Hacking Dirty Dozen: Fraudster's Favorite Attack Vectors
The recent Verizon RISK Team 2011 Data Breach Investigations Report offered a whole boatload of important information about the logistics of high-impact data breaches in the past year. But perhaps the most important data release was about exactly how the bad guys are carrying out their plans to steal digital booty. What's the bigger risk, servers, user devices, or people? Find out. The following dozen are the most commonly abused IT assets that lead to breach exposure.
Nearly all tech service providers are planning to leverage 5G techn...