Tag Archives: exploits

Attack vectors for personal computers

I’ve put together a (very) simplified overview of various attack vectors for an end user’s personal computer. For a determined attacker with the right resources, all of the above is potentially possible, although whether an attacker would go to this … Continue reading

Tagged , , , , , | Leave a comment