mRAT spyware bypasses mobile enterprise controls
ComputerWeekly.com “At that stage – when the content is decrypted for the user – the spyware can take control of the content and send it on,” said Ohad Bobrov, CTO and co-founder of Lacoon Mobile Security. “Our researchers adapted a similar method used by mRATs in the … An increase in mobile targeted threats is putting organizations at risk of … |