(Source: ZDNet) … to succeed, the purchased software needed to be stored on a flash drive and then … When there is lax security and easy pickings to be had, cybercriminals will …