Collateral hacking refers to when a company's critical data is compromised as a result of a third party in possession of the company's sensitive data being hacked. Rather than directly hacking into a company, collateral hackers go through a third party in order to get to the company’s sensitive data.
Collateral hacking frequently results in additional companies having their data compromised, as the third party firm will often have the data of numerous companies stored on the hacked server or resource. The security concern of collateral hacking has become more prevalent with the increasing popularity of companies storing sensitive data via server virtualization, in the cloud or with other third-party storage hosting services.
Taking ownership of our own misjudgments or simple forgetfulness takes a healthy amount of humility and some honest self-assessment. Yet sometimes... Read More »Have We Become a World of Addicts?
It's hard to imagine our lives without smartphones. But people who suffer separation anxiety when they don't have their phones nearby may be in... Read More »13 Best Free Android Apps
From secure messaging to document editing, our top free must-have apps have been rated, reviewed and named the best free Android apps of 2015. Read More »
From wacky alarm clocks to lecture hall tools and after class entertainment, these Android apps are a good fit for a student's life and budget. Read More »Network Fundamentals Study Guide
A network is a group of two or more computer systems or devices, linked together to share resources, exchange files and electronic communications.... Read More »Computer Architecture Study Guide
This Webopedia study guide describes the different parts of a computer system and their relations. Read More »
Stay up to date on the latest developments in Internet terminology with a free weekly newsletter from Webopedia. Join to subscribe now.
- Watch Datamation's editor James Maguire moderate roundtable discussions with tech experts from companies such as Accenture, Dell, Blue Jeans Network, Microsoft and more »