According to the report, this method works regardless of whether the communications are encrypted, making it concerning for user privacy. The vulnerability has been seen in Android operating systems, but there is no evidence of active exploitation yet.
from Top Tech News- News18.com https://ift.tt/ZirEakp
0 Comments