Apart from using traditional malicious code that executes on the system, there are other attack vectors that can be used to get access to sensitive information or enable spying capabilities. While not all of them involve using malicious software as we know it, it is still important to know them, as in many cases, they might be the actual reason for a system compromise. Here is a list of the most notorious examples.





















































