05-21-2017 , 07:51 PM
Softpedia source
After reading this very interesting article some rhetorical questions arose in my rusty head:
1. Why they didn`t report the vulnerabilities to Windows immediately after the exploits were stolen from them in order to avoid many things?
2. It is legal to detain exploits for an OS?
3. How many other exploits were undisclosed/not stolen and created after the attack?
4. We can trust anyone nowadays?
5. What can we do to protect ourselves from all of them?
After reading this very interesting article some rhetorical questions arose in my rusty head:
1. Why they didn`t report the vulnerabilities to Windows immediately after the exploits were stolen from them in order to avoid many things?
2. It is legal to detain exploits for an OS?
3. How many other exploits were undisclosed/not stolen and created after the attack?
4. We can trust anyone nowadays?
5. What can we do to protect ourselves from all of them?