Most of the hacking incidents and security vulnerabilities we often see published happen remotely, often through malware that has been installed without the user's knowledge. Local Privilege ...