Case and point for White hat Hackers


While disclosing vulnerabilities is standard practice in the computer industry, the people responsible for the vulnerabilities don’t always take it well.

Comments are Most Welcome

Please log in using one of these methods to post your comment:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s

This site uses Akismet to reduce spam. Learn how your comment data is processed.

%d bloggers like this: