Traditional intrusion detection systems rely on systems that collect data when actual devices or applications are infiltrated. Some security experts advocate the use of honeypots, to lure bad guys into systems that look valuable but are simply decoys. But a new start up is taking a different approach.
Now you can get the top stories from Lifehacker delivered to your inbox. Enter your email below.
By subscribing you agree to our Terms of Use and Privacy Policy.