IT’s 9 biggest security threats

http://www.flickr.com/photos/71744937@N07/7297167486/

Years ago the typical hacking scenario involved a lone attacker and maybe some buddies working late at night on Mountain Dew, looking for public-facing IP addresses. When they found one, they enumerated the advertising services (Web server, SQL server, and so on), broke in using a multitude of vulnerabilities, then explored the compromised company to their heart’s content. Often their intent was exploratory. If they did something illegal, it was typically a spur-of-the-moment crime of opportunity.

My, how times have changed.

Tags: 

Read more: IT’s 9 biggest security threats

Story added 27. August 2012, content source with full text you can find at link above.