The same easily exploitable vulnerability was found in three of the apps that led to the compromise of victims’ data.
Go to Source
Author: Kristina Beek, Associate Editor, Dark Reading
Go to Source
Author: Kristina Beek, Associate Editor, Dark Reading