- Cryptography / Key-Pairs
- Networked Devices
- Operating Systems (OSes)
- Cyber Attackers
- Risks
- Phone Devices
- Software Applications
- Software Exploitation
- Theft
- Cyber Attacks
- Users Affected
- Computer Hacking
- Software Vulnerabilities
- Mobile Devices
- Smartphones
- Computer Vulnerabilities