Attackers are increasingly attuned to the power and potential of remote management software.
http://www.wired.com/