The Mac trojan can leverage existing user permissions to quietly perform malicious activities before deleting the evidence to cover its tracks.
from Top Tech News- News18.com https://ift.tt/hUdXQqt
from Top Tech News- News18.com https://ift.tt/hUdXQqt