Hot or Not: Remote access breaches

By on

Just like the detectives do on weekly television crime dramas, put yourself in the mind of the bad guy. Pretend that you're the criminal who brokers stolen personal information with organised crime syndicates overseas. Put yourself behind the eyes of the malicious hacker who plans to breach merchant networks and compromise wholesale volumes of consumer payment card information, the kind of information that can be bartered within the internet's dark underbelly.

How would you do it? In the security industry, it is widely accepted that in exploring possible attack vectors to breach the network perimeter, malicious hackers will always choose the path of least resistance. And more often than not, the vulnerabilities they choose to exploit exist somewhere ...

Hi! You've reached one of our premium articles. This is available exclusively to subscribers.

It's free to register, and only takes a few minutes.

Once you sign up you'll have unlimited access to the full catalogue of Australia's best business IT content, as well as a daily news bulletin delivered straight to your inbox.

Register now

Most Read Articles

Log In

|  Forgot your password?