Quote:
Originally Posted by bobfreedman
We have estimated that there was a Trojan Horse installed on the first hack.
Also, from the first hack, a complete forensic analysis was done and determined that no data loss occurred
Bob Freedman
|
your people did a forensic analysis after the first hack and determined no data loss but somehow during this analysis a trojan horse was missed?