While you’re on a business trip, you use the hotel or conference room wireless network to check news and request an upgrade. A hacker exploits a new and un-patched operating system vulnerability to install a rootkit (a virtually undetectable infection).