Army: Log-off flaw creates no risk of outside hacks

Spokeswoman says reported vulnerability can be exploited only by an individual with physical access to the computer.
This entry was posted in Gov 2.0/Open Gov, Technology. Bookmark the permalink.

Comments are closed.