At the end of the day, computing power is computing power, so leveraging CCTV systems to launch an attack makes sense. Proper system hardening often stops at the systems with which we are most comfortable or the systems that fall under some compliance or regulatory requirement. But this article demonstrates a painful truth – all computer systems are vulnerable and all pose a threat if we do not secure, update, patch and harden them appropriately.
top of page
Recent Posts
See AllI recently spoke about the FTC’s lawsuit against Chegg, a major education tech firm, in one of the weekly tech tips interviews I provide...
Multiple sources have reported the breach of Cisco’s own network, purportedly via a Cisco employee’s personal Google account. According...
I very much enjoyed this article from Pieter Danhieux via Dark Reading and this creative approach to the management of applications and...
bottom of page
Comentarios