With mobile malware evolving at an alarming rate, Today’s attackers not only exploit zero-day vulnerabilities but also use system configuration errors and social engineering to breach mobile security.
I’m lucky enough to be sent interesting new malware examples and hacker exploits to examine and figure out. For the most part, senders look to me for clues about how the program works and what it does ...