New cybersecurity defense approach fools hackers into sharing keys

Have questions? Search our knowledgebase.