| http://www.w3.org/ns/prov#value | - Where high-profile attacks such as Flame, Duqu and Stuxnet utilize different techniques to exploit systems -- including leveraging zero-day attacks -- the Mahdi attack relies on social engineering techniques to get onto targeted computers, Symantec said.
|