New York University Skip to Content Skip to Search Skip to Navigation Skip to Sub Navigation

May

  • Watering Hole¬≠¬≠ Attacks

    by Robert Olivarez May 6, 2014
    Information security discussions are plagued with bad analogies, and none sounds stranger than a "watering hole attack," which plays off the tactic in which predatory animals stalk food by waiting at a popular watering hole. Rather than hunt their prey, the predator will wait for the prey to come to it. Hackers are doing something very similar to gain access to systems that might otherwise be too well protected.
    Read More
    Technology Security, Connect - Information Technology at NYU, Technology | Article

NYU Footer