Researchers Identify “Invisible” Data Theft at Black Hat USA 2012

Researchers Identify “Invisible” Data Theft at Black Hat USA 2012

Stochastic forensics can be used to determine if data was copied from a computer