1. Analyze the source code (extremely difficult) 2. Find indications of an attack (ex. an account that grows without deposit transactions) 3. Random audits, especially of financial data, will pick up a pattern of discrepancies and lead to discovery. 4. Don't ignore what appear to be errors in computer-based financial or other accounting systems.
Chat with our AI personalities