Which type of hackers are invited by the software vendors to find the security flaws in their system?
a. White hat hackers
b. Black hat hackers
c. Grey hat hackers
d. Blue hat hackers
a. White hat hackers
b. Black hat hackers
c. Grey hat hackers
d. Blue hat hackers