How to fend off aggressive white-hat hackers
Recently, a former student of mine wrote me asking how to handle an overzealous white-hat hacker. In this case, the hacker had probed the publically exposed computer networks and assets of my friend's company, then left multiple copies of a document describing the weaknesses he found -- and asked to be hired to close the holes and locate more weaknesses.
|
|
Full Story |
This topic does not have any threads posted yet!
You cannot post until you login.