Emerging cyber threats report, 2013
…to prevent unauthorized duplication, capturing keystrokes from a nearby (and uninfected) device, using a phone’s camera to capture the environment without the user’s knowledge, and exploiting security vulnerabilities in the…
Expert Commentary