A user downloaded what appears to be genuine software. Unknown to her, when she installed the application, it executed code that provided an unauthorized remote attacker access to her computer. What type of malicious threat displays this characteristic?
Xuan
13 days agoLenna
14 days agoShawnda
18 days agoAlton
20 days agoTimothy
25 days ago