Techman
New Member
Check your network security.
For those who feel they have nothing to lose if a hacker gets into your system.
The opinion that many of us keep nothing of real value to a hacker on our systems is mistaken.
Hackers are using internal computer networks as a vector to invade other systems.
They will use your machine to garner log in info and passwords into your websites and your ftp's and your offsite storage systems.
From there they will travel into any other link to which you have access.
The recent Target stores invasion is proof enough.
Hackers supposedly used a HVAC maintenance company's credentials to gain access to Target's internal networks.
For those who feel they have nothing to lose if a hacker gets into your system.
The opinion that many of us keep nothing of real value to a hacker on our systems is mistaken.
Hackers are using internal computer networks as a vector to invade other systems.
They will use your machine to garner log in info and passwords into your websites and your ftp's and your offsite storage systems.
From there they will travel into any other link to which you have access.
The recent Target stores invasion is proof enough.
Hackers supposedly used a HVAC maintenance company's credentials to gain access to Target's internal networks.