Malware Businesses Blending the Legitimate and the Illegitimate

Whenever someone wants to invoke a hacker for any purpose, we usually get some (stock photography) image of a lone, hooded malware author bent over a dark keyboard. Movies, too, perpetuate the idea of some socially maladjusted loner wreaking havoc single-handedly from his (or her) laptop, with the plot usually culminating in the arrest of the individual—and there the mayhem ends, because the single genius is now in solitary.

read more

Read more: Malware Businesses Blending the Legitimate and the Illegitimate

Story added 21. September 2018, content source with full text you can find at link above.