PC Magazine – 8/1/14: If you leave it online, the hackers will come. It sort of goes without saying that some of the most useful software tools one can use to access computers remotely can also be a big Achilles heel of an enterprise network configuration, security-wise. Just as easy as it might be for you to log into a remote system via an app from LogMeIn, for example, it seems to be similarly easy for attackers to launch brute-force attacks on your setup once they’ve figured out that it exists. And that’s only the beginning of the fun.
Click here to read more: http://www.pcmag.com/article2/0,2817,2461779,00.asp

Subscribe to the comments for this post?

Share this on Facebook

Share this on LinkedIn

Email this to a friend?

Share this on del.icio.us

Add this to Google Reader

Share this on Technorati

Seed this on Newsvine

Share this on Blinklist

Share this on FriendFeed

Add this to Google Bookmarks

Post on Google Buzz

Post this to MySpace

Share this on Plaxo

Submit this story to Propeller

Add to a lense on Squidoo

Stumble upon something good? Share it on StumbleUpon

Share this on Tumblr

Buzz up!

Leave a Reply

Your email address will not be published.