Honey pots have several advantages, which are as follows:

* Small set of data: Honey pots collect small amounts of data, but almost all of this data is about real attacks or unauthorized activity.
* Reduced false positives: Honey pots almost detect or capture attacks or unauthorized activities that reduce false positives.
* False negatives: Honey pots detect and record any unseen or unnoticed attacks or behavior.
* Cost effective: Honey pots only interact with malicious activity. So there is no need for high performance resources.

Honey pots also have some disadvantages, which are as follows:

* Limited View: Honey pots can only see activities that interact with them. They cannot see or capture any attacks directed against existing systems.
* Discovery and Fingerprinting: Honey pots can be easily detected and fingerprinted by several tools.
* Risk of takeover: Since there are many security holes in honey pots, a malicious attacker can takeover the honey pot and can use it to gain access and hack other networks.

Explore More

Critical SQL injection (vulnerability) on SITAGU :: Sitagu International Buddhist Missionary Centre

Security researcher Dr@GoN 3y3 reported another Critical SQL injection (vulnerability) on SITAGU :: Sitagu International Buddhist Missionary Centre http://www.sitaguacademy.com/ SQL injection is a code injection technique that exploits a security

25 per cent of new worms designed to spread via USB

48 per cent of SMBs are infected by worms each year according to a report published by security vendor PandaLabs. The Second International SMB Security Barometer report (PDF here) surveyed

Bruter version 1.0

Bruter is a parallel network login brute-forcer on Win32. This tool is intended to demonstrate the importance of choosing strong passwords. The goal of Bruter is to support a variety