In Symantec’s shoes February 13, 2012 Author: Category: Greg's Blog Analysis: What would you do, faced with ransom demands and code leak? View full post on cyber extortion – Yahoo! News Search Results View full post on National Cyber Security Related