Hacking Dirty Dozen: Fraudster's Favorite Attack Vectors

  • By

    Ericka Chickowski

    | Posted 2011-05-06
No Title
POS serverServersUsed in 36% of breaches
The recent Verizon RISK Team 2011 Data Breach Investigations Report offered a whole boatload of important information about the logistics of high-impact data breaches in the past year. But perhaps the most important data release was about exactly how the bad guys are carrying out their plans to steal digital booty. What's the bigger risk, servers, user devices, or people? Find out. The following dozen are the most commonly abused IT assets that lead to breach exposure.

Submit a Comment

Loading Comments...

By submitting your information, you agree that channelinsider.com may send you channelinsider offers via email, phone and text message, as well as email offers about other products and services that channelinsider believes may be of interest to you. channelinsider will process your information in accordance with the Quinstreet Privacy Policy.

Thanks for your registration, follow us on our social networks to keep up-to-date