Here, applicant Martin shows us how the Trojan horse technique enables hackers to extract personal data from cybernauts. <br /> <br />© 2015 W&CIE/CA : Reproduction and distribution prohibited on any media (Internet included) without authorisation <br /> <br />Credits : Cigref - Agence W - Production Windsor