Unlike traditional attacks that rely on exploits, this succeeds through social engineering combined with abuse of Windows' own security architecture.
A security researcher uncovered an exposed online database that was stockpiling user information likely collected via malware ...