In our second blog, I discussed why a mobile device needs to be protected. Exactly what are we talking about here? What are the ways an attacker can hack a mobile device to get what they need? Gone are the days where attackers throw USB thumb drives in parking […]