Every day we read about an incredible number of successful attacks and data breaches that exploited leak of authentication mechanisms practically in every sector. Often also critical control system are exposed on line protected only by a weak password, in many cases the default one of factory settings, wrong behavior…
InfosecIsland: IC3: 2011 Internet Crime Report – IC3 represents a perfect example of how technological services could help in the p… http://t.co/SfaQcG61
InfosecIsland: IC3: 2011 Internet Crime Report – IC3 represents a perfect example of how technological services could help in the p… http://t.co/SfaQcG61 View full post on Twitter / InfosecIsland View full post on National Cyber Security