April 8, 2008
I am currently researching on this topic. Here is an interview I had with Risky Business (IT Security Podcast) about. For more information, there is also an article on ZDNet Asia.
Interview: http://www.itradio.com.au/security/?p=66
Link: http://www.zdnetasia.com/news/security/0,39044215,62039923,00.htm
-
permalink - 
Interview: http://www.itradio.com.au/security/?p=66
Link: http://www.zdnetasia.com/news/security/0,39044215,62039923,00.htm

