Cybercrime Trends in 2010

Recently have been reading information security magazine and stumbled on nice graph that shows what are the ways of cybercriminals are targeting endpoint devices. Graph is according to report from Trustwave. Based on220 investigations conducted by the company’s SpiderLabs research team last year, thereport showed that use of vendor-supplied default credentials coupled with unsecureremote access apps are making things easy even for novice attackers. Here are some noteworthy findings from the report:


This entry was posted in IT Security, Week 13 and tagged . Bookmark the permalink.

Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out /  Change )

Google+ photo

You are commenting using your Google+ account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )


Connecting to %s