This method of entry is commonly executed via your Web browser. Often, the attacked will exploit a flaw in a piece of software, known as a plug-in, upon which your Web browser relies, such as a PDF ...