For 18 days last month, a team of computer security experts found themselves engaged in a digital version of hand-to-hand combat with a group of hackers determined to break into the network of a military contractor.
For 18 days last month, a team of computer security experts found themselves engaged in a digital version of hand-to-hand combat with a group of hackers determined to break into the network of a military contractor.