Hacking Dirty Dozen: Fraudster's Favorite Attack Vectors

  • By

    Ericka Chickowski

    | Posted 2011-05-06
  • Email
 
 
 
Previous
No Title
Next
POS serverServersUsed in 36% of breaches
The recent Verizon RISK Team 2011 Data Breach Investigations Report offered a whole boatload of important information about the logistics of high-impact data breaches in the past year. But perhaps the most important data release was about exactly how the bad guys are carrying out their plans to steal digital booty. What's the bigger risk, servers, user devices, or people? Find out. The following dozen are the most commonly abused IT assets that lead to breach exposure.
 
 
 
 
 

Submit a Comment

Loading Comments...
























 
 
 
 
 
 
 
 
 
Thanks for your registration, follow us on our social networks to keep up-to-date