PC Magazine – 8/1/14: If you leave it online, the hackers will come. It sort of goes without saying that some of the most useful software tools one can use to access computers remotely can also be a big Achilles heel of an enterprise network configuration, security-wise. Just as easy as it might be for you to log into a remote system via an app from LogMeIn, for example, it seems to be similarly easy for attackers to launch brute-force attacks on your setup once they’ve figured out that it exists. And that’s only the beginning of the fun.
Click here to read more: http://www.pcmag.com/article2/0,2817,2461779,00.asp
Subscribe to the comments for this post?
Share this on Facebook
Share this on LinkedIn
Email this to a friend?
Share this on del.icio.us
Add this to Google Reader
Share this on Technorati
Seed this on Newsvine
Share this on Blinklist
Share this on FriendFeed
Add this to Google Bookmarks
Post on Google Buzz
Post this to MySpace
Share this on Plaxo
Submit this story to Propeller
Add to a lense on Squidoo
Stumble upon something good? Share it on StumbleUpon
Share this on Tumblr
Buzz up!