Interactive Attacks: Whereas the examples in the previous talk were about using computers as a delivery mechanism for malware programmes and emails that spread viruses, here we are turning our attention to data attacks that are more precisely targeted, whereby the attacker seeks to focus on one target in a more personal way.