Source: National Cyber Security – Produced By Gregory Evans Imagine a piece of malware that is practically impossible to detect and can suck a victim’s bank account dry – because it was installed by the user, and acts like any other legitimate piece of software. That is exactly what a…