The gap in the fence: the most popular software is the most vulnerable
Imagine the following situation: there is huge disbursement of emails with innocent looking MS Word document attachments sent to the mailboxes of a company’s employees. Some of these employees have … Continue reading The gap in the fence: the most popular software is the most vulnerable