by HCS Technical Staff How is it done? Offensive computer attacks are usually conducted by exploiting flaws in a computer web interface (most often a “login screen”) or surreptitiously installing malicious software (“malware”) on targeted computers to produce a number of effects on the computer system or devices that it controls. How does it happen? In the broadest…