Attacks tend to come in two ways: from infected e-mail messages and documents, and more recently, across the network directly through unpatched holes in the Windows operating system.
This work is licensed under a Creative Commons Attribution-NoDerivatives 4.0 International License.
Please view the republishing articles page for more information.