Q&A: Researchers find evidence of emerging market for stolen, spoofed machine identities
The Last Watchdog
APRIL 17, 2019
Hudson: You can somebody to click on a website, using a falsified machine identity, and then download them some ransomware, or put keystroke stealer, or any kind of information harvesting malware. At the end of the day the CSO the CIO and the CEO all left the company. LW: Can you walk us through an example?
Let's personalize your content