Hacking Dirty Dozen: Fraudster's Favorite Attack Vectors

  • By

    Ericka Chickowski

No Title
POS serverServersUsed in 36% of breaches
The recent Verizon RISK Team 2011 Data Breach Investigations Report offered a whole boatload of important information about the logistics of high-impact data breaches in the past year. But perhaps the most important data release was about exactly how the bad guys are carrying out their plans to steal digital booty. What's the bigger risk, servers, user devices, or people? Find out. The following dozen are the most commonly abused IT assets that lead to breach exposure.
This article was originally published on 2011-05-06