When Security Researchers Pose as Cybercrooks, Who Can Tell the Difference?
Credit to Author: BrianKrebs| Date: Tue, 02 Oct 2018 23:42:24 +0000
A ridiculous number of companies are exposing some or all of their proprietary and customer data by putting it in the cloud without any kind of authentication needed to read, alter or destroy it. When cybercriminals are the first to discover these missteps, usually the outcome is a demand for money in return for the stolen data. But when these screw-ups are unearthed by security professionals seeking to make a name for themselves, the resulting publicity often can leave the breached organization wishing they’d instead been quietly extorted by anonymous crooks.
Read more