We often find persistent, unauthorized, and at times, unattributable presences on exploited networks, the hallmark of an unknown adversary intending to do far more than merely demonstrate skill or mock a vulnerability. -- Dennis C. Blair, Director of US National IntelligenceSrc: Google attacks 'wake-up call' - US intel chief | AFP
No comments:
Post a Comment