Source Code Management a Weak Spot in Aurora Attacks

Source Code Management a Weak Spot in Aurora Attacks

Security vendor McAfee has released a report detailing the way hackers accessed source code during the recent targeted attacks on Google, Adobe, Intel, and others. George Kurtz, McAfee’s chief technology officer, says that the problem is source code management systems which “are underprotected and not very well monitored.” He adds that “These systems are designed so you can have multiple people around the world working on them,” and that gives criminals more opportunities to find a weakness and access the system.

Kurtz encourages companies to beef up the authentication and other security measures protecting these systems, saying “If that’s your crown jewels, you might want to think twice about how you’re protected.”

View article

See also  20 Real-World Examples of Embedded Systems

About Our Editorial Process

At DevX, we’re dedicated to tech entrepreneurship. Our team closely follows industry shifts, new products, AI breakthroughs, technology trends, and funding announcements. Articles undergo thorough editing to ensure accuracy and clarity, reflecting DevX’s style and supporting entrepreneurs in the tech sphere.

See our full editorial policy.

About Our Journalist