minus-squareMouldyCat@feddit.uktoLinux@lemmy.ml•The Quest for Reasonably Secure Operating Systemslinkfedilinkarrow-up6arrow-down2·5 days agooften social eng attacks rely on a vulnerability as well e.g. getting your mark to open an Excel file that exploits a vulnerability in MS Office. linkfedilink
often social eng attacks rely on a vulnerability as well e.g. getting your mark to open an Excel file that exploits a vulnerability in MS Office.