| http://www.w3.org/ns/prov#value | - Abraham added that he expected to see the same kinds of things that we have seen already, which are drive-by based malware attacks", referring to the kinds of exploits triggered when hackers manage to dupe users into visiting malicious websites.
|