An executive in your company reports odd behavior on her PDA. After investigation you discover that a trusted device is actually copying data off the PDA. The executive tells you that the behavior started shortly after accepting an e-business card from an unknown person. What type of attack is this?
Tamra
4 months agoNgoc
5 months agoDalene
5 months agoEzekiel
5 months agoBrandon
5 months agoRodolfo
5 months agoDestiny
5 months agoMica
5 months agoMirta
5 months agoRenea
6 months agoGretchen
6 months agoJody
6 months agoEmily
6 months ago