- Android
- Servers
- Computer Vulnerabilities
- Private Data / PII / Information
- Operating Systems (OSes)
- Users Affected
- Information and Communications Technology (ICT)
- Edge
- Computer Hacking
- Software Applications
- Software Vulnerabilities
- Phone Devices
- Tablet
- Legal
- Hijacking / Spoofing Attack