I'm always surprised how people who exploit IT systems weaknesses for a living seem to be themselves fairly weak on security and hiding their tracks.
I'm always surprised how people who exploit IT systems weaknesses for a living seem to be themselves fairly weak on security and hiding their tracks.