An author on the IBM security blog recently got an interesting request. The developer of a mobile malware kit wasn’t pleased with their reporting, so they reached out to correct the record. IBM’s coverage wasn’t helping the criminal’s business, and so the researcher’s post needed fixing. The email came from the author and core developer […]
Latest Comments