Blog
In advanced hacking scenarios, attackers generally try to exploit the target machine’s security flaws. On the other hand, influencing the user by carefully designed social engineering technics can be very effective to create vulnerabilities, or even perform the attack itself. In this blog, I will examine an example of honor system virus, Amish virus. Also, I will mention virus hoaxes briefly .
|