"Why Hackers Love Logs"

Computer log tampering is almost always part of a system compromise. Computer log files record application actions. They help identify system issues like design malfunctions and malicious activity. However, their value is often overlooked. They are usually read/write text files with little security and are not considered the company's "crown jewels" to protect. This is a mistake because the logs contain a record of the Information Technology (IT) infrastructure and its use. This article continues to discuss experts' insights on why and how cybercriminals target logs and what can be done to protect them. 

SecurityWeek reports "Why Hackers Love Logs"

Submitted by grigby1

Submitted by grigby1 CPVI on