Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

This exactly, most leaks don't involve any physical access. Why bother with something hard when you can just get in through an unmaintained Wordpress/SharePoint/other legacy product that some department can't live without.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: