If you train your users that they should not install their own software but instead ask their IT support for it, then this type of attack is less likely to succeed.
“... The victims are made to believe that the only thing that they are downloading is authentic software from adobe .com. Unfortunately, nothing could be further from the truth...”
No comments:
Post a Comment