"If attackers can dupe users into visiting malicious Web sites or remote shares, or get them to plug in a USB drive -- and in some cases con them into opening a file -- they can hijack a PC and plant malware on it."
Read the article on computerworld
No comments:
Post a Comment
Os comentários são moderados.
The comments are moderated.