Prototype drive-by attack shows mobile threat
As smartphones increasingly hold interesting data, <a href="http://www.csoonline.com/article/686655/social-engineering-3-mobile-malware-techniques">attackers will target the devices using known vulnerabilities</a> in common software packages.
Robert Lemos | 27 Jul | Read more