Malicious code that enters a target system, lays dormant until a user opens the certain program then deletes the contents…
Disguising oneself as a reputable hardware manufacturer’s field technician who is picking up a server for repair would be described as: