Case and point for White hat Hackers


While disclosing vulnerabilities is standard practice in the computer industry, the people responsible for the vulnerabilities don’t always take it well.

Advertisements

Comments are Most Welcome

Please log in using one of these methods to post your comment:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s