0
________ is a technique where attackers modify legitimate software to hide a malicious application.

Open 1 Answers 1548 Views Technology
________ is a technique where attackers modify legitimate software to hide a malicious application.

Wipers

Exploits

Code caves

Weaponized documents

1 Answer

0

________ is a technique where attackers modify legitimate software to hide a malicious application.

Wipers

Exploits

Code caves

Weaponized documents

by (302k points)
...