How Do Hackers Infiltrate Systems?

The accounts of tens of millions of Anthem members are stolen.  $1 billion are stolen from banks. Sony Pictures is compromised. The Chinese steal US military aircraft plans. The President of the United States decries the losses and appoints someone to fix the problem.  Yet, what is the problem?  Professor Arun Vishwanath, writing in  The Conversation tells us that the system resource being exploited over and over and over again isn’t some router or disk drive or program — it is you, the person operating the machine.

It's You!

It’s You!

 

Learn more at our new blog.

Advertisements

Comments are closed.