Highest Rated Comments


RandomActsFL77 karma

Thanks for doing this.

Could you explain to us non-techies how metadata and other data can be used to attribute hacks such as the DNC attack and stuxnet? What can and can't be altered such that firms like Kapersky can attribute accurately?