Counter-Interference Force

Security ... think about it!

2011-09-12

He sneaked into the computer systems of a security firm on the outskirts of Amsterdam. He created fake credentials that could allow someone to snoop on Internet connections that appeared to be secure. He then shared that bounty with people he declines to name.[nytimes.com]
rlssec
‹
›
Home
View web version
Powered by Blogger.