Abstract: Attackers are seeking for tools these days that make their jobs easier while keeping the victim unaware of any unwanted activity taking place on his computer. Nowadays online medical reports ...