Comment by rdedev
2 years ago
The usual arguments I hear for this is grandma or kid following these specific instructions and installing a malware. But how many attacks make use of these?
2 years ago
The usual arguments I hear for this is grandma or kid following these specific instructions and installing a malware. But how many attacks make use of these?
No comments yet
Contribute on Hacker News ↗