Deception Technology: No Longer Only A Fortune 2000 Solution

In Hacker News by Blog Writer

Post Sharing
A cyber-attacker successfully breaks into your environment and begins sneaking around to find something valuable – intellectual property, bank account credentials, company plans, whatever. The attacker makes his way to a certain host on a network node to browse the directories, and suddenly, his connection is cut off. The stolen username and password he acquired no longer works.