How (And Why) Attackers Choose Their Targets
Source: Dark Reading - Posted by Anthony Pell   
Hacks/Cracks Every day, we hear another story about a company whose sensitive data has been breached. Press releases, tweets, customer support email, and followup articles all provide insight into the kind of information that’s been compromised, the company’s plans to investigate, and how affected parties can protect themselves. But what’s almost never shared—unless the attacker spreads the word—is how and why the target was chosen and which methods and tools were used.

To effectively fend off attacks and protect our data systems, we must determine how hackers identify their targets and exploit weaknesses to extract data. We must also understand what motivates hackers.

Read this full article at Dark Reading

Only registered users can write comments.
Please login or register.

Powered by AkoComment!