The difficulty in figuring out who, exactly, is behind cyber attacks creates a vacuum typically filled by technological finger pointing. The software exploited, network abused or malware used come under intense scrutiny, distracting from the people responsible. Read More