Thursday, August 30, 2012

The perfect Trojan horse

Six weeks ago, I wrote about the challenges of controlling data ingress and egress on a normal business network and offered a frightening scenario based on the possibility of creating an all-but-undetectable back door in a network firewall with the use of common technologies. As if that weren't enough to worry about, it seems that evil could also be lurking in the nearest power strip.

Source: http://www.infoworld.com/d/data-center/the-perfect-trojan-horse-199242?source=rss_data_center

appointments call center order entry AT&T

No comments:

Post a Comment