« Back to Glossary Index

Designed to launch an attack on a user’s computer. Attackers often disguise email attachments as documents, PDFs, e-files, or voicemails.

« Back to Glossary Index