Hacking Critical Infrastructure
For new readers, welcome, and please take a moment to read a brief message From the Author. Please accept my apologies in advance if you were hoping to read about an actual technical vulnerability in critical infrastructure or the exploitation thereof. Today we discuss a plausible strategic cby3r threat, and how one might go about …