For as long as there has been technology, there have been people that have looked to exploit vulnerabilities in that system. Attacks on cybersecurity come in all shapes and sizes, from personal attacks aimed at discovering peer-to-peer information in identity theft cases, to more significant …
