Which security term is used to identify an email attachment…
Which security term is used to identify an email attachment that is not what itappears to be? For example, an email attachment that has a jpeg extension but is not aphoto but rather a program to gain access to the computer?
Read Details