Chapter 1 Dumpster Diving

Hackers pilfer secret data in lots of different ways, but did you they can suck sensitive data right off a corporate network without even touching the network? You might think I’m talking about wireless technology, which doesn’t require any “touching” at all, but I’m not. Be a good sport and don’t read the two “D” words written in big bold letters at the top of this page, and act surprised when I tell you hackers can accomplish this without relying on a single bit of technology (punny). Or, don’t play along, and pretend not to be surprised. In fact, maybe it’s better you go on thinking your personal or corporate secrets aren’t sitting exposed in a dumpster somewhere, waiting for a no-tech hacker to snatch them up. ...

Get No Tech Hacking now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.