Information security
fromtheregister
15 hours agoTo gain root access at this company, all an intruder had to do was ask nicely
IT staff reset an account after a caller failed challenge questions, enabling unauthorized access through social engineering and weak password reset procedures.