Black Hat: We're all terribly leaky

Monday, 5 March 2007, 12:36 AM EST

The biggest threat to your personal and professional security may be the information your computer is already transmitting to the world around you.

Data leakage might be a hot topic, given the list of high-profile incidents reported by businesses such as TJX Companies, through which reams of detailed consumer records have been exposed. But most people are already broadcasting enough information from their laptops to allow hackers to aim targeted attacks at their devices and corporate networks, according to security researchers.

At Computerworld.

[ Read more ]




Spotlight

Whitepaper: Zero Trust approach to network security

Posted on 20 November 2014.  |  Zero Trust is an alternative security model that addresses the shortcomings of failing perimeter-centric strategies by removing the assumption of trust.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Fri, Nov 21st
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //