Imagine an old Western movie where the posse tracks the outlaws by following footsteps on a dirt trail or looking for broken branches. Now fast forward to the present, where the trail is electronic, the posse is comprised of bad guys, and the loot is frequently encrypted.
As any security expert will concede, every security system can be compromised, every chip can be reverse engineered and h...
» read more