"The investigation into the intrusion methods described in the document and the sophisticated attacks that Gemalto detected in 2010 and 2011 give us reasonable grounds to believe that an operation by ...
from Help Net Security http://ift.tt/18khcJh
from Help Net Security http://ift.tt/18khcJh
0 comments:
Post a Comment