The Sony Hack in Context
CTOvision
JANUARY 9, 2015
If the target is clean, no problem, having gained access to their machine the perpetrators can simply use it to visit child porno sites or chat rooms then, while still concealing their role, ensure that the information is provided to law enforcement officials or the press. Political Manipulation. The federal government ought to do so.
Let's personalize your content