With access to source code systems, cyber criminals could alter software products, planting back door access mechanisms or logic bombs Companies should take extra steps to secure their source code ...