Answer:
Attackers exploit security risks on mobile devices by exploiting vulnerabilities in mobile operating systems, apps, or user behaviors.
Attackers exploit security risks on mobile devices by exploiting vulnerabilities in mobile operating systems, apps, or user behaviors.
You may be interested in:
Web Security MCQs - PART 2