![]() Stuffed the personal information in temporary files, compressed them and divided them into smaller-sized files to increase their chances of transmitting the stolen data without being noticed.Searched the system about 9,000 times for sensitive personal information while hiding the searches through encryption.Uncovered Equifax database credentials and "thereby falsely represented that they were authorized users of Equifax's network.". ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |