We live in an ultra-connected world in which billions of corporate and personal data are manipulated through mobile devices every second. Smartphones and tablets have inherent capabilities that, when illegally exploited, enable hackers to locate users, eavesdrop on their communications, access their files, microphones, camera, etc., making them a target of choice.
Rabah Laouadi
VP of Research
Recent Posts
Mobile Security Report 2018 - Malwares, network attacks...
Posted by
Rabah Laouadi on October 31, 2018