In early 1999, a piece of malware with one of the oddest origins hit the scene. This article explores the investigative methodology used by the FBI, and highlights some of their findings.
In early 1999, a piece of malware with one of the oddest origins hit the scene. This article explores the investigative methodology used by the FBI, and highlights some of their findings.