Welcome to the SecAware blog

I spy with my beady eye ...

6 Sept 2006

Laptop hacking step-by-step

In a piece ostensibly in the same vein as Catch Me If You Can, Spies Among Us or Know Your Enemy, the author of Laptop hacking step-by-step invites us to consider how data thieves or hackers might break into laptops in order to identify necessary security controls. The laptop security vulnerability assessment is rather narrowly focused, highlighting certain issues (such as missing or weak passwords) and controls (such as disk encryption) but compeltely missing many other issues (such as lost data or malware) and controls (such as backups and antivirus).
More on mobile security

1 comment:

  1. you can find a laptop security points on:
    http://laptopadvisor.blogspot.com/
    about malwares or thieves , you can find some tips

    ReplyDelete