How an Exploit in the Computer System of a Small Company Was Used to Gain Access to Two Major Govern
In this paper, I will describe how an exploit in the computer system of a small company was used to gain access to two major government agencies. First, I will introduce the players in this incident. I will summarize what was reported in a follow-up executive meeting. I will explain the exploit...