Answer:
Attackers use keyloggers to record keystrokes and capture login information for credential harvesting.
Attackers use keyloggers to record keystrokes and capture login information for credential harvesting.
You may be interested in:
Web Security MCQs - PART 2