An attacker might use hacked websites and emails to deliver specially crafted malware to insecure devices. This virus provides the attacker with an entry point via which he may control the device. Which of the following devices is the attacker capable of employing?
A
Any device that can communicate over the intranet can be hacked.
Comments