Posted on March 12th, 2014
On several phone models, this program runs with sufficient rights to access and modify the user’s personal data.
Science and Technology cell phones, mobile computing, mobile phones, network security, privacy, spying, spyware
Leave a Reply
You must be logged in to post a comment.