An executive in your company reports odd behavior on her PDA. After investigation you discover that a trusted device is actually copying data off the PDA. The executive tells you that the behavior started shortly after accepting an e-business card from an unknown person. What type of attack is this?
Tamra
4 months agoNgoc
4 months agoDalene
4 months agoEzekiel
4 months agoBrandon
5 months agoRodolfo
5 months agoDestiny
5 months agoMica
5 months agoMirta
5 months agoRenea
5 months agoGretchen
5 months agoJody
5 months agoEmily
5 months ago