a. Target mobile hardware vulnerabilities |
b. Target apps’ vulnerabilities |
c. Setup Keyloggers and spyware in smart-phones |
d. Snatch the phone |
Answer: Snatch the phone |
a. Target mobile hardware vulnerabilities |
b. Target apps’ vulnerabilities |
c. Setup Keyloggers and spyware in smart-phones |
d. Snatch the phone |
Answer: Snatch the phone |