Honeypots are positioned to become a key tool to defend the corporate enterprise from hacker attacks, but some security watchers worry they could bring a new set of security worries with them. Honeypots, which have been around for about 10 . . .
Honeypots are positioned to become a key tool to defend the corporate enterprise from hacker attacks, but some security watchers worry they could bring a new set of security worries with them. Honeypots, which have been around for about 10 years but now are gaining interest and momentum, are digital decoys, of sorts. They are built to be probed and attacked an online come-on to blackhat hackers. Once the honeypot is attacked, security administrators can watch how the hacker moves around the system, and she can see what tools the hacker is using and what information he's going after.

It's a way to spy on your enemy. And if you're lucky, it might even be a form of camouflage. Hackers could be fooled into thinking they've accessed a corporate network, when actually they're just banging around in a honeypot -- while the real network remains safe and sound.

The link for this article located at Earthweb is no longer available.