The most popular way to run suspicious code on a device is by tricking in the user to install a suspicious program on the targeted device. Lack of awareness among the user base regarding these kinds ...