The BBC tech articles are surprisingly good now, stock photos aside.
I work for a small business and we went to a talk about cyber crime. A hacker was there that gave insight into it all including a website which was like a game where they compete to deface / ddos websites and get points based on what type of website it is (commercial, police, blogs) etc, it was really interesting and as pointed out in the BBC article he said all it takes is a workers credentials to be stolen for something big like this to happen.
[QUOTE=Tamschi;48971406]The BBC tech articles are surprisingly good now, stock photos aside.[/QUOTE]
The stock photos are charming though
[QUOTE=xianlee;48971567]I work for a small business and we went to a talk about cyber crime. A hacker was there that gave insight into it all including a website which was like a game where they compete to deface / ddos websites and get points based on what type of website it is (commercial, police, blogs) etc, it was really interesting and as pointed out in the BBC article he said all it takes is a workers credentials to be stolen for something big like this to happen.[/QUOTE]
You can somewhat reduce the potential impact, but it's certainly true you need to be very vigilant about security to prevent escalation once someone gets credentials through social engineering.
Unfortunately, despite what the article says, it's still very common for fully automated remote vulnerabilities to exist.
Sorry, you need to Log In to post a reply to this thread.