Hacking Dirty Dozen: Fraudster's Favorite Attack Vectors

  • By

    Ericka Chickowski

    | Posted 2011-05-06
No Title
POS serverServersUsed in 36% of breaches
The recent Verizon RISK Team 2011 Data Breach Investigations Report offered a whole boatload of important information about the logistics of high-impact data breaches in the past year. But perhaps the most important data release was about exactly how the bad guys are carrying out their plans to steal digital booty. What's the bigger risk, servers, user devices, or people? Find out. The following dozen are the most commonly abused IT assets that lead to breach exposure.