An executive in your company reports odd behavior on her PDA. After investigation you discover that a trusted device is actually copying data off the PDA. The executive tells you that the behavior started shortly after accepting an e-business card from an unknown person. What type of attack is this?
Ricki
3 months agoReynalda
3 months agoDannette
1 months agoIlda
2 months agoAlise
2 months agoCherelle
2 months agoGary
3 months agoDaniel
3 months agoGabriele
2 months agoIsaiah
2 months agoYoulanda
2 months agoLatrice
3 months agoRenato
2 months agoCheryl
3 months agoJess
3 months agoMargret
3 months agoAnnabelle
2 months agoOdette
2 months agoAvery
3 months agoAdelina
4 months agoElli
4 months agoPeggy
4 months ago