• Share
    Two clicks for more data privacy: click here to activate the button and send your recommendation. Data will be transfered as soon as the activation occurs.
  • Print
  • Read out

A deliberately placed trap that allows IT developers and operators to identify virus and hacker attacks as well as the associated perpetrators. Just as bears are hunted by being "lured" with a honey trap, hackers are meant to respond to supposed vulnerabilities in IT systems and attempt to exploit these. They can actually be detected as a result and the system protected against future attacks.