Hacking a network, using an ‘invisibility cloak’ – Is it that simple? Security experts describe a real attack case that sees the attackers using a small, unidentified hardware device to […]