"Three days later, Wang stole hostnames and descriptions of U.S. Steel computers... Wang thereafter took steps to identify and exploit vulnerable servers on that list."
Quote
Name
"Three days later, Wang stole hostnames and descriptions of U.S. Steel computers... Wang thereafter took steps to identify and exploit vulnerable servers on that list."