If there's one attack surface that's attracting growing attention from digital marauders, it's a system's endpoints. With the proliferation of BYOD, securing connections can be a defender's nightmare. Endpoints have an allure for attackers because they offer multiple attack vectors, such as social engineering attacks, spearphishing, USB infection, and compromise of WiFi networks and routers.
Source: http://www.technewsworld.com/rsstory/78869.html
FAIR ISAAC FACTSET RESEARCH SYSTEMS F5 NETWORKS EPICOR SOFTWARE EMULEX
Nessun commento:
Posta un commento