Instead of tricking victims into opening malware-laden PDFs or running video calling malware, this attack method encourages victims to fix the problem of accessing the microphone and camera.
Source link
Instead of tricking victims into opening malware-laden PDFs or running video calling malware, this attack method encourages victims to fix the problem of accessing the microphone and camera.