Recently, we attended a seminar related to security. We were so amazed at the content, that we had to reproduce it. It’s important for our clients to understand why we put restrictions on email and passwords. It’s important to see what is possible without the security provisions we put in place.
This is an example of the process of creating a malicious PDF, sending it to through email, and simply opening it. Then the hacker can access the machine through several methods.
This process is an amazing eye-opening experience.