An executive in your company reports odd behavior on her PDA. After investigation you discover that a trusted device is actually copying data off the PDA. The executive tells you that the behavior started shortly after accepting an e-business card from an unknown person. What type of attack is this?
Adaline
3 months agoYasuko
3 months agoKaitlyn
3 months agoBeckie
4 months agoLouvenia
4 months agoXochitl
4 months agoVelda
4 months agoBritt
4 months agoClaudio
5 months agoCherelle
5 months agoMireya
5 months agoEladia
5 months agoRaelene
5 months agoElin
5 months agoKristin
5 months agoArlyne
5 months agoRebeca
5 months agoRicki
9 months agoReynalda
9 months agoDannette
8 months agoIlda
9 months agoAlise
9 months agoCherelle
9 months agoGary
9 months agoDaniel
10 months agoGabriele
8 months agoIsaiah
8 months agoYoulanda
9 months agoLatrice
10 months agoRenato
9 months agoCheryl
9 months agoJess
9 months agoMargret
10 months agoAnnabelle
9 months agoOdette
9 months agoAvery
10 months agoAdelina
11 months agoElli
11 months agoPeggy
11 months ago