0 votes
624 views
________ is a technique where attackers modify legitimate software to hide a malicious application.

Wipers

Exploits

Code caves

Weaponized documents
in Technology by (189k points)

1 Answer

0 votes

________ is a technique where attackers modify legitimate software to hide a malicious application.

Wipers

Exploits

Code caves

Weaponized documents

by (189k points)

Related questions

0 votes
1 answer 43 views
0 votes
1 answer 881 views
0 votes
2 answers 1.6k views
0 votes
1 answer 586 views
0 votes
1 answer 2.1k views
2.1k views asked Oct 25, 2020 in Technology by JackTerrance (189k points)
0 votes
0 answers 1.4k views
0 votes
1 answer 9 views
0 votes
1 answer 13 views
0 votes
1 answer 2.1k views
0 votes
1 answer 816 views
816 views asked Oct 25, 2020 in Technology by JackTerrance (189k points)
0 votes
1 answer 29 views
0 votes
1 answer 16 views
0 votes
1 answer 70 views
0 votes
1 answer 21 views
21 views asked Oct 24, 2020 in Technology by JackTerrance (189k points)
0 votes
0 answers 163 views
0 votes
1 answer 510 views
...