November 11, 2011
"
As hardware devices are almost exclusively produced in countries where controls about who has access to the manufacturing process are non-existent or, at best, pretty lax, government agencies, military organizations and businesses that operate systems critical to a country's infrastructure can never be too careful when checking whether the devices they are planning to use have been tampered with. Read more from [net-security.org]"
This entry was posted
on November 11, 2011 at 02:14.
You can skip to the end and leave a response.