0 Members and 1 Guest are viewing this topic.
Cheers Karlos. How do they work? What would she need to have done to fall victim to it?
@PiruAs I said she told me she hasn't provided her login details to anybody, and she is aware of phishing emails and doesn't respond to them. I was asking Karlos how the cross-site scripting attacks work.
So I'm faced with trying to talk her through installing a virus scanner on Linux when I don't even know how to do it myself 0_o