Answer:
Attackers use malware in credential harvesting by recording keystrokes or stealing stored credentials on infected devices.
Attackers use malware in credential harvesting by recording keystrokes or stealing stored credentials on infected devices.
You may be interested in:
Web Security MCQs - PART 2