Fake Document, Real Access: Foxit Impersonation Enables Stealth VNC Control

Attackers who impersonate trusted vendors do not only damage the reputation of the original vendor, but also cause heaps of trouble down the line.

This article has been indexed from Security Blog G Data Software AG

Read the original article: