Photo Gallery: How the NSA Infiltrates Computers 12/30/2013
Return to article
10 / 28
 Step 7: The FOXACID server checks once again that the browser being used does...
SPIEGEL ONLINE

Step 7: The FOXACID server checks once again that the browser being used does in fact contain the desired security holes for infecting the target’s computer with malware. The appropriate malware is then deployed.

Return to article
10 / 28