Originally posted by Weasel
View Post
- Humans are lazy and life is busy. Exploits rely on the fact that, if you don't find anything the first 1000 times, you're likely to just start opening files directly when you're in a hurry. Good security has to design around human flaws.
- Malware does exist which checks the installed hardware on the system and remains dormant if it detects common VM hosts in order to fool you into hopefully letting it out of the VM.
Comment