Friday, May 24, 2013

0

Tailgating

Posted in ,
Also called piggybacking, this scheme is used in gaining access even without having any authorization by simply riding on another individual’s credentials. This includes faking an ID or presenting excuses in order to make the person believe the hacker is harmless.

Read full article

0 comments: