Attackers can exploit the feature and send people’s data directly to remote servers, posing a privacy and security risk, researchers said.
This post appeared first on ThreatPost – The First Stop for Security News
Author: Elizabeth Montalbano
Attackers can exploit the feature and send people’s data directly to remote servers, posing a privacy and security risk, researchers said.
This post appeared first on ThreatPost – The First Stop for Security News
Author: Elizabeth Montalbano