How one man silently infiltrated dozens of high-tech networks

Ever counted how many external source code dependencies your fancy new software product has? Be prepared for a surprise!

from Naked Security https://ift.tt/2ZmG7It
via IFTTT