An executive in your company reports odd behavior on her PDA. After investigation you discover that a trusted device is actually copying data off the PDA. The executive tells you that the behavior started shortly after accepting an e-business card from an unknown person. What type of attack is this?
Ricki
1 months agoReynalda
1 months agoIlda
15 days agoAlise
17 days agoCherelle
19 days agoGary
1 months agoDaniel
1 months agoYoulanda
19 days agoLatrice
2 months agoRenato
16 days agoCheryl
1 months agoJess
1 months agoMargret
2 months agoAnnabelle
15 days agoOdette
24 days agoAvery
1 months agoAdelina
2 months agoElli
2 months agoPeggy
3 months ago