Get a Pentest and security assessment of your IT network.

News

Beyond honeypots: It takes a honeytoken to catch a thief

Honeytokens contain digital data created and monitored solely as indicators of digital theft. They can be real data containing a “marker” — fake data that simply doesn’t exist in the real world. Fake email accounts have long been used to capture or get early warning of spammers. Fake executables can be used to send back information about the hacker’s environment, such as the IP address, found names, and so on. If you really want to catch a thief, why not think like a marketer?”]

Source: https://www.csoonline.com/article/2614310/beyond-honeypots–it-takes-a-honeytoken-to-catch-a-thief.html

Related posts
News

Ashley Madison 2.0 Hackers Leak 20GB Data Dump, Including CEO's Emails

News

Art of Twitter account hacking

News

Who and why is attacking companies in the Nordic Countries?

News

Shamoon Malware, cyber espionage tool, cyber weapon or