05 Feb 2017
It doesn't require extraordinary motive or means to hack remotely accessible systems for their processing power. But due to many organizations poor security practices, there's plenty of opportunities. Throw a hostile user that doesn't need much motivation but has plenty...