br /&gt;
&lt;br /&gt;
==Risk Factors==&lt;br /&gt;
A logic bomb can affect any systems that were accessible to the attacker. Depending on the motivation of the attacker, the bomb itself could modify payroll systems, steal corporate databases, or crash critical infrastructure.&lt;br /&gt;
&lt;br /&gt;
* [[Computer Viruses]] occasionally use logic bombs as their payloads. This allows the virus time to spread before alerting infected users with its attack.&lt;br /&gt;
* [[internal software developer | Internal developers]] or [[Contractors | IT contractors]] are the typical threat agents capable of delivering logic bombs.&lt;br /&gt;
&lt;br /&gt;
==Examples==&lt;br /&gt;
&lt;br /&gt;
===Medco Health Solutions===&lt;br /&gt;
: A unix systems administrator recieved 30 months in federal prison for inserting a logic bomb in Medco Health Solutions servers. [http://www.pcworld.com/article/137479/article.html link]&lt;br /&gt;
&lt;br /&gt;
===Fannie Mae===&lt;br /&gt;
: An IT contractor for Fannie Mae inserted a time bomb to attack corporate servers. [http://www.fbi.gov/baltimore/press-releases/2010/ba100410a.htm link]&lt;br /&gt;
&lt;br /&gt;
===Siberian Pipeline Sabotage===&lt;br /&gt;
: It is alleged (and disputed) that a 1982 explosion of a Soviet natural gas pipeline was caused by a logic bomb. [http://www.nytimes.com/2004/02/02/opinion/the-farewell-dossier.html link]&lt;br /&gt;
&lt;br /&gt;
==Related [[Attacks]]==&lt;br /&gt;
&lt;br /&gt;
* [[Computer Viruses]]&lt;br /&gt;
&lt;br /&gt;
==Related [[Vulnerabilities]]==&lt;br /&gt;
&lt;br /&gt;
TBD&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
&lt;br /&gt;
* [http://en.wikipedia.org/wiki/Logic_bomb Wikipedia]&lt;br /&gt;
* [http://computer.howstuffworks.com/logic-bomb.htm HowStuffWorks]&lt;br /&gt;
&lt;br /&gt;
__NOTOC__&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:Embedded Malicious Code]]&lt;/div&gt;</summary>
		<author><name>Andy Giannini</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Competitors&amp;diff=140950</id>
		<title>Competitors</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Competitors&amp;diff=140950"/>
				<updated>2012-12-10T03:10:48Z</updated>
		
		<summary type="html">&lt;p&gt;Andy Giannini: reworded &amp;quot;risk factor&amp;quot; and &amp;quot;examples&amp;quot; sections&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;br&amp;gt;&lt;br /&gt;
[[Category:OWASP ASDR Project]]&lt;br /&gt;
&lt;br /&gt;
== Description ==&lt;br /&gt;
Competition is an interaction between individuals from the same species or different species (Human, animal or vegetal) who dispute something. This dispute may be for food, for territory, for light, for employment, for female, for male and so on. So the competition is an incentive for self-improvement, it is necessary to overcome the expectations to win it.&lt;br /&gt;
The competition can be destructive, when the individual/group/organism seeks to benefit by damaging/eliminating competing or cooperative, when there is improvement of their level by the manner through peaceful exchange and without violating other people.&lt;br /&gt;
&lt;br /&gt;
== Risk Factors ==&lt;br /&gt;
Competitors can attempt to discover your new product and introduce it to the market before you. They can also attempt to gain access to proprietary trade secrets or acquire client database information.&lt;br /&gt;
&lt;br /&gt;
== Examples ==&lt;br /&gt;
=== Destructive Competition ===&lt;br /&gt;
: In 2007, the McLaren Mercedes Formula One championship team was implicated in a spying scandal that plagued the sport for the remainder of the season. In response, they were fined $100 million and excluded from the constructor’s title.&lt;br /&gt;
&lt;br /&gt;
=== Cooperative Competition ===&lt;br /&gt;
: If two companies are competing for business but exchange some information about the market, they can improve their products to increase their sales.&lt;br /&gt;
&lt;br /&gt;
==Related [[Attacks]]==&lt;br /&gt;
TBD&lt;br /&gt;
&lt;br /&gt;
==Related [[Vulnerabilities]]==&lt;br /&gt;
TBD&lt;br /&gt;
&lt;br /&gt;
== References ==&lt;br /&gt;
* [http://en.wikipedia.org/wiki/Competition Wikipedia]&lt;br /&gt;
* [http://sports.espn.go.com/nfl/news/story?id=3018338 ESPN]&lt;br /&gt;
&lt;br /&gt;
[[Category: Threat Agent]]&lt;/div&gt;</summary>
		<author><name>Andy Giannini</name></author>	</entry>

	</feed>