Results 1 - 1 of 1

Search term: theft-by-deception

Spyware

... and are distributed by means that exploit vulnerabilities displayed by many browsers. They use all types of deception to undermine ... both scope and severity. These risks include the theft of personal information, monitoring of communications, and tracking ...

(9 pages) 44 1 5.0 23/Nov/2007

Subjects: Science Essays > Technology

1