Most successful attacks on client desktops occur when end-users are duped into launching Trojan horse executables, a fact I’ve raised time and again in the past couple of years. Users might think they ...