As security pros in business and government shore up their cyber defenses and contemplate striking back at hackers, they may find themselves on uncertain legal ground. To avoid costly mistakes, it’s important to get legal advice before taking action.
Routers, switches, printers, firewalls, and other network-attached hardware can be automatically targeted via the Internet and brought under attackers’ control, with no user interaction.
Click here for more of Dark Reading’s Black Hat articles.
Client management billing platform provider says its hosting provider was breachedTake a Tour
The FBI says attackers are trying to trick users into installing malware with promises of software updatesTake a Tour
Shawn Henry now heading up services arm of CrowdStrike, the semi-stealth startup that plans to more aggressively profile, target, and ultimately help unmask, sophisticated cyberattackersTake a Tour