Overlay malware allows attackers to create an overlay to be displayed on top of legitimate Android applications. The overlay mimics the real app UI...
Continue ReadingVivien Raoul
Wikileaks, Twitter hacks : 6 best practices to avoid data theft
By
Vivien Raoul on March 14, 2017
Wikileaks revealing that the CIA turns our connected objects into spying tools, Twitter accounts getting hacked... Do you know how to protect your...
Continue Reading