For love of money - malicious hacking takes an ominous turn.
This paper discusses how programmers use the targeted Trojan horse attack to steal valuable confidential information via an email with a subject line or message containing language calculated to lure a particular recipient into opening the attachment. Because many antivirus programs recognize only t...
| Опубликовано в:: | IEEE spectrum 42, 11 (2005). |
|---|---|
| Главный автор: | |
| Формат: | Статья |
| Язык: | English |
| Предметы: |