7 sexy legacy deception techniques that still work today

Image by U.S. DefenseImagery
It’s just a chess match. Who can stay out infront: the IT department defending its network or the rogue bad guys trying to get in and steal information. Here we look back at the various techniques used by the “good guys”. Read CSO’s full story here.
To read this article in full or to leave a comment, please click here
Read more: 7 sexy legacy deception techniques that still work today
Story added 25. August 2015, content source with full text you can find at link above.
More antivirus and malware news?
- A Year of Spam: The Notable Trends of 2013
- UK Cyber Challenge Hunting For Security Skills In Schools
- Group building bridge between identity, strong authentication standards
- Tor Browser 4.5 delivers refreshed UI, privacy silder and Windows shortcut
- Warning Issued Over Attacks on Internet Infrastructure
- Organizations Warned of Exploited GeoServer Vulnerability
- New Year, New Digital You: Consumer Security Findings from McAfee’s Latest Report
- Resolved: Network upgrade to impact TLT services on January 14
- Twitter Admits Phone Numbers Meant for Security Used for Ads
- ‘Knock codes’ for smartphone security are easily predicted