Fake ActiveX warnings are still used, Trojans are still spreading the trial versions, and browser exploits are still used to deploy e-threats. We’ll take a closer look at some of these cases and add some new ones to the list as we go.
Trojan spreading
In order to fully understand the way rogue software gets on users’ computers, let’s look at the way Trojans are spreading. We will take one that’s still