Researchers Find Stolen Algorithms in Commercial Cybersecurity Products
An analysis conducted by two researchers has revealed that some commercial cybersecurity products rely on algorithms that have been taken from other security tools without authorization.