Rogues gallery 2: Ten infamous hacks and hackers

From low-profile intrusions to statement-making break-ins, here are 10 headline-making system intrusions (and the culprits behind them)

By Joan Goodchild, CSO, May 18, 2012
Subscribe to slideshows:RSS