By

John Strand
In this episode we discuss the origin of legacy vulnerabilities. We also discuss the Amnesty International hack and how it takes a special jackass to hack a charity.

Shopping Cart
Scroll to Top