Who needs software vulnerabilities when you can find lame passwords?

Most criminals don’t need to target software to infiltrate a network and get at sensitive data: getting credentials will do the job just fine.

Read more: Who needs software vulnerabilities when you can find lame passwords?

Story added 23. August 2016, content source with full text you can find at link above.