The hackers were also able to modify system logs to conceal their actions. ‘The intruders had compromised the accounts of the most privileged JPL users, giving the intruders access to most of JPL's networks,’
Read More »Copyright © 2007 - 2013 - Pakalert Press. All rights reserved